You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-install.md
+58-38Lines changed: 58 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: ios
17
17
search.appverid: met150
18
-
ms.date: 12/18/2020
18
+
ms.date: 03/25/2025
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune
@@ -47,12 +47,14 @@ This section covers:
47
47
1.**Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step isn't needed for VPP (volume purchase) apps.
48
48
49
49
1.**Complete deployment** (only for Supervised devices)- Admins can select to deploy any one of the given profiles.
50
-
1.**Zero touch (Silent) Control Filter** - Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
51
-
1.**Control Filter** - Provides Web Protection without the local loopback VPN.
50
+
51
+
-**Zero touch (Silent) Control Filter**: Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
52
+
-**Control Filter**: Provides Web Protection without the local loopback VPN.
52
53
53
54
1.**Automated Onboarding setup** (only for **Unsupervised** devices) - Admins can automate the Defender for Endpoint onboarding for users in two different ways:
54
-
1.**Zero touch (Silent) Onboarding** - App is automatically installed and activated without the need for users to open the app.
55
-
1.**Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
55
+
56
+
-**Zero touch (Silent) Onboarding**: App is automatically installed and activated without the need for users to open the app.
57
+
-**Auto Onboarding of VPN**: Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
56
58
57
59
1.**User Enrollment setup** (only for Intune User Enrolled devices) - Admins can deploy and configure the Defender for Endpoint app on the Intune User Enrolled devices also.
58
60
@@ -66,16 +68,16 @@ Deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal.
66
68
67
69
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and select **Select**.
68
70
69
-
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
71
+
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
70
72
71
73
1. On the **Add app** page, select **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, select *Microsoft Defender* and select **Select**.
72
74
73
75
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and select **Next**.
74
76
75
77
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user groups that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
76
78
77
-
> [!NOTE]
78
-
> The selected user group should consist of Microsoft Intune enrolled users.
79
+
> [!NOTE]
80
+
> The selected user group should consist of Microsoft Intune enrolled users.
79
81
80
82
:::image type="content" source="media/ios-deploy-2.png" alt-text="The Add group tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-2.png":::
81
83
@@ -105,27 +107,27 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
105
107
:::image type="content" source="media/ios-deploy-4.png" alt-text="Image of Microsoft Intune admin center4." lightbox="media/ios-deploy-4.png":::
106
108
107
109
1. In the *Create app configuration policy* page, provide the following information:
108
-
- Policy Name
109
-
- Platform: Select iOS/iPadOS
110
-
- Targeted app: Select **Microsoft Defender for Endpoint** from the list
110
+
111
+
- Policy Name
112
+
- Platform: Select iOS/iPadOS
113
+
- Targeted app: Select **Microsoft Defender for Endpoint** from the list
111
114
112
-
:::image type="content" source="media/ios-deploy-5.png" alt-text="Image of Microsoft Intune admin center5." lightbox="media/ios-deploy-5.png":::
115
+
:::image type="content" source="media/ios-deploy-5.png" alt-text="Image of Microsoft Intune admin center5." lightbox="media/ios-deploy-5.png":::
113
116
114
117
1. In the next screen, select **Use configuration designer** as the format. Specify the following properties:
115
-
- Configuration Key: `issupervised`
116
-
- Value type: String
117
-
- Configuration Value: `{{issupervised}}`
118
+
119
+
- Configuration Key: `issupervised`
120
+
- Value type: String
121
+
- Configuration Value: `{{issupervised}}`
118
122
119
-
:::image type="content" source="media/ios-deploy-6.png" alt-text="Image of Microsoft Intune admin center6." lightbox="media/ios-deploy-6.png":::
123
+
:::image type="content" source="media/ios-deploy-6.png" alt-text="Image of Microsoft Intune admin center6." lightbox="media/ios-deploy-6.png":::
120
124
121
125
1. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
122
126
123
-
1. On the **Assignments** page, select the groups that receive this profile. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
127
+
1. On the **Assignments** page, select the groups that receive this profile, and then select **Next**. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
124
128
125
129
When deploying to user groups, a user must sign in to a device before the policy applies.
126
130
127
-
Click **Next**.
128
-
129
131
1. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
:::image type="content" source="media/ios-deploy-7.png" alt-text="Image of Microsoft Intune admin center7." lightbox="media/ios-deploy-7.png":::
150
153
151
154
1. Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded from the previous step.
155
+
152
156
1. In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Select **Next**.
153
157
154
158
> [!NOTE]
@@ -168,9 +172,13 @@ Admins can automate the Defender onboarding for users in two different ways with
168
172
Admins can configure Microsoft Defender for Endpoint to deploy and activate silently. In this flow, the administrator creates a deployment profile and the user is simply notified of the installation. Defender for Endpoint is automatically installed without the need for the user to open the app. Follow the steps below to set up zero-touch or silent deployment of Defender for Endpoint on enrolled iOS devices:
169
173
170
174
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
175
+
171
176
1. Choose **Platform** as **iOS/iPadOS**, **Profile type** as **Templates** and **Template name** as **VPN**. Select **Create**.
177
+
172
178
1. Type a name for the profile and select **Next**.
179
+
173
180
1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
181
+
174
182
- Connection Name = Microsoft Defender for Endpoint
175
183
- VPN server address = 127.0.0.1
176
184
- Auth method = "Username and password"
@@ -186,7 +194,8 @@ Admins can configure Microsoft Defender for Endpoint to deploy and activate sile
186
194
- To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users can't change the toggle from within the app.
187
195
188
196
1. Select **Next** and assign the profile to targeted users.
189
-
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
197
+
198
+
1. In the **Review + Create** section, verify that all the information entered is correct and then select **Create**.
190
199
191
200
Once the above configuration is done and synced with the device, the following actions take place on the targeted iOS device(s):
192
201
@@ -208,9 +217,13 @@ For unsupervised devices, a VPN is used to provide the Web Protection feature. T
208
217
Admins can configure auto-setup of VPN profile. This will automatically set up the Defender for Endpoint VPN profile without having the user to do so while onboarding.
209
218
210
219
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
220
+
211
221
1. Choose **Platform** as **iOS/iPadOS** and **Profile type** as **VPN**. Click **Create**.
222
+
212
223
1. Type a name for the profile and click **Next**.
224
+
213
225
1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
226
+
214
227
- Connection Name = Microsoft Defender for Endpoint
215
228
- VPN server address = 127.0.0.1
216
229
- Auth method = "Username and password"
@@ -226,41 +239,47 @@ Admins can configure auto-setup of VPN profile. This will automatically set up t
226
239
- To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users cannot change the toggle from within the app.
227
240
228
241
1. Click **Next** and assign the profile to targeted users.
229
-
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
242
+
243
+
1. In the **Review + Create** section, verify that all the information entered is correct and then select **Create**.
230
244
231
245
## **User Enrollment setup** (only for Intune User Enrolled devices)
232
246
233
247
Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices using the following steps.
234
248
235
249
### Admin
250
+
236
251
1. Set up User Enrollment Profile in Intune. Intune supports account driven Apple User Enrollment and Apple User Enrollment with Company Portal. Read more about the [comparison](/mem/intune/enrollment/ios-user-enrollment-supported-actions#apple-user-enrollment-methods) of the two methods and select one.
237
-
-[Set up user enrollment with Company Portal](/mem/intune/enrollment/apple-user-enrollment-with-company-portal)
238
-
-[Set up account driven user enrollment](/mem/intune/enrollment/apple-account-driven-user-enrollment)
252
+
253
+
-[Set up user enrollment with Company Portal](/mem/intune/enrollment/apple-user-enrollment-with-company-portal)
254
+
-[Set up account driven user enrollment](/mem/intune/enrollment/apple-account-driven-user-enrollment)
239
255
240
256
1. Set up SSO Plugin. Authenticator app with SSO extension is a pre-requisite for user enrollment in an iOS device.
241
-
-[Create Device configuration Profile in Intune](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune?tabs=prereq-intune%2Ccreate-profile-intune#create-a-single-sign-on-app-extension-configuration-policy)
242
-
- Ensure to add these two keys in the above configuration:
243
-
- App bundle ID: Include the Defender App bundle ID in this list **com.microsoft.scmx**
- In Intune, go to Go to Apps \> App configuration policies \> Add \> Managed devices
248
-
- Give the policy a name, select Platform \> iOS/iPadOS,
249
-
- Select Microsoft Defender for Endpoint as the target app.
250
-
- In Settings page, select Use configuration designer and add **UserEnrolmentEnabled** as the key, value type as **String**, value as **True**.
264
+
265
+
- In Intune, go to Go to Apps \> App configuration policies \> Add \> Managed devices
266
+
- Give the policy a name, select Platform \> iOS/iPadOS,
267
+
- Select Microsoft Defender for Endpoint as the target app.
268
+
- In Settings page, select Use configuration designer and add **UserEnrolmentEnabled** as the key, value type as **String**, value as **True**.
251
269
252
270
1. Admin can push Defender as a required VPP app from Intune.
253
271
254
272
### End User
273
+
255
274
Defender app is installed into the user's device. User signs in and completes the onboarding. Once the device is successfully onboarded, it will be visible in the Defender Security Portal under Device Inventory.
256
275
257
276
### Supported features and limitations
258
-
1. Supports all the current capabilities of Defender for Endpoint iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
259
-
1. Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
260
-
1. For vulnerability management of apps, only apps in the work profile will be visible.
261
-
1. It can take up to 10 minutes for newly onboarded devices to become compliant if targeted by compliance policies.
262
-
1. Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
263
277
278
+
- Supports all the current capabilities of Defender for Endpoint iOS like Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
279
+
- Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
280
+
- For vulnerability management of apps, only apps in the work profile will be visible.
281
+
- It can take up to 10 minutes for newly onboarded devices to become compliant if targeted by compliance policies.
282
+
- Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
264
283
265
284
## Complete onboarding and check status
266
285
@@ -270,8 +289,8 @@ Defender app is installed into the user's device. User signs in and completes th
270
289
271
290
2. Tap the Defender for Endpoint app icon (MSDefender) and follow the on-screen instructions to complete the onboarding steps. The details include end-user acceptance of iOS permissions required by Defender for Endpoint on iOS.
272
291
273
-
> [!NOTE]
274
-
> Skip this step if you configure zero touch (silent) onboarding. Manually launching application is not necessary if zero touch (silent) onboarding is configured.
292
+
> [!NOTE]
293
+
> Skip this step if you configure zero touch (silent) onboarding. Manually launching application is not necessary if zero touch (silent) onboarding is configured.
275
294
276
295
3. Upon successful onboarding, the device will start showing up on the Devices list in the Microsoft Defender portal.
277
296
@@ -281,4 +300,5 @@ Defender app is installed into the user's device. User signs in and completes th
281
300
282
301
-[Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)
283
302
-[Configure Defender for Endpoint on iOS features](ios-configure-features.md)
303
+
284
304
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments