Skip to content

Commit 4c26933

Browse files
committed
Correct indentation of second-level list items
The build only applies the correct hanging indentation to second-level list items when they rely on automatic numbering (1, 1, 1). Typing a, b, c in Markdown does not work correctly.
1 parent 970e2af commit 4c26933

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -44,27 +44,27 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
4444

4545
- **Validate that the Microsoft Defender for Endpoint-Intune connector is enabled**.
4646

47-
a. Go to security.microsoft.com.
47+
1. Go to security.microsoft.com.
4848

49-
b. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
49+
1. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
5050

51-
c. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
51+
1. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
5252

5353
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Advanced features section in the Microsoft Defender portal." lightbox="media/enable-intune-connection.png":::
5454

55-
d. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
55+
1. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
5656

5757
:::image type="content" source="media/validate-intune-connector.png" alt-text="The intune-connector status pane in the Microsoft Defender portal." lightbox="media/validate-intune-connector.png":::
5858

5959
- **Enable Microsoft Defender for Endpoint on Android Connector for App Protection Policy (APP)**.
6060

6161
Configure the connector on Microsoft Intune for App protection policies:
6262

63-
a. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
63+
1. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
6464

65-
b. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
65+
1. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
6666

67-
c. Select **Save**.
67+
1. Select **Save**.
6868

6969
:::image type="content" source="media/app-settings.png" alt-text="The application settings pane in the Microsoft Defender portal." lightbox="media/app-settings.png":::
7070

@@ -82,13 +82,13 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
8282

8383
2. Add apps.
8484

85-
a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
85+
1. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
8686

8787
Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
8888

8989
Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
9090

91-
b. Select Apps.
91+
1. Select Apps.
9292

9393
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
9494

0 commit comments

Comments
 (0)