Microsoft Defender ATP now detects jailbroken Apple devices

Mobile Security
(Image credit:

Microsoft has added support for detecting jailbroken iOS devices to its Defender for Endpoint product, the enterprise version of its Windows 10 Defender protection offering.

The ability to sniff out jailbroken devices is part of a series of new breach protection features that Microsoft has added to the platform for both iOS and Android devices

In a blog post announcing the new features, Microsoft’s Senior Program Manager Shravan Thota said that the platform can now detect and flag both managed and unmanaged jailbroken iOS devices.

“The [jailbroken] device will then be considered as a high risk device and this risk score is shared with your app protection or device compliance policies so that you can block it from accessing corporate resources,” writes Thota.

The feature adds to the phishing protection feature the platform already extends to iOS devices. 

Simplified on-boarding

Explaining the significance of the feature, Thota says Jailbroken iOS devices enable users to sideload apps from external sources besides the official App Store that can potentially be malicious. Furthermore, the jailbroken devices don’t receive critical iOS updates, which exposes them to vulnerabilities.

By flagging these jailbroken iOS devices, Microsoft Defender for Endpoint can help security teams curtail the access of these devices inside corporate networks.

Furthermore, Microsoft also announced that it has simplified the on-boarding experience for users of iOS devices.

Thota explains that the platform earlier relied on end users to provide VPN permissions to extend the anti-phishing protection capability to the device. In contrast, network admins will now be able to push fully configured VPN profiles to all enrolled devices, saving users the effort to manually define VPN related permissions. 

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.