Skip to content

Commit 31bf00f

Browse files
committed
Update android-intune.md
1 parent 0b5f1ee commit 31bf00f

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

defender-endpoint/android-intune.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@ The device configuration profile is now assigned to the selected user group.
252252
253253
Administrators can configure Microsoft Defender for Endpoint in low-touch onboarding mode. In this scenario, administrators creates a deployment profile, and the user is required to provide a reduced set of permissions to complete onboarding. Android low-touch onboarding is disabled by default. Administrators can enable it through app configuration policies on Intune by following these steps:
254254

255-
1. Push the Defender app to target user group by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
255+
1. Push the Microsoft Defender app to target user groups by following the steps in the section, [Add Microsoft Defender for Endpoint on Android as a Managed Google Play app](#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app) (in this article).
256256

257257
2. Push a VPN profile to the user's device by following the instructions in the section, [Auto Setup of Always-on VPN](#auto-setup-of-always-on-vpn) (in this article).
258258

@@ -272,22 +272,24 @@ Administrators can configure Microsoft Defender for Endpoint in low-touch onboar
272272

273273
7. Select **Low touch onboarding and User UPN**. For User UPN, change the value type to `Variable`, and set the configuration value to `User Principal Name`. Enable low-touch onboarding by changing its configuration value to `1`.
274274

275-
> [!NOTE]
276-
> Once the policy is created, these value types will show as string.
275+
After the policy is created, these value types show up as string values.
277276

278277
8. Assign the policy to the target user group.
279278

280279
9. Review and create the policy.
281280

282-
## Set up Microsoft Defender in Personal Profile on Android Enterprise in BYOD mode
281+
## Set up Microsoft Defender in personal profile on Android Enterprise in BYOD mode
283282

284-
### Set up Microsoft Defender in Personal Profile
283+
### Set up Microsoft Defender in personal profile
285284

286-
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
285+
Administrators can use the [Microsoft Intune admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
287286

288-
1. Go to **Apps> App configuration policies** and select on **Add**. Select **Managed Devices**.
287+
1. Go to **Apps** > **App configuration policies**, and then select **Add**. Select **Managed Devices**.
289288

290-
2. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
289+
- Specify a name and description to uniquely identify the configuration policy.
290+
- For **Platform**, select platform as **Android Enterprise**
291+
- For **Profile type**, select **Personally-owned work profile only**
292+
- For **Targeted app**, select **Microsoft Defender**.
291293

292294
3. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and select **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
293295

0 commit comments

Comments
 (0)