https://www.petervanderwoude.nl/post/intune-and-zimperium-part-2-conditional-access-and-mobile-threat-defense-level/
Intune and Zimperium – Part 2: Conditional access and mobile threat defense level