You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-new-ux.md
+17-19Lines changed: 17 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
author: emmwalshh
7
7
ms.reviewer: sunasing; denishdonga
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/20/2025
9
+
ms.date: 03/21/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -18,58 +18,56 @@ ms.subservice: ios
18
18
search.appverid: met150
19
19
---
20
20
21
-
# User experiences in Microsoft Defender for Endpoint on iOS
21
+
# User Experiences in Microsoft Defender for Endpoint on iOS
22
22
23
-
As part of our ongoing commitment to delivering an exceptional user experience, we're excited to announce a series of upcoming enhancements to the user interface and overall experience of our **Microsoft Defender for Endpoint (MDE)** mobile app.
23
+
As part of our ongoing commitment to delivering an exceptional user experience, we're excited to announce a series of upcoming enhancements to the user interface and overall experience of our **Microsoft Defender for Endpoint** mobile app.
24
24
25
25
These updates are designed to improve usability, streamline navigation, and ensure that app meets the evolving needs of our users.
26
26
27
-
## Key Changes
27
+
## Key changes
28
28
29
-
We're pleased to introduce the Device Protection feature card for our enterprise users which includes **Web Protection**, **Device Health**, and **Jail break** features are designed to be more user-friendly and accessible.
29
+
We're pleased to introduce the Device Protection feature card for our enterprise users, which includes **Web Protection**, **Device Health**, and **Jail break** features that are designed to be more user-friendly and accessible.
30
30
31
-
The updated cards also include **recommendation cards**, which prominently display any active alerts, keeping you informed. Features are now displayed as tiles on L2 screens to improve user experience and navigation efficiency.
31
+
The updated cards also include **recommendation cards**, which prominently display any active alerts, keeping you informed. Features are now displayed as tiles to improve user experience and navigation efficiency.
32
32
33
33
**The main changes involved are**:
34
34
35
-
1. Main Dashboard changes
36
-
2. List the features inside one Feature Card
37
-
3. Detailed Feature Experience
38
-
4. Recommendation Cards for Alerts
35
+
- Main dashboard changes
36
+
- List the features inside one feature card
37
+
- Detailed features experience
38
+
- Recommendation cards for alerts
39
39
40
40
### Main Dashboard changes
41
41
42
42
The main Dashboard screen that appears for enterprise users as per our latest rollout of enhancements to the application.
43
43
44
44
:::image type="content" source="media/mde-ios-main-dash-new.png" alt-text="Screenshot that shows the Microsoft Defender for Endpoint Mobile Dashboard on iOS devices before the new update." lightbox="media/mde-ios-main-dash-new.png":::
45
45
46
-
### List the features inside one Feature Card
46
+
### List the features inside one feature card
47
47
48
-
We list the feature Web Protection, Device Health, and Jail Break under one feature Card "Device Protection," which earlier had a new card on Dashboard screen for each functionality.
48
+
One feature card called **Device Protection** lists Web Protection, Device Health, and Jail Break. Previously, the dashboard had one card for each set of capabilities. In the new experience, only the Device Protection card changes.
49
49
50
50
:::image type="content" source="media/mde-ios-list-new.png" alt-text="Screenshot that shows the Microsoft Defender for Endpoint Feature Card." lightbox="media/mde-ios-list-new.png":::
51
51
52
52
### Detailed Feature Experience
53
53
54
-
We updated all the subordinating screens associated with the feature
54
+
We updated all the subordinating screens associated with the **Device Protection**feature
55
55
56
56
1.**Web Protection**
57
57
58
-
:::image type="content" source="media/mde-ios-web-protection-new.png" alt-text="Screenshot that shows the web protection feature on the MDE iOS app." lightbox="media/mde-ios-web-protection-new.png":::
58
+
:::image type="content" source="media/mde-ios-web-protection-new.png" alt-text="Screenshot that shows the web protection feature on the Defender for Endpoint on iOS app." lightbox="media/mde-ios-web-protection-new.png":::
59
59
60
60
2.**Device Health**
61
61
62
-
:::image type="content" source="media/mde-device-health-new.png" alt-text="Screenshot that shows the new device health feature on the MDE iOS app." lightbox="media/mde-device-health-new.png":::
62
+
:::image type="content" source="media/mde-device-health-new.png" alt-text="Screenshot that shows the new device health feature on the Defender for Endpoint on iOS app." lightbox="media/mde-device-health-new.png":::
63
63
64
64
### Recommendation Cards for Alerts
65
65
66
-
Hero cards are implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard.
67
-
68
-
**Both the Recommendation Cards are attached to the Device Protection feature card**:
66
+
The structure of the dashboard is updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert brings forward the next one. Recommendation cards are implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard. Here are a few examples:
69
67
70
68
1.**Web Protection**
71
69
72
-
:::image type="content" source="media/mde-ios-web-protection-rec-card.png" alt-text="Screenshot that shows the web protection recommendation card feature on the MDE iOS app." lightbox="media/mde-ios-web-protection-rec-card.png":::
70
+
:::image type="content" source="media/mde-ios-web-protection-rec-card.png" alt-text="Screenshot that shows the web protection recommendation card feature on the Defender for Endpoint on iOS app." lightbox="media/mde-ios-web-protection-rec-card.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-android.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: android
16
16
search.appverid: met150
17
-
ms.date: 02/28/2025
17
+
ms.date: 03/21/2025
18
18
---
19
19
20
20
# Microsoft Defender for Endpoint on Android
@@ -65,7 +65,7 @@ This article describes how to install, configure, update, and use Defender for E
65
65
66
66
**What does it mean devices running on unsupported Android version?**
67
67
68
-
**New users**: The application is longer available for new installations on devices running on unsupported versions. When users with unsupported versions attempt to download the Microsoft Defender app, the Google Play store notifies them that the device is incompatible.
68
+
**New users**: The application is no longer available for new installations on devices running on unsupported versions. When users with unsupported versions attempt to download the Microsoft Defender app, the Google Play store notifies them that the device is incompatible.
69
69
70
70
**Existing users**: The Microsoft Defender app continues to function for existing users on unsupported versions, but they don't receive updates from the Google Play store because they don't meet the minimum SDK version requirements. Therefore, any new updates on the app aren't available to devices running unsupported versions. Microsoft no longer addresses bugs or provides maintenance for unsupported operating system versions. Any issues occurring on devices running on unsupported versions aren't investigated.
71
71
@@ -80,10 +80,12 @@ Microsoft Defender for Endpoint on Android supports installation on both modes o
80
80
81
81
- Installation of Microsoft Defender for Endpoint on devices that aren't enrolled using Intune mobile device management (MDM), see [Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)](android-configure-mam.md).
82
82
83
+
> [!NOTE]
84
+
> If a user has a valid MDE license and is registered in the Authenticator App or Company Portal App, and has signed in to the Defender App, the device appears in the Defender Portal.
85
+
83
86
> [!NOTE]
84
87
> **Microsoft Defender for Endpoint on Android is available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx) now.**
85
-
>
86
-
> You can connect to Google Play from Intune to deploy Microsoft Defender for Endpoint app, across Device Administrator and Android Enterprise enrollment modes.
88
+
> > You can connect to Google Play from Intune to deploy the Microsoft Defender for Endpoint app across Device Administrator and Android Enterprise enrollment modes.
87
89
88
90
### Required permissions
89
91
@@ -103,17 +105,23 @@ To ensure optimal protection for your device, Microsoft Defender requests access
103
105
104
106
#### How to resolve the noncompliance state due to silent auth failures
105
107
106
-
Microsoft Defender for Endpoint has a feature to let the user sign-in according to a set of policies called [Conditional Access policies](/defender-endpoint/configure-conditional-access). If a policy is violated, the Microsoft Defender app autosigns out and starts failing in silent auth (sign-in attempts in background). This process results in the devices being shown as non-compliant in the Intune portal. A user can get the device to compliant status by signing in again.
108
+
- Microsoft Defender for Endpoint has a feature to let the user sign-in according to a set of policies called [Conditional Access policies](/defender-endpoint/configure-conditional-access).
109
+
110
+
- If a policy is violated, the Microsoft Defender app autosigns out and starts failing in silent auth (sign-in attempts in background).
111
+
112
+
- This process results in the devices being shown as noncompliant in the Intune portal. A user can get the device to compliant status by signing in again.
113
+
114
+
- Users receive a notification (as shown in the following scenarios) prompting them to sign in.
107
115
108
-
The user receives a notification (as shown in the following scenarios) asking them to sign in. The user can tap the notification or open the Microsoft Defender app and sign in. Signing in results in a successful, interactive authentication and causes the Intune portal to show the device as compliant.
116
+
- They can tap the notification or open the Microsoft Defender app and sign in, which results in a successful, interactive authentication and causes the Intune portal to show the device as compliant.
109
117
110
118
**Scenario 1:** The following experience occurs when MFA is configured by the admin through a Conditional Access policy:
111
119
112
120
:::image type="content" source="media/ca-policy-user-flow.png" alt-text="Series of images showing the user flow when a Conditional Access policy is configured by the security team." lightbox="media/ca-policy-user-flow.png":::
113
121
114
122
**Scenario 2:** The following experience occurs when **MFA is not configured** by the admin through a Conditional Access policy:
115
123
116
-
:::image type="content" source="media/mfa-not-cong-user-flow.png" alt-text="Screenshot showing the user flow when MFA is not configured by your security team." lightbox="media/mfa-not-cong-user-flow.png":::
124
+
:::image type="content" source="media/mfa-not-cong-user-flow.png" alt-text="Screenshot showing the user flow when MFA isn't configured by your security team." lightbox="media/mfa-not-cong-user-flow.png":::
117
125
118
126
## How to configure Microsoft Defender for Endpoint on Android
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-ios.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Microsoft Defender for Endpoint on iOS
3
3
ms.reviewer:
4
4
description: Describes how to install and use Microsoft Defender for Endpoint on iOS
5
5
ms.service: defender-endpoint
6
-
ms.author: deniseb
7
-
author: denisebmsft
6
+
ms.author: ewalsh
7
+
author: emmwalshh
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
10
10
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: ios
17
17
search.appverid: met150
18
-
ms.date: 02/12/2025
18
+
ms.date: 03/21/2025
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on iOS
@@ -32,7 +32,7 @@ ms.date: 02/12/2025
32
32
**Microsoft Defender for Endpoint on iOS** offers protection against phishing and unsafe network connections from websites, emails, and apps. All alerts are available through a single pane of glass in the Microsoft Defender portal. The portal gives security teams a centralized view of threats on iOS devices along with other platforms.
33
33
34
34
> [!CAUTION]
35
-
> Running other third-party endpoint protection products alongside Defender for Endpoint on iOS is likely to cause performance problems and unpredictable system errors.
35
+
> Running other non-Microsoft endpoint protection products alongside Defender for Endpoint on iOS is likely to cause performance problems and unpredictable system errors.
36
36
37
37
## Prerequisites
38
38
@@ -45,7 +45,7 @@ ms.date: 02/12/2025
45
45
Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358).
46
46
47
47
> [!NOTE]
48
-
> Apple does not allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
48
+
> Apple doesn't allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
49
49
50
50
Devices are registered with Microsoft Entra ID. This configuration requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
51
51
@@ -54,8 +54,8 @@ ms.date: 02/12/2025
54
54
- For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).
55
55
56
56
> [!NOTE]
57
-
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
58
-
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
57
+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it doesn't route traffic through a remote VPN server.
58
+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app isn't opened for seven days, the device might be marked as inactive in the Microsoft Defender Portal.
59
59
60
60
### For Administrators
61
61
@@ -90,6 +90,9 @@ Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft I
90
90
- For information on deploying on enrolled devices through Microsoft Configuration Manager or Intune, see [Deploy Microsoft Defender for Endpoint on iOS](ios-install.md).
91
91
- For information on using Defender for Endpoint in app protection policy (MAM), see [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)
92
92
93
+
> [!NOTE]
94
+
> If a user has a valid MDE license and is registered in the Authenticator App or Company Portal App, and signs in to the Defender App, the device appears in the Defender Portal.
95
+
93
96
## Resources
94
97
95
98
- Stay informed about upcoming releases by visiting [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md) or our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).
0 commit comments