Skip Navigation

Setting up
CylancePROTECT Mobile

Step
Action
Step 1
Review the software requirements and network requirements for the
CylancePROTECT Mobile
app.
Step 2
If you want to add
CylancePROTECT Mobile
users to
Cylance Endpoint Security
from your company directory, link to your company directory.
Step 3
Step 4
Step 5
Step 6
Device users install and activate the
CylancePROTECT Mobile
app. For instructions, see the Cylance Endpoint Security User Guide.
Step 7
Optionally, create a risk assessment policy to map alerts to device risk levels. If you don't assign a custom risk assessment policy, a default risk assessment policy is applied to users in your tenant.
Step 8
Optionally, integrate Cylance Endpoint Security with Microsoft Intune to report device risk levels to
Intune
so that
Intune
can execute the desired mitigation actions on devices.
Cylance Endpoint Security
also supports using
Microsoft Intune
app protection policies to allow or restrict access to specific
Microsoft
apps based on the device threat level reported by
CylancePROTECT Mobile
. Enabling this functionality requires a different series of deployment steps. To configure this feature, see Use Intune app protection policies with CylancePROTECT Mobile.