Skip to content

Commit 0b5f1ee

Browse files
committed
Update android-intune.md
1 parent caafdb6 commit 0b5f1ee

File tree

1 file changed

+28
-30
lines changed

1 file changed

+28
-30
lines changed

defender-endpoint/android-intune.md

Lines changed: 28 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Learn how to deploy Defender for Endpoint on Android by using the Microsoft Intu
7171

7272
5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation completed successfully.
7373

74-
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender 365 portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
74+
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
7575

7676
### Complete onboarding and check status
7777

@@ -111,7 +111,7 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
111111

112112
4. When you're prompted to approve permissions for Defender for Endpoint obtains, review the information, and then select **Approve**.
113113

114-
:::image type="content" source="media/206b3d954f06cc58b3466fb7a0bd9f74.png" alt-text="The permissions approval page in the Microsoft Defender 365 portal" lightbox="media/206b3d954f06cc58b3466fb7a0bd9f74.png":::
114+
:::image type="content" source="media/206b3d954f06cc58b3466fb7a0bd9f74.png" alt-text="The permissions approval page in the Microsoft Defender portal" lightbox="media/206b3d954f06cc58b3466fb7a0bd9f74.png":::
115115

116116
5. On the **Approval settings** page, review your preference to handle new app permissions that Defender for Endpoint on Android might ask. Review the choices, and then select your preferred option. Then, select **Done**.
117117

@@ -121,23 +121,23 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
121121

122122
6. After the permissions handling selection is made, select **Sync** to sync Microsoft Defender for Endpoint to your apps list.
123123

124-
:::image type="content" source="media/34e6b9a0dae125d085c84593140180ed.png" alt-text="The Sync pane in the Microsoft Defender 365 portal" lightbox="media/34e6b9a0dae125d085c84593140180ed.png":::
124+
:::image type="content" source="media/34e6b9a0dae125d085c84593140180ed.png" alt-text="The Sync pane in the Microsoft Defender portal" lightbox="media/34e6b9a0dae125d085c84593140180ed.png":::
125125

126-
7. The sync completes in a few minutes.
126+
The sync completes in a few minutes.
127127

128-
:::image type="content" source="media/9fc07ffc150171f169dc6e57fe6f1c74.png" alt-text="The application sync status pane in the Android apps page in the Microsoft Defender 365 portal" lightbox="media/9fc07ffc150171f169dc6e57fe6f1c74.png":::
128+
:::image type="content" source="media/9fc07ffc150171f169dc6e57fe6f1c74.png" alt-text="The application sync status pane in the Android apps page in the Microsoft Defender portal" lightbox="media/9fc07ffc150171f169dc6e57fe6f1c74.png":::
129129

130-
8. Select the **Refresh** button in the Android apps screen and Microsoft Defender for Endpoint should be visible in the apps list.
130+
7. Select the **Refresh** button in the Android apps screen. Microsoft Defender for Endpoint should be visible in the apps list.
131131

132132
:::image type="content" source="media/fa4ac18a6333335db3775630b8e6b353.png" alt-text="The page displaying the synced application" lightbox="media/fa4ac18a6333335db3775630b8e6b353.png":::
133133

134-
9. Defender for Endpoint supports App configuration policies for managed devices via Microsoft Intune. This capability can be used to select different configurations for Defender for Endpoint.
134+
8. Defender for Endpoint supports app configuration policies for managed devices using Microsoft Intune. This capability can be used to select different configurations for Defender for Endpoint.
135135

136136
1. In the **Apps** page, go to **Policy** > **App configuration policies** > **Add** > **Managed devices**.
137137

138138
:::image type="content" source="media/android-mem.png" alt-text="The App configuration policies pane in the Microsoft Intune admin center portal" lightbox="media/android-mem.png":::
139139

140-
2. In the **Create app configuration policy** page, enter the following details:
140+
2. In the **Create app configuration policy** page, specify the following details:
141141

142142
- Name: **Microsoft Defender for Endpoint**.
143143
- Choose **Android Enterprise** as platform.
@@ -154,39 +154,39 @@ Follow the steps below to add Microsoft Defender for Endpoint app into your mana
154154
- **Auto grant** - Automatically approves without notifying the user.
155155
- **Auto deny** - Automatically denies without notifying the user.
156156

157-
5. Go to the **Configuration settings** section and choose **'Use configuration designer'** in Configuration settings format.
157+
5. Go to the **Configuration settings** section, and choose **Use configuration designer**.
158158

159159
:::image type="content" alt-text="Image of android create app configuration policy." source="media/configurationformat.png" lightbox="media/configurationformat.png":::
160160

161-
6. Select **Add** to view a list of supported configurations. Select the required configuration and select **Ok**.
161+
6. Select **Add** to view a list of supported configurations. Select the required configuration, and then select **Ok**.
162162

163163
:::image type="content" alt-text="Image of selecting configuration policies for android." source="media/selectconfigurations.png" lightbox="media/selectconfigurations.png":::
164164

165165
7. You should see all the selected configurations listed. You can change the configuration value as required and then select **Next**.
166166

167167
:::image type="content" alt-text="Image of selected configuration policies." source="media/listedconfigurations.png" lightbox="media/listedconfigurations.png":::
168168

169-
8. In the **Assignments** page, select the user group to which this app config policy would be assigned. Select **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
169+
8. In the **Assignments** page, select the user group to which this app config policy would be assigned. Select **Select groups to include**, select a group, and then select **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
170170

171171
:::image type="content" source="media/android-select-group.png" alt-text="The Selected groups pane" lightbox="media/android-select-group.png":::
172172

173-
9. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
173+
9. In the **Review + Create** page that comes up next, review all the information, and then select **Create**.
174174

175175
The app configuration policy for Defender for Endpoint is now assigned to the selected user group.
176176

177-
10. Select **Microsoft Defender** app in the list \> **Properties** \> **Assignments** \> **Edit**.
177+
9. Select **Microsoft Defender** app in the list \> **Properties** \> **Assignments** \> **Edit**.
178178

179179
:::image type="content" source="media/mda-properties.png" alt-text="The Edit option on the Properties page" lightbox="media/mda-properties.png":::
180180

181-
11. Assign the app as a *Required* app to a user group. It's automatically installed in the *work profile* during the next sync of the device via Company Portal app. This assignment can be done by navigating to the *Required* section \> **Add group**, selecting the appropriate user group, and then choosing **Select**.
181+
10. Assign the app as a required app to a user group. It's automatically installed in the work profile during the next sync of the device via Company Portal app. Navigate to the **Required** section, select **Add group**, select the appropriate user group, and then choose **Select**.
182182

183183
:::image type="content" source="media/ea06643280075f16265a596fb9a96042.png" alt-text="The Edit application page" lightbox="media/ea06643280075f16265a596fb9a96042.png":::
184184

185-
12. In the **Edit Application** page, review all the information that was entered earlier. Then select **Review + Save** and then **Save** again to commence assignment.
185+
11. In the **Edit Application** page, review all the information that was specified earlier. Select **Review + Save**, and then select **Save** to commence assignment.
186186

187-
### Auto Setup of Always-on VPN
187+
### Auto setup of always-on VPN
188188

189-
Defender for Endpoint supports Device configuration policies for managed devices via Microsoft Intune. This capability can be used to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user doesn't need to set up VPN service while onboarding.
189+
Defender for Endpoint supports device configuration policies for managed devices with Microsoft Intune. This capability enables you to use auto setup of always-on VPN on Android Enterprise enrolled devices, so the end user doesn't need to set up a VPN service while onboarding.
190190

191191
1. On **Devices**, select **Configuration Profiles** \> **Create Profile** \> **Platform** \> **Android Enterprise**. Select **Device restrictions** under one of the following, based on your device enrollment type:
192192

@@ -201,22 +201,22 @@ Defender for Endpoint supports Device configuration policies for managed devices
201201

202202
:::image type="content" source="media/2autosetupofvpn.png" alt-text="The devices configuration profile Name and Description fields in the Basics pane" lightbox="media/2autosetupofvpn.png":::
203203

204-
3. Select **Connectivity** and configure your VPN:
204+
3. Select **Connectivity**, and then configure your VPN.
205205

206206
1. Enable **Always-on VPN**. Set up a VPN client in the work profile to automatically connect and reconnect to the VPN whenever possible. Only one VPN client can be configured for always-on VPN on a given device, so be sure to have no more than one always-on VPN policy deployed to a single device.
207207

208-
2. Select **Custom** in VPN client dropdown list. Custom VPN in this case is Defender for Endpoint VPN, which is used to provide the Web Protection feature.
208+
2. In the **VPN client** list, select **Custom**. In this case, the custom VPN is the Defender for Endpoint VPN, which provides Web Protection.
209209

210210
> [!NOTE]
211-
> Microsoft Defender for Endpoint app must be installed on user's device, in order to functioning of auto setup of this VPN.
211+
> The Microsoft Defender for Endpoint app must be installed on user's device for automatic VPN setup to occur.
212212
213-
3. Enter **Package ID** of the Microsoft Defender for Endpoint app in Google Play store. For the [Defender app URL](https://play.google.com/store/apps/details?id=com.microsoft.scmx), the package ID is `com.microsoft.scmx`.
213+
3. Specify the **Package ID** of the Microsoft Defender for Endpoint app in Google Play store. For the [Microsoft Defender app URL](https://play.google.com/store/apps/details?id=com.microsoft.scmx), the package ID is `com.microsoft.scmx`.
214214

215215
4. Set **Lockdown mode** to **Not configured (Default)**.
216216

217217
:::image type="content" source="media/3autosetupofvpn.png" alt-text="The Connectivity pane under the Configuration settings tab" lightbox="media/3autosetupofvpn.png":::
218218

219-
4. **Assignment**. On the **Assignments** page, select the user group to which this app config policy would be assigned. Choose **Select groups** to include and selecting the applicable group and then select **Next**.
219+
4. **Assignment**. On the **Assignments** page, select the user group to which this app config policy would be assigned. Choose **Select groups** to include, select the applicable group, and then select **Next**.
220220

221221
The group to select is typically the same group to which you would assign Microsoft Defender for Endpoint Android app.
222222

@@ -229,30 +229,28 @@ The device configuration profile is now assigned to the selected user group.
229229

230230
## Check status and complete onboarding
231231

232-
1. Confirm the installation status of Microsoft Defender for Endpoint on Android by clicking on the **Device Install Status**. Verify that the device is displayed here.
232+
1. Confirm the installation status of Microsoft Defender for Endpoint on Android by tapping **Device Install Status**. Verify that the device is displayed here.
233233

234234
:::image type="content" source="media/900c0197aa59f9b7abd762ab2b32e80c.png" alt-text="The device installation status pane" lightbox="media/900c0197aa59f9b7abd762ab2b32e80c.png":::
235235

236-
2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you're enrolled to the **Personally owned devices with work profile**. If you're enrolled to a **Corporate-owned, fully managed user device**, you have a single profile on the device where you can confirm that Defender for Endpoint is available.
236+
2. On the device, you can validate the onboarding status by going to the work profile. Confirm that Defender for Endpoint is available, and that you're enrolled using the **Personally owned devices with work profile**. If you're enrolled using a **Corporate-owned, fully managed user device**, you have a single profile on the device where you can confirm that Defender for Endpoint is available.
237237

238238
:::image type="content" source="media/c2e647fc8fa31c4f2349c76f2497bc0e.png" alt-text="The application display pane" lightbox="media/c2e647fc8fa31c4f2349c76f2497bc0e.png":::
239239

240-
3. When the app is installed, open the app and accept the permissions and then your onboarding should be successful.
240+
3. When the app is installed, open the app, and then accept the permissions. Onboarding should successfully complete.
241241

242242
:::image type="content" source="media/MDE-new.png" alt-text="Th display of a Microsoft Defender for Endpoint application on a mobile device" lightbox="media/MDE-new.png":::
243243

244-
4. At this point, the device is successfully onboarded onto Defender for Endpoint on Android. You can verify this on the [Microsoft Defender portal](https://security.microsoft.com) by navigating to the **Device Inventory** page.
244+
4. Verify onboarding status in the [Microsoft Defender portal](https://security.microsoft.com). Navigate to **Device inventory** page.
245245

246246
:::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="The Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
247247

248248
## Configure low-touch onboarding
249249

250250
> [!NOTE]
251-
> Android low touch onboarding is now GA'ed.
251+
> Android low touch onboarding is now GA.
252252
253-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is required to provide a reduced set of permissions to complete onboarding.
254-
255-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
253+
Administrators can configure Microsoft Defender for Endpoint in low-touch onboarding mode. In this scenario, administrators creates a deployment profile, and the user is required to provide a reduced set of permissions to complete onboarding. Android low-touch onboarding is disabled by default. Administrators can enable it through app configuration policies on Intune by following these steps:
256254

257255
1. Push the Defender app to target user group by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
258256

0 commit comments

Comments
 (0)