You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+28-30Lines changed: 28 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ Learn how to deploy Defender for Endpoint on Android by using the Microsoft Intu
71
71
72
72
5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation completed successfully.
73
73
74
-
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender 365 portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
74
+
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
75
75
76
76
### Complete onboarding and check status
77
77
@@ -111,7 +111,7 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
111
111
112
112
4. When you're prompted to approve permissions for Defender for Endpoint obtains, review the information, and then select **Approve**.
113
113
114
-
:::image type="content" source="media/206b3d954f06cc58b3466fb7a0bd9f74.png" alt-text="The permissions approval page in the Microsoft Defender 365 portal" lightbox="media/206b3d954f06cc58b3466fb7a0bd9f74.png":::
114
+
:::image type="content" source="media/206b3d954f06cc58b3466fb7a0bd9f74.png" alt-text="The permissions approval page in the Microsoft Defender portal" lightbox="media/206b3d954f06cc58b3466fb7a0bd9f74.png":::
115
115
116
116
5. On the **Approval settings** page, review your preference to handle new app permissions that Defender for Endpoint on Android might ask. Review the choices, and then select your preferred option. Then, select **Done**.
117
117
@@ -121,23 +121,23 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
121
121
122
122
6. After the permissions handling selection is made, select **Sync** to sync Microsoft Defender for Endpoint to your apps list.
123
123
124
-
:::image type="content" source="media/34e6b9a0dae125d085c84593140180ed.png" alt-text="The Sync pane in the Microsoft Defender 365 portal" lightbox="media/34e6b9a0dae125d085c84593140180ed.png":::
124
+
:::image type="content" source="media/34e6b9a0dae125d085c84593140180ed.png" alt-text="The Sync pane in the Microsoft Defender portal" lightbox="media/34e6b9a0dae125d085c84593140180ed.png":::
125
125
126
-
7. The sync completes in a few minutes.
126
+
The sync completes in a few minutes.
127
127
128
-
:::image type="content" source="media/9fc07ffc150171f169dc6e57fe6f1c74.png" alt-text="The application sync status pane in the Android apps page in the Microsoft Defender 365 portal" lightbox="media/9fc07ffc150171f169dc6e57fe6f1c74.png":::
128
+
:::image type="content" source="media/9fc07ffc150171f169dc6e57fe6f1c74.png" alt-text="The application sync status pane in the Android apps page in the Microsoft Defender portal" lightbox="media/9fc07ffc150171f169dc6e57fe6f1c74.png":::
129
129
130
-
8. Select the **Refresh** button in the Android apps screen and Microsoft Defender for Endpoint should be visible in the apps list.
130
+
7. Select the **Refresh** button in the Android apps screen. Microsoft Defender for Endpoint should be visible in the apps list.
131
131
132
132
:::image type="content" source="media/fa4ac18a6333335db3775630b8e6b353.png" alt-text="The page displaying the synced application" lightbox="media/fa4ac18a6333335db3775630b8e6b353.png":::
133
133
134
-
9. Defender for Endpoint supports App configuration policies for managed devices via Microsoft Intune. This capability can be used to select different configurations for Defender for Endpoint.
134
+
8. Defender for Endpoint supports app configuration policies for managed devices using Microsoft Intune. This capability can be used to select different configurations for Defender for Endpoint.
135
135
136
136
1. In the **Apps** page, go to **Policy** > **App configuration policies** > **Add** > **Managed devices**.
137
137
138
138
:::image type="content" source="media/android-mem.png" alt-text="The App configuration policies pane in the Microsoft Intune admin center portal" lightbox="media/android-mem.png":::
139
139
140
-
2. In the **Create app configuration policy** page, enter the following details:
140
+
2. In the **Create app configuration policy** page, specify the following details:
141
141
142
142
- Name: **Microsoft Defender for Endpoint**.
143
143
- Choose **Android Enterprise** as platform.
@@ -154,39 +154,39 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
154
154
-**Auto grant** - Automatically approves without notifying the user.
155
155
-**Auto deny** - Automatically denies without notifying the user.
156
156
157
-
5. Go to the **Configuration settings** section and choose **'Use configuration designer'** in Configuration settings format.
157
+
5. Go to the **Configuration settings** section, and choose **Use configuration designer**.
6. Select **Add** to view a list of supported configurations. Select the required configuration and select **Ok**.
161
+
6. Select **Add** to view a list of supported configurations. Select the required configuration, and then select **Ok**.
162
162
163
163
:::image type="content" alt-text="Image of selecting configuration policies for android." source="media/selectconfigurations.png" lightbox="media/selectconfigurations.png":::
164
164
165
165
7. You should see all the selected configurations listed. You can change the configuration value as required and then select **Next**.
166
166
167
167
:::image type="content" alt-text="Image of selected configuration policies." source="media/listedconfigurations.png" lightbox="media/listedconfigurations.png":::
168
168
169
-
8. In the **Assignments** page, select the user group to which this app config policy would be assigned. Select **Select groups to include** and selecting the applicable group and then selecting**Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
169
+
8. In the **Assignments** page, select the user group to which this app config policy would be assigned. Select **Select groups to include**, select a group, and then select**Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
170
170
171
171
:::image type="content" source="media/android-select-group.png" alt-text="The Selected groups pane" lightbox="media/android-select-group.png":::
172
172
173
-
9. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
173
+
9. In the **Review + Create** page that comes up next, review all the information, and then select **Create**.
174
174
175
175
The app configuration policy for Defender for Endpoint is now assigned to the selected user group.
176
176
177
-
10. Select **Microsoft Defender** app in the list \>**Properties**\>**Assignments**\>**Edit**.
177
+
9. Select **Microsoft Defender** app in the list \>**Properties**\>**Assignments**\>**Edit**.
178
178
179
179
:::image type="content" source="media/mda-properties.png" alt-text="The Edit option on the Properties page" lightbox="media/mda-properties.png":::
180
180
181
-
11. Assign the app as a *Required* app to a user group. It's automatically installed in the *work profile* during the next sync of the device via Company Portal app. This assignment can be done by navigating to the *Required* section\>**Add group**, selecting the appropriate user group, and then choosing**Select**.
181
+
10. Assign the app as a required app to a user group. It's automatically installed in the work profile during the next sync of the device via Company Portal app. Navigate to the **Required** section, select**Add group**, select the appropriate user group, and then choose**Select**.
12. In the **Edit Application** page, review all the information that was entered earlier. Then select **Review + Save** and then **Save** again to commence assignment.
185
+
11. In the **Edit Application** page, review all the information that was specified earlier. Select **Review + Save**, and then select **Save** to commence assignment.
186
186
187
-
### Auto Setup of Always-on VPN
187
+
### Auto setup of always-on VPN
188
188
189
-
Defender for Endpoint supports Device configuration policies for managed devices via Microsoft Intune. This capability can be used to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user doesn't need to set up VPN service while onboarding.
189
+
Defender for Endpoint supports device configuration policies for managed devices with Microsoft Intune. This capability enables you to use auto setup of always-on VPN on Android Enterprise enrolled devices, so the end user doesn't need to set up a VPN service while onboarding.
190
190
191
191
1. On **Devices**, select **Configuration Profiles**\>**Create Profile**\>**Platform**\>**Android Enterprise**. Select **Device restrictions** under one of the following, based on your device enrollment type:
192
192
@@ -201,22 +201,22 @@ Defender for Endpoint supports Device configuration policies for managed devices
201
201
202
202
:::image type="content" source="media/2autosetupofvpn.png" alt-text="The devices configuration profile Name and Description fields in the Basics pane" lightbox="media/2autosetupofvpn.png":::
203
203
204
-
3. Select **Connectivity** and configure your VPN:
204
+
3. Select **Connectivity**, and then configure your VPN.
205
205
206
206
1. Enable **Always-on VPN**. Set up a VPN client in the work profile to automatically connect and reconnect to the VPN whenever possible. Only one VPN client can be configured for always-on VPN on a given device, so be sure to have no more than one always-on VPN policy deployed to a single device.
207
207
208
-
2.Select **Custom** in VPN client dropdown list. Custom VPN in this caseis Defender for Endpoint VPN, which is used to provide the Web Protection feature.
208
+
2.In the **VPN client**list, select **Custom**. In this case, the custom VPN is the Defender for Endpoint VPN, which provides Web Protection.
209
209
210
210
> [!NOTE]
211
-
> Microsoft Defender for Endpoint app must be installed on user's device, in order to functioning of auto setup of this VPN.
211
+
> The Microsoft Defender for Endpoint app must be installed on user's device for automatic VPN setup to occur.
212
212
213
-
3.Enter **Package ID** of the Microsoft Defender for Endpoint app in Google Play store. For the [Defender app URL](https://play.google.com/store/apps/details?id=com.microsoft.scmx), the package ID is `com.microsoft.scmx`.
213
+
3.Specify the **Package ID** of the Microsoft Defender for Endpoint app in Google Play store. For the [Microsoft Defender app URL](https://play.google.com/store/apps/details?id=com.microsoft.scmx), the package ID is `com.microsoft.scmx`.
214
214
215
215
4. Set **Lockdown mode** to **Not configured (Default)**.
216
216
217
217
:::image type="content" source="media/3autosetupofvpn.png" alt-text="The Connectivity pane under the Configuration settings tab" lightbox="media/3autosetupofvpn.png":::
218
218
219
-
4.**Assignment**. On the **Assignments** page, select the user group to which this app config policy would be assigned. Choose **Select groups** to include and selecting the applicable group and then select **Next**.
219
+
4.**Assignment**. On the **Assignments** page, select the user group to which this app config policy would be assigned. Choose **Select groups** to include, select the applicable group, and then select **Next**.
220
220
221
221
The group to select is typically the same group to which you would assign Microsoft Defender for Endpoint Android app.
222
222
@@ -229,30 +229,28 @@ The device configuration profile is now assigned to the selected user group.
229
229
230
230
## Check status and complete onboarding
231
231
232
-
1. Confirm the installation status of Microsoft Defender for Endpoint on Android by clicking on the**Device Install Status**. Verify that the device is displayed here.
232
+
1. Confirm the installation status of Microsoft Defender for Endpoint on Android by tapping**Device Install Status**. Verify that the device is displayed here.
233
233
234
234
:::image type="content" source="media/900c0197aa59f9b7abd762ab2b32e80c.png" alt-text="The device installation status pane" lightbox="media/900c0197aa59f9b7abd762ab2b32e80c.png":::
235
235
236
-
2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you're enrolled to the **Personally owned devices with work profile**. If you're enrolled to a **Corporate-owned, fully managed user device**, you have a single profile on the device where you can confirm that Defender for Endpoint is available.
236
+
2. On the device, you can validate the onboarding status by going to the work profile. Confirm that Defender for Endpoint is available, and that you're enrolled using the **Personally owned devices with work profile**. If you're enrolled using a **Corporate-owned, fully managed user device**, you have a single profile on the device where you can confirm that Defender for Endpoint is available.
3. When the app is installed, open the app and accept the permissions and then your onboarding should be successful.
240
+
3. When the app is installed, open the app, and then accept the permissions. Onboarding should successfully complete.
241
241
242
242
:::image type="content" source="media/MDE-new.png" alt-text="Th display of a Microsoft Defender for Endpoint application on a mobile device" lightbox="media/MDE-new.png":::
243
243
244
-
4.At this point, the device is successfully onboarded onto Defender for Endpoint on Android. You can verify this on the [Microsoft Defender portal](https://security.microsoft.com) by navigating to the **Device Inventory** page.
244
+
4.Verify onboarding status in the [Microsoft Defender portal](https://security.microsoft.com). Navigate to **Device inventory** page.
245
245
246
246
:::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="The Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
247
247
248
248
## Configure low-touch onboarding
249
249
250
250
> [!NOTE]
251
-
> Android low touch onboarding is now GA'ed.
251
+
> Android low touch onboarding is now GA.
252
252
253
-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is required to provide a reduced set of permissions to complete onboarding.
254
-
255
-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
253
+
Administrators can configure Microsoft Defender for Endpoint in low-touch onboarding mode. In this scenario, administrators creates a deployment profile, and the user is required to provide a reduced set of permissions to complete onboarding. Android low-touch onboarding is disabled by default. Administrators can enable it through app configuration policies on Intune by following these steps:
256
254
257
255
1. Push the Defender app to target user group by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
0 commit comments