Skip to content

Commit 4a19a69

Browse files
authored
Update ios-configure-features.md
1 parent 4bb8696 commit 4a19a69

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

defender-endpoint/ios-configure-features.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 05/15/2025
17+
ms.date: 05/19/2025
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -123,7 +123,7 @@ To set up network protection using MDM configuration for enrolled devices, follo
123123

124124
:::image type="content" source="media/np-mdmconfig-key.png" alt-text="Screenshot that shows the mdm configuration policy." lightbox="media/np-mdmconfig-key.png":::
125125

126-
1. For other configurations related to network protection, add the following keys, choose the corresponding value type and value.
126+
6. For other configurations related to network protection, add the following keys, choose the corresponding value type and value.
127127

128128
| Key | Value Type | Default (true-enable, false-disable) | Description |
129129
| --- | --- | --- | --- |
@@ -152,13 +152,13 @@ Use the following procedure to set up MAM config for unenrolled devices for netw
152152

153153
:::image type="content" source="media/addiosconfigvalue.png" alt-text="Add configuration value." lightbox="media/addiosconfigvalue.png":::
154154

155-
1. For other configurations related to network protection, add the following keys and appropriate corresponding value.
155+
4. For other configurations related to network protection, add the following keys and appropriate corresponding value.
156156

157157
|Key| Default (true - enable, false - disable)|Description|
158158
|---|---|---|
159159
|`DefenderOpenNetworkDetection`|2| 1 - Audit; 0 - Disable; 2 - Enable (default). This setting is managed by an IT admin to enable, audit, or disable open network detection. In Audit mode, events are sent only to the ATP portal with no user side experience. For user experience, set the config to "Enable" mode.|
160160
|`DefenderEndUserTrustFlowEnable`| false | true - enable; false - disable. This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks.|
161-
|`DefenderNetworkProtectionAutoRemediation`| true |true - enable; false - disable. This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WI-FI access points. This setting is only applied to alerts and not the device timeline events. So, this is not applicable to open Wi-Fi detection.|
161+
|`DefenderNetworkProtectionAutoRemediation`| true |true - enable; false - disable. This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points. This setting is only applied to alerts and not the device timeline events. So, this is not applicable to open Wi-Fi detection.|
162162
|`DefenderNetworkProtectionPrivacy`| true |true - enable; false - disable. This setting is managed by IT admin to enable or disable privacy in network protection. If privacy is disabled, then user consent to share the malicious wifi is shown. If privacy is enabled, then no user consent is shown and no app data is collected. |
163163

164164
5. In the **Assignments** section, an admin can choose groups of users to include and exclude from the policy.
@@ -174,6 +174,7 @@ Use the following procedure to set up MAM config for unenrolled devices for netw
174174
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.</br>
175175
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including to user trusted networks, are sent to the device timeline as events.</br>
176176
> - This change doesn't impact GCC customers. The previous experience of receiving alerts while connecting to open wireless networks still apply to them.
177+
177178
## Coexistence of multiple VPN profiles
178179

179180
Apple iOS doesn't support multiple device-wide VPNs to be active simultaneously. While multiple VPN profiles can exist on the device, only one VPN can be active at a time.
@@ -338,7 +339,7 @@ Defender for Endpoint on iOS supports vulnerability assessments of OS and apps.
338339

339340
2. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** \> **Microsoft Defender for Endpoint** \> **Enable App sync for iOS/iPadOS devices**.
340341

341-
:::image type="content" source="media/tvm-app-sync-toggle.png" alt-text="App sync toggleSup" lightbox="media/tvm-app-sync-toggle.png":::
342+
:::image type="content" source="media/tvm-app-sync-toggle.png" alt-text="App sync toggleSup" lightbox="media/tvm-app-sync-toggle.png":::
342343

343344
> [!NOTE]
344345
> To get the list of all the apps including unmanaged apps, the admin has to enable **Send full application inventory data on personally owned iOS/iPadOS devices** setting in the Intune Admin Portal for the supervised devices marked as "Personal".

0 commit comments

Comments
 (0)