Skip to content

Commit 0bc95dc

Browse files
authored
Merge pull request #1646 from denishdonga27/docs-editor/android-configure-1729265956
Update android-configure.md
2 parents 99c7c20 + 2f45e07 commit 0bc95dc

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 08/30/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -197,9 +197,9 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
197197
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200-
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
200+
1. In Settings page, select **Use configuration designer** and add **Enable TVM Privacy** as the key and value type as **Integer**
201201

202-
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202+
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
203203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204204

205205
5. Select **Next** and assign this profile to targeted devices/users.

0 commit comments

Comments
 (0)