You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -252,7 +252,7 @@ The device configuration profile is now assigned to the selected user group.
252
252
253
253
Administrators can configure Microsoft Defender for Endpoint in low-touch onboarding mode. In this scenario, administrators creates a deployment profile, and the user is required to provide a reduced set of permissions to complete onboarding. Android low-touch onboarding is disabled by default. Administrators can enable it through app configuration policies on Intune by following these steps:
254
254
255
-
1. Push the Defender app to target user group by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
255
+
1. Push the Microsoft Defender app to target user groups by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
256
256
257
257
2. Push a VPN profile to the user's device by following the instructions in the section, [Auto Setup of Always-on VPN](#auto-setup-of-always-on-vpn) (in this article).
258
258
@@ -272,22 +272,24 @@ Administrators can configure Microsoft Defender for Endpoint in low-touch onboar
272
272
273
273
7. Select **Low touch onboarding and User UPN**. For User UPN, change the value type to `Variable`, and set the configuration value to `User Principal Name`. Enable low-touch onboarding by changing its configuration value to `1`.
274
274
275
-
> [!NOTE]
276
-
> Once the policy is created, these value types will show as string.
275
+
After the policy is created, these value types show up as string values.
277
276
278
277
8. Assign the policy to the target user group.
279
278
280
279
9. Review and create the policy.
281
280
282
-
## Set up Microsoft Defender in Personal Profile on Android Enterprise in BYOD mode
281
+
## Set up Microsoft Defender in personal profile on Android Enterprise in BYOD mode
283
282
284
-
### Set up Microsoft Defender in Personal Profile
283
+
### Set up Microsoft Defender in personal profile
285
284
286
-
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
285
+
Administrators can use the [Microsoft Intune admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
287
286
288
-
1. Go to **Apps> App configuration policies** and select on**Add**. Select **Managed Devices**.
287
+
1. Go to **Apps** > **App configuration policies**, and then select**Add**. Select **Managed Devices**.
289
288
290
-
2. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
289
+
- Specify a name and description to uniquely identify the configuration policy.
290
+
- For **Platform**, select platform as **Android Enterprise**
291
+
- For **Profile type**, select **Personally-owned work profile only**
292
+
- For **Targeted app**, select **Microsoft Defender**.
291
293
292
294
3. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and select **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
0 commit comments