You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
author: denisebmsft
7
7
ms.reviewer: sunasing
8
8
ms.localizationpriority: medium
9
-
ms.date: 06/12/2024
9
+
ms.date: 12/11/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -30,25 +30,24 @@ search.appverid: met150
30
30
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
31
31
32
32
33
-
## Microsoft Defender now supports iOS/iPadOS 16.x as the minimum version
33
+
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
34
34
35
-
Microsoft Defender will be ending support for iOS/iPadOS 15, as iOS/iPadOS 18 is available since September, and we typically support (n-2) versions. This change will take effect from January 31st, 2025.
35
+
Defender for Endpoint on iOS is ending support for iOS/iPadOS 15, as iOS/iPadOS 18 became available in September 2024. Microsoft typically supports the current version and two previous versions (n-2). This change takes effect beginning on January 31, 2025.
36
36
37
37
**How does this affect you or your users?**
38
38
39
-
New users will not be able to install the Defender app, and existing users will be unable to upgrade to the latest version of the app.
39
+
New users will not be able to install the Microsoft Defender app on devices running iOS/iPadOS 15 and earlier versions. Similarly, existing users won't be to upgrade to the latest version of the app.
40
40
41
-
To check which devices, support iOS 16 or iPadOS 16 (if applicable), see the following Apple documentation:
41
+
To check which devices support iOS 16 or iPadOS 16 (if applicable), see the following Apple documentation:
Microsoft Defender for Endpoint iOS can now be deployed on Intune User Enrolled devices. This new feature offers security and IT teams the flexibility to deploy Defender for Endpoint for iOS to user-enrolled devices so that work data and applications are protected, while end-user privacy is upheld on those devices. For more information, see [User Enrollment setup](ios-install.md#user-enrollment-setup-only-for-intune-user-enrolled-devices).
50
49
51
-
## Device Tagging
50
+
## Device tagging
52
51
53
52
Mobile Device Tagging is now generally available. This feature enables bulk tagging the mobile devices by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory. For more information, read [Configure Device Tagging](ios-configure-features.md#device-tagging).
54
53
@@ -68,7 +67,7 @@ There are also several admin controls to offer flexibility, including privacy co
68
67
69
68
Microsoft Defender for Endpoint on iOS enables Privacy Controls for both the Admins and the End Users. This includes the controls for enrolled (MDM) and unenrolled (MAM) devices. Admins can configure the privacy in the phish alert report while End Users can configure the information shared to their organization.
70
69
71
-
## Optional Permissions and Disable Web Protection
70
+
## Optional permissions and Disable Web Protection
72
71
73
72
Microsoft Defender for Endpoint on iOS enables **Optional Permissions** in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on BYOD devices without enforcing the mandatory **VPN Permission** during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for enrolled devices (MDM).
0 commit comments