Skip to content

Commit 2e445a9

Browse files
authored
Merge pull request #5238 from denishdonga27/docs-editor/android-configure-1760016586
Update android-configure.md
2 parents e1afafb + 437bd75 commit 2e445a9

File tree

1 file changed

+20
-5
lines changed

1 file changed

+20
-5
lines changed

defender-endpoint/android-configure.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -110,11 +110,12 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
110110
> [!IMPORTANT]
111111
> Starting May 19, 2025, alerts are no longer generated in the Microsoft Defender portal for mobile devices connecting or disconnecting to an open wireless network and for downloading/installing/deleting self-signed certificates. Instead, these activities are now generated as events and are viewable in the device timeline.
112112
> Here are key changes about this new experience:
113-
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114-
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115-
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116-
> - Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117-
> - The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
113+
- For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114+
- When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115+
- Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116+
- Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117+
- The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
118+
118119

119120
## Privacy Controls
120121

@@ -127,6 +128,20 @@ Following privacy controls are available for configuring the data that is sent b
127128
|Vulnerability assessment of apps |By default only information about apps installed in the work profile is sent for vulnerability assessment. Admins can disable privacy to include personal apps|
128129
|Network Protection | Admins can enable or disable privacy in network protection. If enabled, then Defender won't send network details.|
129130

131+
## Root Detection (Preview)
132+
133+
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, these events occur:
134+
135+
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136+
137+
- User data on app is cleared. When user opens the app after rooted.
138+
139+
The feature is enabled by default; no action is required from admin or user. Any android device running Defender version **1.0.8125.0302** (or later) will have it activated.
140+
141+
**Prerequisite**
142+
143+
- Company portal must be installed, and version must be >=5.0.6621.0
144+
130145
### Configure privacy alert report
131146

132147
Admins can now enable privacy control for the phishing report, malware report, and network report sent by Microsoft Defender for Endpoint on Android. This configuration ensures that the domain name, app details, and network details, respectively, aren't sent as part of the alert whenever a corresponding threat is detected.

0 commit comments

Comments
 (0)