This demo covers three Mobile Threat Defense best practices that turn the Microsoft Defender for Endpoint mobile app from “available” into “enforced.” It shows how to share device risk signals between Microsoft Defender for Endpoint and Microsoft Endpoint Manager (Intune), then use that risk level to drive compliance and access. The walkthrough enables the Microsoft Intune connection in the Microsoft 365 Defender portal (Settings > Endpoints > Advanced features) and turns on the Intune connector toggles in Endpoint Manager (Tenant administration > Connectors and tokens > Microsoft Defender for Endpoint). Next, it creates an iOS/iPadOS compliance policy that marks devices noncompliant when the Defender risk level exceeds a strict threshold—choosing Low or, ideally, Clear (and explicitly advising against Medium/High). Finally, it builds an Azure AD Conditional Access policy that requires devices to be marked compliant to access corporate resources, with a safety step to exclude the Global administrator role before switching the policy from report-only to On.
We built this as a “do these three things, win the day” walkthrough—sequenced so each step naturally unlocks the next (signal sharing → compliance → conditional access). The visuals stay close on the toggles and policy fields that matter, the narration calls out the gotchas before they bite (risk level choices, admin lockout), and the edit keeps the momentum so admins can follow once and implement immediately. Final delivery includes closed captions, audio description, and thumbnails.



