- Cylance Endpoint Security requirements
- Requirements: Cylance console
- Requirements: CylancePROTECT Desktop
- Requirements: CylanceOPTICS
- Requirements: CylancePROTECT Mobile app
- Requirements: BlackBerry Connectivity Node
- Requirements: CylanceGATEWAY Connector
- Requirements: CylanceGATEWAY agents
- Requirements: CylanceAVERT
- Cylance Endpoint Security network requirements
- Cylance Endpoint Security proxy requirements
- Logging in to the management console
- Configuring a new Cylance Endpoint Security tenant
- Installing the BlackBerry Connectivity Node
- Linking to your company directory
- Setting up administrators
- Adding users and devices
- Enrolling CylancePROTECT Mobile and CylanceGATEWAY users
- Setting up zones to manage CylancePROTECT Desktop and CylanceOPTICS
- Setting up CylancePROTECT Desktop
- Testing your CylancePROTECT Desktop deployment
- Using device policies to manage CylancePROTECT Desktop devices
- Installing the CylancePROTECT Desktop agent for Windows
- Installing the CylancePROTECT Desktop agent for macOS
- Installing the CylancePROTECT Desktop agent for Linux
- Require users to provide a password to remove the CylancePROTECT Desktop and CylanceOPTICS agents
- Setting up CylancePROTECT Mobile
- Setting up CylanceOPTICS
- Setting up CylanceGATEWAY
- Defining your private network
- Setting up the CylanceGATEWAY Connector
- Install the CylanceGATEWAY Connector to a vSphere environment
- Install the CylanceGATEWAY Connector to an ESXi environment
- Prerequisites to install CylanceGATEWAY Connector to a Microsoft Entra ID environment
- Install the CylanceGATEWAY Connector to a Microsoft Entra ID environment
- Install the CylanceGATEWAY Connector to a Hyper-V environment
- Install the CylanceGATEWAY Connector to an AWS environment
- Configure the CylanceGATEWAY Connector in the VM environment
- Access the CylanceGATEWAY Connector using OpenSSH
- Configure your firewall for the CylanceGATEWAY Connector
- Enroll the CylanceGATEWAY Connector with the BlackBerry Infrastructure
- View details for an enrolled CylanceGATEWAY Connector
- Configure the CylanceGATEWAY Connector
- Managing CylanceGATEWAY Connectors
- Manage CylanceGATEWAY Connectors
- Update a CylanceGATEWAY Connector
- UDP connectivity test responses
- Specify your private network
- Specify your private DNS
- Specify your DNS suffixes
- Specify private CylanceGATEWAY agent IP ranges
- Bring your own IP addresses (BYOIP)
- Setting up the CylanceGATEWAY Connector
- Network Address Translation with CylanceGATEWAY
- Define network services
- Controlling network access
- Configuring network protection
- Searching ACL rules and Network Services
- Using source IP pinning
- Configuring the Gateway service options
- Gateway Service policy parameters
- Configure Gateway service options
- Specifying how devices activated with an EMM solution use the CylanceGATEWAY tunnel
- Specify which apps use CylanceGATEWAY on iOS devices
- Specify which apps use CylanceGATEWAY on iOS devices in a Microsoft Intune environment
- Specify CylanceGATEWAY options on Android Enterprise devices
- Specify CylanceGATEWAY options on Chromebook devices
- Specify CylanceGATEWAY options on Android Enterprise devices in your Microsoft Intune environment
- Connecting Cylance Endpoint Security to MDM solutions to verify whether devices are managed
- Installing the CylanceGATEWAY agent
- Defining your private network
- Setting up CylanceAVERT
- Managing updates for the CylancePROTECT Desktop and CylanceOPTICS agents
- Connecting Cylance Endpoint Security to external services
- Appendix: Best practices for deploying CylancePROTECT Desktop on Windows virtual machines
- Appendix: Using RMM solutions to install the Cylance agents on devices
- BlackBerry Docs
- Cylance Endpoint Security
- Setup
- Cylance Endpoint Security Setup Guide
- Setting up CylancePROTECT Mobile
- Use Intune app protection policies with CylancePROTECT Mobile
Use Intune app protection policies with CylancePROTECT Mobile
Intune
app protection policies with CylancePROTECT Mobile
You can use
Microsoft Intune
app protection policies with CylancePROTECT Mobile
to allow or restrict access to specific Microsoft
apps based on the device threat level reported by CylancePROTECT Mobile
.- Users will receive an email with instructions to download and activate theCylancePROTECT Mobileapp. Instruct users to ignore the email for now, they will download and activate the app in step 10. Instruct users to keep the email as they will need the QR code to activate theCylancePROTECT Mobileapp.
- Create a risk assessment policy to map alerts to device risk levels. If you don't assign a custom risk assessment policy, a default risk assessment policy is applied to users in your tenant.
- In theIntuneadmin center:
- Edit theCylancePROTECT MobileMTD connector and turn on the app protection policy options to connectAndroidandiOSdevices toCylancePROTECT.
- Create and configure app protection policies forAndroidandiOSdevices to specify how you wantCylancePROTECT Mobileto allow or restrict access to specific apps based on the reported risk level.
- Assign the app protection policies to user groups.
- Deploy theMicrosoftapps that you want to protect using theIntuneapp protection policy. After a protectedMicrosoftapp is installed, users are prompted to install theMicrosoft Authenticatorapp (iOS) orIntuneCompany portal app (Android) and register the device.
- Instruct users to launch a protectedMicrosoftapp and to follow the "Get Access" prompt to install and activate theCylancePROTECT Mobileapp. Instruct users to use the QR code they received in step 5.IfAndroidusers do not receive the prompt to install theCylancePROTECT Mobileapp, instruct them to close and reopen the protectedMicrosoftapp.
When a user opens a protected
Microsoft
app, they receive a notification if access to the app is restricted due to the device's current risk level.