Skip to content

Commit 5ebf60a

Browse files
committed
Additional spacing for consistent layout
1 parent 75e33a3 commit 5ebf60a

File tree

1 file changed

+13
-3
lines changed

1 file changed

+13
-3
lines changed

defender-endpoint/android-configure.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Admin Privacy Controls (MDM) Use the following steps to enable privacy.
132132

133133
4. On the Settings page, select **Use configuration designer** and then select **Add**.
134134

135-
5. Select the required privacy setting -
135+
5. Select the required privacy setting
136136
- Hide URLs in report
137137
- Hide URLs in report for personal profile
138138
- Hide app details in report
@@ -198,8 +198,10 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200200
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
201+
201202
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204+
203205
5. Select **Next** and assign this profile to targeted devices/users.
204206

205207
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
@@ -238,7 +240,9 @@ Use the following steps to turn on privacy for targeted users in the work profil
238240
2. Give the policy a name, **Platform > Android Enterprise**, select the profile type.
239241
3. Select **Microsoft Defender for Endpoint** as the target app.
240242
4. In Settings page, select **Use configuration designer** and add **DefenderExcludeURLInReport** as the key and value type as **Integer**.
241-
- Enter **1 to enable privacy**. The default value is 0.
243+
244+
Enter **1 to enable privacy**. The default value is 0.
245+
242246
5. Select **Next** and assign this profile to targeted devices/users.
243247

244248
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
@@ -277,7 +281,9 @@ Use the following steps to turn on privacy for targeted users in the work profil
277281
2. Give the policy a name, **Platform > Android Enterprise**, select the profile type.
278282
3. Select **Microsoft Defender for Endpoint** as the target app.
279283
4. In Settings page, select **Use configuration designer** and add **DefenderExcludeAppInReport** as the key and value type as **Integer**
280-
- Enter **1 to enable privacy**. The default value is 0.
284+
285+
Enter **1 to enable privacy**. The default value is 0.
286+
281287
5. Select **Next** and assign this profile to targeted devices/users.
282288

283289
Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
@@ -291,8 +297,10 @@ Use the following steps to configure Disable sign-out:
291297
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
292298
3. Select **Microsoft Defender for Endpoint** as the target app.
293299
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
300+
294301
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
295302
- Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed.
303+
296304
5. Select **Next** and assign this profile to targeted devices and users.
297305

298306
> [!IMPORTANT]
@@ -308,6 +316,7 @@ Use the following steps to configure the Device tags:
308316
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
309317
3. Select **Microsoft Defender for Endpoint** as the target app.
310318
4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
319+
311320
- Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
312321
- Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
313322
- Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
@@ -317,6 +326,7 @@ Use the following steps to configure the Device tags:
317326

318327
> [!NOTE]
319328
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
329+
320330
## Related articles
321331

322332
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)

0 commit comments

Comments
 (0)