Skip to content

Commit 75e33a3

Browse files
committed
Remove unnecessary > [!div class="mx-imgBorder"]
@itsmukta, @denisebmsft You don't need > [!div class="mx-imgBorder"] after you remove the image references that had this.
1 parent 20e7804 commit 75e33a3

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

defender-endpoint/android-configure.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,14 +61,10 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
6161

6262
In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
6363

64-
> [!div class="mx-imgBorder"]
6564
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
6665

67-
> [!div class="mx-imgBorder"]
6866
2. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'0'** to disable Network Protection. (Network protection is enabled by default)
6967

70-
> [!div class="mx-imgBorder"]
71-
> [!div class="mx-imgBorder"]
7268
3. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
7369

7470
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.

0 commit comments

Comments
 (0)