You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The build only applies the correct hanging indentation to second-level list items when they rely on automatic numbering (1, 1, 1). Typing a, b, c in Markdown does not work correctly.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,27 +44,27 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
44
44
45
45
-**Validate that the Microsoft Defender for Endpoint-Intune connector is enabled**.
46
46
47
-
a. Go to security.microsoft.com.
47
+
1. Go to security.microsoft.com.
48
48
49
-
b. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
49
+
1. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
50
50
51
-
c. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
51
+
1. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
52
52
53
53
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Advanced features section in the Microsoft Defender portal." lightbox="media/enable-intune-connection.png":::
54
54
55
-
d. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
55
+
1. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
56
56
57
57
:::image type="content" source="media/validate-intune-connector.png" alt-text="The intune-connector status pane in the Microsoft Defender portal." lightbox="media/validate-intune-connector.png":::
58
58
59
59
-**Enable Microsoft Defender for Endpoint on Android Connector for App Protection Policy (APP)**.
60
60
61
61
Configure the connector on Microsoft Intune for App protection policies:
62
62
63
-
a. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
63
+
1. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
64
64
65
-
b. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
65
+
1. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
66
66
67
-
c. Select **Save**.
67
+
1. Select **Save**.
68
68
69
69
:::image type="content" source="media/app-settings.png" alt-text="The application settings pane in the Microsoft Defender portal." lightbox="media/app-settings.png":::
70
70
@@ -82,13 +82,13 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
82
82
83
83
2. Add apps.
84
84
85
-
a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
85
+
1. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
86
86
87
87
Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
88
88
89
89
Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
90
90
91
-
b. Select Apps.
91
+
1. Select Apps.
92
92
93
93
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
0 commit comments