Connect Aurora Endpoint Security to Intune
The Aurora Endpoint Security administrator account that you use to connect to Intune must have an Intune license.
- In the management console, on the menu bar, click Settings > Connectors.
- Click Add Connector and select Microsoft Intune from the list.
- Specify your Entra tenant ID. Click Next.
- Specify your administrator credentials for Entra.
- On the App Configuration Policies screen, turn on the OS platforms that you want the Intune integration to apply to and complete these steps for each platform. Note that all Intune managed devices that you want to use this feature must be included in an app configuration policy. If you want to create app configuration policies later, click Cancel.
- Optionally, change the name of the policy. Do not change the target app.
- If you want the policy to apply to all groups from the Intune instance, turn on All groups.
- If you want the policy to apply to specific groups from the Intune instance, click
. Search for and select groups and click Add.
- Click Save. If you added an app configuration policy for Android, follow any administrator consent prompts that display.
- Instruct your organization's Intune administrator to edit the Aurora Protect Mobile MTD connector in the Intune admin center and turn on these options. To enable the connector, complete these steps:
- Log in to the Intune admin center.
- Click Tenant administration > Connectors and tokens.
- In the Cross platform section, click Mobile Threat Defense.
- Click Add.
- In the Select the Mobile Threat Defense connector to setup list, select CylancePROTECT Mobile.
- Click Create.
- If you want to add app configuration policies at a later time, or if you want to add additional policies, in Settings > Connectors, click Generate App Configuration for the Intune connection.
- If you also want to connect Aurora Endpoint Security to Intune to manage risk levels of devices, see Integrating Aurora Endpoint Security with Microsoft Intune to respond to mobile threats.