Skip to content

Commit 0b27b7d

Browse files
authored
Merge pull request #2957 from denishdonga27/docs-editor/microsoft-defender-endpoint-an-1740667145
Update microsoft-defender-endpoint-android.md
2 parents c06202e + 73462a8 commit 0b27b7d

File tree

5 files changed

+32
-9
lines changed

5 files changed

+32
-9
lines changed
327 KB
Loading
1.31 MB
Loading
214 KB
Loading
962 KB
Loading

defender-endpoint/microsoft-defender-endpoint-android.md

Lines changed: 32 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,11 @@ manager: deniseb
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
13-
- tier3
1413
- mde-android
1514
ms.topic: conceptual
1615
ms.subservice: android
1716
search.appverid: met150
18-
ms.date: 02/20/2025
17+
ms.date: 02/28/2025
1918
---
2019

2120
# Microsoft Defender for Endpoint on Android
@@ -58,11 +57,18 @@ This article describes how to install, configure, update, and use Defender for E
5857

5958
- For Microsoft Defender for Endpoint on Android to function when connected to a network, the firewall/proxy must be configured to [enable access to Microsoft Defender for Endpoint service URLs](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
6059

61-
### System Requirements
60+
### System requirements
6261

63-
- Mobile phones and tablets running Android 8.0 and above. **Mobile phones running Android go and other mobile devices running Android are not currently supported.**
6462
- Intune Company Portal app should be downloaded from [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal) and installed for seamless onboarding. Device enrollment is required for Intune device compliance policies to be enforced.
6563

64+
- Mobile phones and tablets running Android 8.0 and above. **(Note: Microsoft Defender is ending support for Android 8, 8.1 and 9 versions on April 30, 2025, after that device running on Android version < 10 won't be supported)**
65+
66+
**What does it mean devices running on unsupported Android version?** 
67+
68+
**New users**: The application is longer available for new installations on devices running on unsupported versions. When users with unsupported versions attempt to download the Microsoft Defender app, the Google Play store notifies them that the device is incompatible.
69+
70+
**Existing users**: The Microsoft Defender app continues to function for existing users on unsupported versions, but they don't receive updates from the Google Play store because they don't meet the minimum SDK version requirements. Therefore, any new updates on the app aren't available to devices running unsupported versions. Microsoft no longer addresses bugs or provides maintenance for unsupported operating system versions. Any issues occurring on devices running on unsupported versions aren't investigated. 
71+
6672
> [!NOTE]
6773
> Microsoft Defender for Endpoint on Android isn't supported on userless or shared devices.
6874
@@ -71,14 +77,15 @@ This article describes how to install, configure, update, and use Defender for E
7177
Microsoft Defender for Endpoint on Android supports installation on both modes of enrolled devices - the legacy Device Administrator and Android Enterprise modes. **Currently, Personally-owned devices with work profile, Corporate-owned devices with work profile, and Corporate-owned fully managed user device enrollments are supported in Android Enterprise. Support for other Android Enterprise modes will be announced when ready.**
7278

7379
- Deployment of Microsoft Defender for Endpoint on Android is via Microsoft Intune (MDM). For more information, see [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md).
80+
7481
- Installation of Microsoft Defender for Endpoint on devices that aren't enrolled using Intune mobile device management (MDM), see [Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)](android-configure-mam.md).
7582

7683
> [!NOTE]
7784
> **Microsoft Defender for Endpoint on Android is available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx) now.**
7885
>
7986
> You can connect to Google Play from Intune to deploy Microsoft Defender for Endpoint app, across Device Administrator and Android Enterprise enrollment modes.
8087
81-
### Required Permissions
88+
### Required permissions
8289

8390
To ensure optimal protection for your device, Microsoft Defender requests access to the following permissions during the device onboarding process:
8491

@@ -90,18 +97,34 @@ To ensure optimal protection for your device, Microsoft Defender requests access
9097

9198
- **Accessibility**: This feature enhances your browsing experience by providing added security.
9299

93-
- **Permanent Protection**: To ensure continuous protection, Microsoft Defender recommends staying active while running in the background. This helps prevent Android from stopping the app to improve battery life, thereby ensuring your device remains well-protected.
100+
- **Permanent Protection**: To ensure continuous protection, Microsoft recommends keeping the Microsoft Defender app active while running in the background. This helps prevent Android from stopping the app to improve battery life, thereby ensuring your device remains well protected.
101+
102+
- **Location Access**: The Microsoft Defender app uses your location to help secure your Wi-Fi network and enhance device protection.
103+
104+
#### How to resolve the noncompliance state due to silent auth failures
94105

95-
- **Location Access**: Microsoft Defender uses your location to help secure your Wi-Fi network and enhance device protection.
106+
Microsoft Defender for Endpoint has a feature to let the user sign-in according to a set of policies called [Conditional Access policies](/defender-endpoint/configure-conditional-access). If a policy is violated, the Microsoft Defender app autosigns out and starts failing in silent auth (sign-in attempts in background). This process results in the devices being shown as non-compliant in the Intune portal. A user can get the device to compliant status by signing in again.
96107

97-
## How to Configure Microsoft Defender for Endpoint on Android
108+
The user receives a notification (as shown in the following scenarios) asking them to sign in. The user can tap the notification or open the Microsoft Defender app and sign in. Signing in results in a successful, interactive authentication and causes the Intune portal to show the device as compliant.
98109

99-
Guidance on how to configure Microsoft Defender for Endpoint on Android features is available in [Configure Microsoft Defender for Endpoint on Android features](android-configure.md).
110+
**Scenario 1:** The following experience occurs when MFA is configured by the admin through a Conditional Access policy:
111+
112+
:::image type="content" source="media/ca-policy-user-flow.png" alt-text="Series of images showing the user flow when a Conditional Access policy is configured by the security team." lightbox="media/ca-policy-user-flow.png":::
113+
114+
**Scenario 2:** The following experience occurs when **MFA is not configured** by the admin through a Conditional Access policy:
115+
116+
:::image type="content" source="media/mfa-not-cong-user-flow.png" alt-text="Screenshot showing the user flow when MFA is not configured by your security team." lightbox="media/mfa-not-cong-user-flow.png":::
117+
118+
## How to configure Microsoft Defender for Endpoint on Android
119+
120+
For information on how to configure Defender for Endpoint on Android features, see [Configure Microsoft Defender for Endpoint on Android features](android-configure.md).
100121

101122
## Related articles
102123

103124
- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
125+
104126
- [Configure Microsoft Defender for Endpoint on Android features](android-configure.md)
127+
105128
- [Mobile Application Management (MAM) basics](/mem/intune/apps/app-management#mobile-application-management-mam-basics)
106129

107130
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)