Skip to content

Commit 90e1524

Browse files
authored
Update iOS installation guide for Defender
1 parent f247376 commit 90e1524

File tree

1 file changed

+58
-38
lines changed

1 file changed

+58
-38
lines changed

defender-endpoint/ios-install.md

Lines changed: 58 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: ios
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 03/25/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune
@@ -47,12 +47,14 @@ This section covers:
4747
1. **Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step isn't needed for VPP (volume purchase) apps.
4848

4949
1. **Complete deployment** (only for Supervised devices)- Admins can select to deploy any one of the given profiles.
50-
1. **Zero touch (Silent) Control Filter** - Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
51-
1. **Control Filter** - Provides Web Protection without the local loopback VPN.
50+
51+
- **Zero touch (Silent) Control Filter**: Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
52+
- **Control Filter**: Provides Web Protection without the local loopback VPN.
5253

5354
1. **Automated Onboarding setup** (only for **Unsupervised** devices) - Admins can automate the Defender for Endpoint onboarding for users in two different ways:
54-
1. **Zero touch (Silent) Onboarding** - App is automatically installed and activated without the need for users to open the app.
55-
1. **Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
55+
56+
- **Zero touch (Silent) Onboarding**: App is automatically installed and activated without the need for users to open the app.
57+
- **Auto Onboarding of VPN**: Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
5658

5759
1. **User Enrollment setup** (only for Intune User Enrolled devices) - Admins can deploy and configure the Defender for Endpoint app on the Intune User Enrolled devices also.
5860

@@ -66,16 +68,16 @@ Deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal.
6668

6769
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and select **Select**.
6870

69-
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
71+
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
7072

7173
1. On the **Add app** page, select **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, select *Microsoft Defender* and select **Select**.
7274

7375
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and select **Next**.
7476

7577
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user groups that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
7678

77-
> [!NOTE]
78-
> The selected user group should consist of Microsoft Intune enrolled users.
79+
> [!NOTE]
80+
> The selected user group should consist of Microsoft Intune enrolled users.
7981
8082
:::image type="content" source="media/ios-deploy-2.png" alt-text="The Add group tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-2.png":::
8183

@@ -105,27 +107,27 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
105107
:::image type="content" source="media/ios-deploy-4.png" alt-text="Image of Microsoft Intune admin center4." lightbox="media/ios-deploy-4.png":::
106108

107109
1. In the *Create app configuration policy* page, provide the following information:
108-
- Policy Name
109-
- Platform: Select iOS/iPadOS
110-
- Targeted app: Select **Microsoft Defender for Endpoint** from the list
110+
111+
- Policy Name
112+
- Platform: Select iOS/iPadOS
113+
- Targeted app: Select **Microsoft Defender for Endpoint** from the list
111114

112-
:::image type="content" source="media/ios-deploy-5.png" alt-text="Image of Microsoft Intune admin center5." lightbox="media/ios-deploy-5.png":::
115+
:::image type="content" source="media/ios-deploy-5.png" alt-text="Image of Microsoft Intune admin center5." lightbox="media/ios-deploy-5.png":::
113116

114117
1. In the next screen, select **Use configuration designer** as the format. Specify the following properties:
115-
- Configuration Key: `issupervised`
116-
- Value type: String
117-
- Configuration Value: `{{issupervised}}`
118+
119+
- Configuration Key: `issupervised`
120+
- Value type: String
121+
- Configuration Value: `{{issupervised}}`
118122

119-
:::image type="content" source="media/ios-deploy-6.png" alt-text="Image of Microsoft Intune admin center6." lightbox="media/ios-deploy-6.png":::
123+
:::image type="content" source="media/ios-deploy-6.png" alt-text="Image of Microsoft Intune admin center6." lightbox="media/ios-deploy-6.png":::
120124

121125
1. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
122126

123-
1. On the **Assignments** page, select the groups that receive this profile. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
127+
1. On the **Assignments** page, select the groups that receive this profile, and then select **Next**. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
124128

125129
When deploying to user groups, a user must sign in to a device before the policy applies.
126130

127-
Click **Next**.
128-
129131
1. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
130132

131133
#### Device configuration profile (Control Filter)
@@ -144,11 +146,13 @@ Admins deploy any one of the given profiles.
144146
Once the profile has been downloaded, deploy the custom profile. Follow the steps below:
145147

146148
1. Navigate to **Devices** > **iOS/iPadOS** > **Configuration profiles** > **Create Profile**.
149+
147150
1. Select **Profile Type** > **Templates** and **Template name** > **Custom**.
148151

149152
:::image type="content" source="media/ios-deploy-7.png" alt-text="Image of Microsoft Intune admin center7." lightbox="media/ios-deploy-7.png":::
150153

151154
1. Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded from the previous step.
155+
152156
1. In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Select **Next**.
153157

154158
> [!NOTE]
@@ -168,9 +172,13 @@ Admins can automate the Defender onboarding for users in two different ways with
168172
Admins can configure Microsoft Defender for Endpoint to deploy and activate silently. In this flow, the administrator creates a deployment profile and the user is simply notified of the installation. Defender for Endpoint is automatically installed without the need for the user to open the app. Follow the steps below to set up zero-touch or silent deployment of Defender for Endpoint on enrolled iOS devices:
169173

170174
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
175+
171176
1. Choose **Platform** as **iOS/iPadOS**, **Profile type** as **Templates** and **Template name** as **VPN**. Select **Create**.
177+
172178
1. Type a name for the profile and select **Next**.
179+
173180
1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
181+
174182
- Connection Name = Microsoft Defender for Endpoint
175183
- VPN server address = 127.0.0.1
176184
- Auth method = "Username and password"
@@ -186,7 +194,8 @@ Admins can configure Microsoft Defender for Endpoint to deploy and activate sile
186194
- To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users can't change the toggle from within the app.
187195

188196
1. Select **Next** and assign the profile to targeted users.
189-
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
197+
198+
1. In the **Review + Create** section, verify that all the information entered is correct and then select **Create**.
190199

191200
Once the above configuration is done and synced with the device, the following actions take place on the targeted iOS device(s):
192201

@@ -208,9 +217,13 @@ For unsupervised devices, a VPN is used to provide the Web Protection feature. T
208217
Admins can configure auto-setup of VPN profile. This will automatically set up the Defender for Endpoint VPN profile without having the user to do so while onboarding.
209218

210219
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
220+
211221
1. Choose **Platform** as **iOS/iPadOS** and **Profile type** as **VPN**. Click **Create**.
222+
212223
1. Type a name for the profile and click **Next**.
224+
213225
1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
226+
214227
- Connection Name = Microsoft Defender for Endpoint
215228
- VPN server address = 127.0.0.1
216229
- Auth method = "Username and password"
@@ -226,41 +239,47 @@ Admins can configure auto-setup of VPN profile. This will automatically set up t
226239
- To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users cannot change the toggle from within the app.
227240

228241
1. Click **Next** and assign the profile to targeted users.
229-
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
242+
243+
1. In the **Review + Create** section, verify that all the information entered is correct and then select **Create**.
230244

231245
## **User Enrollment setup** (only for Intune User Enrolled devices)
232246

233247
Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices using the following steps.
234248

235249
### Admin
250+
236251
1. Set up User Enrollment Profile in Intune. Intune supports account driven Apple User Enrollment and Apple User Enrollment with Company Portal. Read more about the [comparison](/mem/intune/enrollment/ios-user-enrollment-supported-actions#apple-user-enrollment-methods) of the two methods and select one.
237-
- [Set up user enrollment with Company Portal](/mem/intune/enrollment/apple-user-enrollment-with-company-portal)
238-
- [Set up account driven user enrollment](/mem/intune/enrollment/apple-account-driven-user-enrollment)
252+
253+
- [Set up user enrollment with Company Portal](/mem/intune/enrollment/apple-user-enrollment-with-company-portal)
254+
- [Set up account driven user enrollment](/mem/intune/enrollment/apple-account-driven-user-enrollment)
239255

240256
1. Set up SSO Plugin. Authenticator app with SSO extension is a pre-requisite for user enrollment in an iOS device.
241-
- [Create Device configuration Profile in Intune](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune?tabs=prereq-intune%2Ccreate-profile-intune#create-a-single-sign-on-app-extension-configuration-policy)
242-
- Ensure to add these two keys in the above configuration:
243-
- App bundle ID: Include the Defender App bundle ID in this list **com.microsoft.scmx**
244-
- Additional configuration: Key - **device_registration** ; Type - **String** ; Value- **{{DEVICEREGISTRATION}}**
257+
258+
- [Create Device configuration Profile in Intune](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune?tabs=prereq-intune%2Ccreate-profile-intune#create-a-single-sign-on-app-extension-configuration-policy)
259+
- Ensure to add these two keys in the above configuration:
260+
- App bundle ID: Include the Defender App bundle ID in this list **com.microsoft.scmx**
261+
- Additional configuration: Key - **device_registration** ; Type - **String** ; Value- **{{DEVICEREGISTRATION}}**
245262

246263
1. Set up the MDM Key for User Enrollment.
247-
- In Intune, go to Go to Apps \> App configuration policies \> Add \> Managed devices
248-
- Give the policy a name, select Platform \> iOS/iPadOS,
249-
- Select Microsoft Defender for Endpoint as the target app.
250-
- In Settings page, select Use configuration designer and add **UserEnrolmentEnabled** as the key, value type as **String**, value as **True**.
264+
265+
- In Intune, go to Go to Apps \> App configuration policies \> Add \> Managed devices
266+
- Give the policy a name, select Platform \> iOS/iPadOS,
267+
- Select Microsoft Defender for Endpoint as the target app.
268+
- In Settings page, select Use configuration designer and add **UserEnrolmentEnabled** as the key, value type as **String**, value as **True**.
251269

252270
1. Admin can push Defender as a required VPP app from Intune.
253271

254272
### End User
273+
255274
Defender app is installed into the user's device. User signs in and completes the onboarding. Once the device is successfully onboarded, it will be visible in the Defender Security Portal under Device Inventory.
256275

257276
### Supported features and limitations
258-
1. Supports all the current capabilities of Defender for Endpoint iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
259-
1. Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
260-
1. For vulnerability management of apps, only apps in the work profile will be visible.
261-
1. It can take up to 10 minutes for newly onboarded devices to become compliant if targeted by compliance policies.
262-
1. Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
263277

278+
- Supports all the current capabilities of Defender for Endpoint iOS like Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
279+
- Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
280+
- For vulnerability management of apps, only apps in the work profile will be visible.
281+
- It can take up to 10 minutes for newly onboarded devices to become compliant if targeted by compliance policies.
282+
- Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
264283

265284
## Complete onboarding and check status
266285

@@ -270,8 +289,8 @@ Defender app is installed into the user's device. User signs in and completes th
270289

271290
2. Tap the Defender for Endpoint app icon (MSDefender) and follow the on-screen instructions to complete the onboarding steps. The details include end-user acceptance of iOS permissions required by Defender for Endpoint on iOS.
272291

273-
> [!NOTE]
274-
> Skip this step if you configure zero touch (silent) onboarding. Manually launching application is not necessary if zero touch (silent) onboarding is configured.
292+
> [!NOTE]
293+
> Skip this step if you configure zero touch (silent) onboarding. Manually launching application is not necessary if zero touch (silent) onboarding is configured.
275294
276295
3. Upon successful onboarding, the device will start showing up on the Devices list in the Microsoft Defender portal.
277296

@@ -281,4 +300,5 @@ Defender app is installed into the user's device. User signs in and completes th
281300

282301
- [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)
283302
- [Configure Defender for Endpoint on iOS features](ios-configure-features.md)
303+
284304
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)