Skip to content

Commit 4c52e02

Browse files
committed
Learn Editor: Update microsoft-defender-endpoint-ios.md
1 parent 58fb618 commit 4c52e02

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,12 @@ ms.date: 03/21/2025
4444

4545
Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358).
4646

47-
> [!NOTE]
48-
> Apple doesn't allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
49-
50-
Devices are registered with Microsoft Entra ID. This configuration requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
47+
> [!NOTE]
48+
> Apple doesn't allow redirecting users to download other apps (Compaby Portal/Authenticator) from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
49+
> Due to platform restrictions on iOS, MDE app allows end-users to onboard to MDE app without the device being registered. This results in MDE protections being enabled, but device will not be visible on security portal. For enrolled scenarios (MDM), Company Portal app or Authenticator app are responsible for device registration during enrollment, and for unenrolled scenarios (MAM) this is done via authenticator app. 
50+
> If a user has a valid MDE license and is registered in the Authenticator App or Company Portal App, and signs in to the Defender App, the device appears in the Defender Portal.
51+
52+
Devices are registered with Microsoft Entra ID. This configuration requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
5153

5254
- **For unenrolled devices**: Devices are registered with Microsoft Entra ID. This requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
5355

@@ -90,9 +92,6 @@ Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft I
9092
- For information on deploying on enrolled devices through Microsoft Configuration Manager or Intune, see [Deploy Microsoft Defender for Endpoint on iOS](ios-install.md).
9193
- For information on using Defender for Endpoint in app protection policy (MAM), see [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)
9294

93-
> [!NOTE]
94-
> If a user has a valid MDE license and is registered in the Authenticator App or Company Portal App, and signs in to the Defender App, the device appears in the Defender Portal.
95-
9695
## Resources
9796

9897
- Stay informed about upcoming releases by visiting [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md) or our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).

0 commit comments

Comments
 (0)