Microsoft Defender for Endpoint for BYOD Devices

%3CLINGO-SUB%20id%3D%22lingo-sub-2488318%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20for%20Endpoint%20for%20BYOD%20Devices%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2488318%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20work%20in%20academia%2C%20students%20bring%20BYOD%20devices%20to%20access%20network%20resources.%20These%20BYOD%20devices%20are%20not%20domain%20joined%20computers%20however%20they%20connect%20to%20network%20(wired%20and%20WiFi)%20to%20access%20network%20resources.%20I%20am%20exploring%20if%20Defender%20for%20endpoint%20is%20a%20suitable%20solution%20for%20BYOD%20endpoint%20security%2F%20EDR%20solution.%20Please%20guide%20if%20Defender%20for%20Endpoint%20can%20be%20used%20for%20BYOD%20security%20and%20provide%20information%20how%20I%20can%20implement%20Defender%20for%20Endpoint%20on%20BYOD.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2488318%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EDefender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2490884%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20for%20Endpoint%20for%20BYOD%20Devices%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2490884%22%20slang%3D%22en-US%22%3ESure%20you%20can%20use%20MDE%20for%20endpoint%20protection%20on%20BYOD%20devices.%20The%20challenge%20however%20will%20be%20that%20these%20are%20often%20personal%20devices%2C%20and%20collecting%20a%20huge%20amount%20of%20information%20about%20what%E2%80%99s%20happening%20on%20personal%20devices%20might%20be%20a%20bit%20of%20a%20difficult%20area.%20From%20a%20security%20perspective%20it%20of%20course%20makes%20absolute%20sense%2C%20but%20since%20these%20are%20personal%20devices%20make%20sure%20that%20the%20student%20agrees%20to%20this%20type%20of%20data%20collection%20and%20cover%20it%20in%20any%20policies%20as%20needed.%3CBR%20%2F%3E%3CBR%20%2F%3EHaving%20said%20that%2C%20you%20can%20either%20onboard%20them%20using%20an%20onboarding%20package%2Fscript%20or%20you%20use%20the%20MDM%20solution%20of%20choice%20like%20Microsoft%20Endpoint%20Manager.%3C%2FLINGO-BODY%3E
New Contributor

Hi,

 

I work in academia, students bring BYOD devices to access network resources. These BYOD devices are not domain joined computers however they connect to network (wired and WiFi) to access network resources. I am exploring if Defender for endpoint is a suitable solution for BYOD endpoint security/ EDR solution. Please guide if Defender for Endpoint can be used for BYOD security and provide information how I can implement Defender for Endpoint on BYOD.

2 Replies

Sure you can use MDE for endpoint protection on BYOD devices. The challenge however will be that these are personal devices, and collecting a huge amount of information about what’s happening on personal devices might be a bit of a difficult area. From a security perspective it of course makes absolute sense, but since these are personal devices make sure that the student agrees to this type of data collection and cover it in any policies as needed.

Having said that, you can either onboard them using an onboarding package/script or you use the MDM solution of choice like Microsoft Endpoint Manager.