You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+27-24Lines changed: 27 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- mde-android
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
-
ms.date: 08/08/2024
17
+
ms.date: 08/26/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -44,27 +44,27 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
44
44
45
45
-**Validate that the Microsoft Defender for Endpoint-Intune connector is enabled**.
46
46
47
-
a. Go to security.microsoft.com.
47
+
1. Go to security.microsoft.com.
48
48
49
-
b. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
49
+
1. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
50
50
51
-
c. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
51
+
1. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
52
52
53
53
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Advanced features section in the Microsoft Defender portal." lightbox="media/enable-intune-connection.png":::
54
54
55
-
d. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
55
+
1. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
56
56
57
57
:::image type="content" source="media/validate-intune-connector.png" alt-text="The intune-connector status pane in the Microsoft Defender portal." lightbox="media/validate-intune-connector.png":::
58
58
59
59
-**Enable Microsoft Defender for Endpoint on Android Connector for App Protection Policy (APP)**.
60
60
61
61
Configure the connector on Microsoft Intune for App protection policies:
62
62
63
-
a. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
63
+
1. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
64
64
65
-
b. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
65
+
1. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
66
66
67
-
c. Select **Save**.
67
+
1. Select **Save**.
68
68
69
69
:::image type="content" source="media/app-settings.png" alt-text="The application settings pane in the Microsoft Defender portal." lightbox="media/app-settings.png":::
70
70
@@ -82,13 +82,13 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
82
82
83
83
2. Add apps.
84
84
85
-
a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
85
+
1. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
86
86
87
87
Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
88
88
89
89
Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
90
90
91
-
b. Select Apps.
91
+
1. Select Apps.
92
92
93
93
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
94
94
@@ -106,7 +106,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
106
106
107
107
Select **Included groups**. Then add the relevant groups.
108
108
109
-
:::image type="content" source="media/assignment.png" alt-text="The Included groups pane in the Microsoft Defender portal." lightbox="media/assignment.png":::
109
+
:::image type="content" source="media/assignment.png" alt-text="The Included groups pane in the Microsoft Defender portal." lightbox="media/assignment.png":::
110
110
111
111
> [!NOTE]
112
112
> If a config policy is to be targeted at unenrolled devices (MAM), the recommendation is to deploy the general app configuration settings in Managed Apps instead of using Managed Devices.
@@ -130,7 +130,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
130
130
131
131
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
132
132
133
-
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
133
+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134
134
135
135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136
136
@@ -149,14 +149,14 @@ Web protection helps to secure devices against web threats and protect users fro
149
149
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
150
150
151
151
4. In the **Settings** page, under the **General Configuration Settings**, add the following keys and set their value as required.
152
-
-**antiphishing**
153
-
-**vpn**
152
+
-**antiphishing**
153
+
-**vpn**
154
154
155
155
To disable web protection, enter 0 for the antiphishing and VPN values.
156
156
157
157
To disable only the use of VPN by web protection, enter these values:
158
-
- 0 for vpn
159
-
- 1 for antiphishing
158
+
- 0 for vpn
159
+
- 1 for antiphishing
160
160
161
161
Add **DefenderMAMConfigs** key and set the value as 1.
162
162
@@ -170,22 +170,24 @@ Web protection helps to secure devices against web threats and protect users fro
170
170
171
171
2. Provide a name and description to uniquely identify the policy. Target the policy to **'Selected apps'** and search for **'Microsoft Defender Endpoint for Android'**. Click the entry and then click **Select** and then **Next**.
172
172
173
-
3. Add the key and value from the following table. Ensure that the **"DefenderMAMConfigs"** key is present in every policy that you create using Managed Apps route. For Managed Devices route, this key shouldn't exist. When you're done, click **Next**.
173
+
1. Add the key and value from the following table. Ensure that the **"DefenderMAMConfigs"** key is present in every policy that you create using Managed Apps route. For Managed Devices route, this key shouldn't exist. When you're done, click **Next**.
174
174
175
-
| Key | Value Type | Default (true-enable, false-disable) | Description |
175
+
| Key | Value Type | Default (1-enable, 0-disable) | Description |
176
176
| --- | --- | --- | --- |
177
-
|`DefenderNetworkProtectionEnable`| Integer |0| 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the network protection capabilities in the defender app.|
177
+
|`DefenderNetworkProtectionEnable`| Integer |1| 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the network protection capabilities in the defender app.|
178
178
|`DefenderAllowlistedCACertificates`| String | None | None-Disable; This setting is used by IT admins to establish trust for root CA and self-signed certificates.|
179
179
|`DefenderCertificateDetection`|Integer| 0 |2-Enable, 1 - Audit mode, 0 - Disable; When this feature is enabled with value as 2, end user notifications are sent to the user when Defender detects a bad certificate. Alerts are also sent to SOC Admins. In audit mode (1), notification alerts are sent to SOC admins, but no end user notifications are displayed to the user when Defender detects a bad certificate. Admins can disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. |
180
-
|`DefenderOpenNetworkDetection`| Integer |0|2-Enable, 1 - Audit mode, 0 - Disable; This setting is used by IT Admins to enable or disable open network detection. By default, the open network detection is disabled with value as 0 and defender does not send end user notifications or alerts to SOC admins in security portal. If switched to audit mode with value 1, notification alert is sent to SOC admin, but no end user notification is displayed to the user when defender detects an open network. If it's enabled with value 2, then end user notification is displayed and also alerts to SOC admins is sent.|
180
+
|`DefenderOpenNetworkDetection`| Integer |2|2-Enable, 1 - Audit mode, 0 - Disable; This setting is used by IT Admins to enable or disable open network detection. If switched to audit mode with value 1, notification alert is sent to SOC admin, but no end user notification is displayed to the user when defender detects an open network. If it's enabled with value 2, then end user notification is displayed and also alerts to SOC admins is sent.|
181
181
|`DefenderEndUserTrustFlowEnable`| Integer | 0 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
182
182
|`DefenderNetworkProtectionAutoRemediation`| Integer | 1 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points or deleting suspicious certificates detected by Defender. |
183
183
|`DefenderNetworkProtectionPrivacy`| Integer | 1 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable privacy in network protection. If privacy is disabled with value 0, then user consent is shown to share the malicious wifi or certs data. If its in enabled state with value 1, then no user consent is shown and no app data is collected.|
184
-
184
+
185
185
4. Include or exclude the groups you want the policy to apply to. Proceed to review and submit the policy.
186
186
187
187
> [!NOTE]
188
-
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WiFi-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
188
+
> - The other config keys of Network Protection will only work if the parent key 'DefenderNetworkProtectionEnable' is enabled.
189
+
> - Users need to enable location permission (which is an optional permission) and need to grant “Allow All the Time” permission to ensure protection against Wi-Fi threat, even when the app is not actively in use. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
190
+
189
191
190
192
## Configure privacy controls
191
193
@@ -252,12 +254,12 @@ Use the following steps to configure the Disable sign out:
252
254
2. Provide the policy a **name**.
253
255
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
254
256
4. In the **Settings** page, under the **General Configuration Settings**, add **DisableSignOut** as the key and set the value as 1.
257
+
255
258
- By default, Disable Sign Out = 0.
256
259
- Admin needs to make Disable Sign Out = 1 to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed to the device.
260
+
257
261
5. Select **Next** and assign this profile to targeted devices and users.
258
262
259
-
> [!IMPORTANT]
260
-
> This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
261
263
262
264
## Device Tagging
263
265
@@ -269,6 +271,7 @@ Use the following steps to configure the Device tags:
269
271
2. Provide the policy a **name**.
270
272
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
271
273
4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
274
+
272
275
- Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
273
276
- Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
274
277
- Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
0 commit comments