Skip to content

Commit 51666da

Browse files
committed
Refine indentations
1 parent 4c26933 commit 51666da

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
8888

8989
Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
9090

91-
1. Select Apps.
91+
1. Select Apps.
9292

9393
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
9494

@@ -106,7 +106,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
106106

107107
Select **Included groups**. Then add the relevant groups.
108108

109-
:::image type="content" source="media/assignment.png" alt-text="The Included groups pane in the Microsoft Defender portal." lightbox="media/assignment.png":::
109+
:::image type="content" source="media/assignment.png" alt-text="The Included groups pane in the Microsoft Defender portal." lightbox="media/assignment.png":::
110110

111111
> [!NOTE]
112112
> If a config policy is to be targeted at unenrolled devices (MAM), the recommendation is to deploy the general app configuration settings in Managed Apps instead of using Managed Devices.
@@ -130,7 +130,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
130130

131131
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
132132

133-
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
133+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134134

135135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136136

@@ -149,14 +149,14 @@ Web protection helps to secure devices against web threats and protect users fro
149149
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
150150

151151
4. In the **Settings** page, under the **General Configuration Settings**, add the following keys and set their value as required.
152-
- **antiphishing**
153-
- **vpn**
152+
- **antiphishing**
153+
- **vpn**
154154

155155
To disable web protection, enter 0 for the antiphishing and VPN values.
156156

157157
To disable only the use of VPN by web protection, enter these values:
158-
- 0 for vpn
159-
- 1 for antiphishing
158+
- 0 for vpn
159+
- 1 for antiphishing
160160

161161
Add **DefenderMAMConfigs** key and set the value as 1.
162162

@@ -254,8 +254,10 @@ Use the following steps to configure the Disable sign out:
254254
2. Provide the policy a **name**.
255255
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
256256
4. In the **Settings** page, under the **General Configuration Settings**, add **DisableSignOut** as the key and set the value as 1.
257+
257258
- By default, Disable Sign Out = 0.
258259
- Admin needs to make Disable Sign Out = 1 to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed to the device.
260+
259261
5. Select **Next** and assign this profile to targeted devices and users.
260262

261263

@@ -269,6 +271,7 @@ Use the following steps to configure the Device tags:
269271
2. Provide the policy a **name**.
270272
3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
271273
4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
274+
272275
- Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
273276
- Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
274277
- Admin can delete an existing tag by removing the key **DefenderDeviceTag**.

0 commit comments

Comments
 (0)