Skip to content

Commit 52e2d7b

Browse files
committed
Update android-whatsnew.md
1 parent 2f15081 commit 52e2d7b

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

defender-endpoint/android-whatsnew.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This configuration is available for both the enrolled (MDM) devices and unenroll
4242

4343
## Microsoft Defender for Endpoint on Company-owned personally enabled devices
4444

45-
MDE is now generally available on AE COPE devices. Enterprises can onboard devices on COPE mode and push MDE to user's devices through the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). With this support, Android Enterprise COPE devices get the full capabilities of our offering on Android, including:
45+
Defender for Endpoint is now generally available on AE COPE devices. Enterprises can onboard devices on COPE mode and push Defender for Endpoint to user's devices through the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). With this support, Android Enterprise COPE devices get the full capabilities of our offering on Android, including:
4646

4747
- Phishing and web protection.
4848
- Malware scanning.
@@ -57,7 +57,7 @@ Microsoft Defender for Endpoint on Android enables Privacy Controls for both the
5757

5858
## Optional Permissions and Disable Web Protection
5959

60-
Microsoft Defender for Endpoint on Android enables **Optional Permissions** in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on devices without enforcing the mandatory **VPN** and **Accessibility** permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for unenrolled devices (MAM). For more information, see [optional permissions](android-configure-mam.md#optional-permissions).
60+
Microsoft Defender for Endpoint on Android enables **Optional Permissions** in the onboarding flow. Currently the permissions required by Defender for Endpoint are mandatory in the onboarding flow. With this feature, admin can deploy Defender for Endpoint on devices without enforcing the mandatory **VPN** and **Accessibility** permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for unenrolled devices (MAM). For more information, see [optional permissions](android-configure-mam.md#optional-permissions).
6161

6262
## Microsoft Defender on Android enterprise BYOD personal profile
6363

@@ -70,10 +70,13 @@ Microsoft Defender is no longer supported for versions 1.0.3011.0302 or earlier.
7070

7171
To update, users can use the following steps:
7272

73-
> 1. On your work profile, go to Managed Play Store.
74-
> 2. Tap on the profile icon on the top right corner and select "Manage apps and device".
75-
> 3. Locate MDE under updates available and select update.
76-
> If you encounter any issues, [submit in-app feedback](android-support-signin.md#send-in-app-feedback).
73+
1. On your work profile, go to Managed Play Store.
74+
75+
2. Tap on the profile icon on the top right corner and select **Manage apps and device**.
76+
77+
3. Locate Defender for Endpoint under updates available and select **Update**.
78+
79+
If you encounter any issues, [submit in-app feedback](android-support-signin.md#send-in-app-feedback).
7780

7881
## Microsoft Defender for Endpoint is now Microsoft Defender in the Play store
7982

@@ -85,19 +88,19 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
8588

8689
## Upcoming permission changes for Microsoft Defender for Endpoint running Android 11 or later (Nov 2021)
8790

88-
Release Build: 1.0.3501.0301
91+
Release Build: `1.0.3501.0301`
8992
Release month: Nov 2021
9093
Microsoft Defender for Endpoint has released this update required by [Google](https://developer.android.com/distribute/play-policies#APILevel30) to upgrade to Android API 30. This change prompts users seeking access to [new storage permission](https://developer.android.com/training/data-storage/manage-all-files#all-files-access-google-play), for devices running Android 11 or later. Users need to accept this new storage permission once they update Defender app with the release build 1.0.3501.0301 or later. This update ensures that Defender for Endpoint's app security feature to function without any disruption. For more information, review the following sections.
9194

9295
**How will this affect your organization:** These changes take effect if you're using Microsoft Defender for Endpoint on devices running Android 11 or later and updated Defender for Endpoint to release build 1.0.3501.0301 or later.
9396

9497
> [!NOTE]
95-
> The new storage permissions cannot be configured by admin to 'Auto Approve' through Microsoft Intune. User will need to take action to provide access to this permission.
98+
> The new storage permissions cannot be configured by admin to auto approve through Microsoft Intune. User will need to take action to provide access to this permission.
9699
97-
- **User experience:** Users receive a notification indicating a missing permission for app security. If the user denies this permission, the 'App security' functionality is turned off on the device. If user doesn't accept or deny permission, they'll continue to receive the prompt when unlocking their device or opening the app, until it has been approved.
100+
- **User experience:** Users receive a notification indicating a missing permission for app security. If the user denies this permission, app security functionality is turned off on the device. If user doesn't accept or deny permission, they continue to receive the prompt when unlocking their device or opening the app, until it has been approved.
98101

99102
> [!NOTE]
100-
> If your organization is previewing 'Tamper protection' feature and if the new storage permissions are not granted by the user within 7 days of updating to the latest version, the user might lose access to corporate resources.
103+
> If your organization is previewing the tamper protection feature and if the new storage permissions are not granted by the user within 7 days of updating to the latest version, the user might lose access to corporate resources.
101104
102105
**What you need to do to prepare:**
103106

0 commit comments

Comments
 (0)