- Cylance Endpoint Security requirements
- Requirements: Cylance console
- Requirements: CylancePROTECT Desktop
- Requirements: CylanceOPTICS
- Requirements: CylancePROTECT Mobile app
- Requirements: BlackBerry Connectivity Node
- Requirements: CylanceGATEWAY Connector
- Requirements: CylanceGATEWAY agents
- Requirements: CylanceAVERT
- Cylance Endpoint Security network requirements
- Cylance Endpoint Security proxy requirements
- Logging in to the management console
- Installing the BlackBerry Connectivity Node
- Linking to your company directory
- Setting up administrators
- Adding users and devices
- Enrolling CylancePROTECT Mobile and CylanceGATEWAY users
- Setting up zones to manage CylancePROTECT Desktop and CylanceOPTICS
- Setting up CylancePROTECT Desktop
- Testing your CylancePROTECT Desktop deployment
- Using device policies to manage CylancePROTECT Desktop devices
- Installing the CylancePROTECT Desktop agent for Windows
- Installing the CylancePROTECT Desktop agent for macOS
- Installing the CylancePROTECT Desktop agent for Linux
- Require users to provide a password to remove the CylancePROTECT Desktop agent
- Setting up CylancePROTECT Mobile
- Setting up CylanceOPTICS
- Setting up CylanceGATEWAY
- Defining your private network
- Setting up the CylanceGATEWAY Connector
- Install the CylanceGATEWAY Connector to a vSphere environment
- Install the CylanceGATEWAY Connector to an ESXi environment
- Prerequisites to install CylanceGATEWAY Connector to a Microsoft Azure environment
- Install the CylanceGATEWAY Connector to a Microsoft Azure environment
- Install the CylanceGATEWAY Connector to a Hyper-V environment
- Install the CylanceGATEWAY Connector to an AWS environment
- Configure the CylanceGATEWAY Connector in the VM environment
- Access the CylanceGATEWAY Connector using OpenSSH
- Configure your firewall
- Enroll the CylanceGATEWAY Connector with the BlackBerry Infrastructure
- View details for an enrolled CylanceGATEWAY Connector
- Configure the CylanceGATEWAY Connector
- Managing CylanceGATEWAY Connectors
- Manage CylanceGATEWAY Connectors
- Update a CylanceGATEWAY Connector
- Specify your private network
- Specify your private DNS
- Specify your DNS suffixes
- Specify private CylanceGATEWAY agent IP ranges
- Bring your own IP addresses (BYOIP)
- Setting up the CylanceGATEWAY Connector
- Define network services
- Controlling network access
- Configuring network protection
- Searching ACL rules and Network Services
- Using source IP pinning
- Configuring the Gateway service options
- Gateway Service policy parameters
- Configure Gateway service options
- Specifying how devices activated with an EMM solution use the CylanceGATEWAY tunnel
- Specify which apps use CylanceGATEWAY on iOS devices
- Specify which apps use CylanceGATEWAY on iOS devices in a Microsoft Intune environment
- Specify CylanceGATEWAY options on Android Enterprise devices
- Specify CylanceGATEWAY options on Chromebook devices
- Specify CylanceGATEWAY options on Android Enterprise devices in your Microsoft Intune environment
- Connecting Cylance Endpoint Security to MDM solutions to verify whether devices are managed
- Installing the CylanceGATEWAY agent
- Defining your private network
- Setting up CylanceAVERT
- Installing the CylanceAVERT agent
- Define sensitive content using information protection settings
- Managing information protection policies
- Managing updates for the CylancePROTECT Desktop and CylanceOPTICS agents
- Appendix: Best practices for deploying CylancePROTECT Desktop on Windows virtual machines
Connect Cylance Endpoint Security to Intune
Cylance Endpoint Security
to Intune
The
Cylance Endpoint Security
administrator account that you use to connect to Intune
must have an Intune license.- In the management console, on the menu bar, clickSettings > Connectors.
- ClickAdd Connection > Microsoft Intune.
- Specify yourAzuretenant ID. ClickNext.
- Specify your administrator credentials forAzureAD.Follow the prompts for administrator consent. If required, coordinate with your organization'sIntuneadministrator to grant consent for the BlackBerry Protect Mobile MTD connector inMicrosoftEndpoint Manager.
- On theApp Configuration Policiesscreen, turn on the OS platforms that you want theIntuneintegration to apply to and complete the following steps for each platform. Note that allIntunemanaged devices that you want to use this feature must be included in an app configuration policy. If you want to create app configuration policies later, clickCancel.
- Optionally, change the name of the policy. Do not change the target app.
- If you want the policy to apply to all groups from theIntuneinstance, turn onAll groups.
- If you want the policy to apply to specific groups from theIntuneinstance, click
. Search for and select groups and click
Add.
- ClickSave. If you added an app configuration policy forAndroid, follow any administrator consent prompts that display.
The app configuration policies that you create are visible in
Microsoft
Endpoint Manager.- Instruct your organization'sIntuneadministrator to edit the BlackBerry Protect Mobile MTD connector inMicrosoftEndpoint Manager and turn on the following options:
- Connect Android devices to BlackBerry Protect Mobile
- Connect iOS devices to BlackBerry Protect Mobile
- If you want to add app configuration policies at a later time, or if you want to add additional policies, inSettings > Connectors, clickGenerate App Configurationfor theIntuneconnection.