Skip to content

Commit 9ab0fad

Browse files
authored
Merge pull request #3054 from MicrosoftDocs/fhl-content-freshness
Update ios-install-unmanaged.md
2 parents 05bcd0f + a3a9a60 commit 9ab0fad

File tree

1 file changed

+21
-22
lines changed

1 file changed

+21
-22
lines changed

defender-endpoint/ios-install-unmanaged.md

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: ios
1717
search.appverid: met150
18-
ms.date: 07/18/2021
18+
ms.date: 03/06/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on iOS with Mobile Application Management
@@ -30,72 +30,71 @@ ms.date: 07/18/2021
3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131
3232
> [!NOTE]
33-
> Defender for Endpoint on iOS uses a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
33+
> Defender for Endpoint on iOS uses a VPN in order to provide the Web Protection feature. This isn't a regular VPN and is a local/self-looping VPN that doesn't take traffic outside the device.
3434
3535
## Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)
3636

37-
Microsoft Defender for Endpoint on iOS, which already protects enterprise users on Mobile Device Management (MDM) scenarios, now extends support to Mobile App Management (MAM), for devices that are not enrolled using Intune mobile device management (MDM). It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for mobile application management (MAM).This capability allows you to manage and protect your organization's data within an application.
37+
Microsoft Defender for Endpoint on iOS, which already protects enterprise users on Mobile Device Management (MDM) scenarios, now extends support to Mobile App Management (MAM), for devices that aren't enrolled using Intune mobile device management (MDM). It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for mobile application management (MAM). This capability allows you to manage and protect your organization's data within an application.
3838

39-
Microsoft Defender for Endpoint on iOS threat information is leveraged by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
39+
Microsoft Defender for Endpoint on iOS threat information is applied by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
4040

4141
Microsoft Defender for Endpoint on iOS supports both the configurations of MAM
4242
- **Intune MDM + MAM**: IT administrators can only manage apps using App Protection Policies on devices that are enrolled with Intune mobile device management (MDM).
43-
- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This means apps can be managed by Intune on devices enrolled with third-party EMM providers.
43+
- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This means apps can be managed by Intune on devices enrolled with non-Microsoft EMM providers.
4444
To manage apps using in both the above configurations customers should use Intune in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431)
4545

4646
To enable this capability an administrator needs to configure the connection between Microsoft Defender for Endpoint and Intune, create the app protection policy, and apply the policy on targeted devices and applications.
4747

4848
End users also need to take steps to install Microsoft Defender for Endpoint on their device and activate the onboarding flow.
4949

50-
### Pre-requisites
50+
### Prerequisites
5151

5252
1. **Verify that the Intune connector is enabled in Security portal**. <br> On the [unified security console](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced Features** and ensure that **Microsoft Intune connection** is enabled.
5353

54-
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Defender for Endpoint - Intune connector" lightbox="media/enable-intune-connection.png":::
54+
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Defender for Endpoint - Intune connector." lightbox="media/enable-intune-connection.png":::
5555

5656
2. **Verify that the APP connector is enabled in Intune portal**. <br> In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** > **Microsoft Defender for Endpoint** and ensure that the Connection status is enabled.
5757

58-
:::image type="content" source="media/app-settings.png" alt-text="The application settings" lightbox="media/app-settings.png":::
58+
:::image type="content" source="media/app-settings.png" alt-text="The application settings." lightbox="media/app-settings.png":::
5959

6060
### Create an app protection policy
6161

6262
Block access or wipe data of a managed app based on Microsoft Defender for Endpoint risk signals by creating an app protection policy.
6363
Microsoft Defender for Endpoint can be configured to send threat signals to be used in app protection policies (APP, also known as MAM). With this capability, you can use Microsoft Defender for Endpoint to protect managed apps.
6464

6565
1. Create a policy <br>
66-
App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
66+
App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
6767

68-
:::image type="content" source="media/create-policy.png" alt-text="The Create policy tab on the App protection policies menu item" lightbox="media/create-policy.png":::
68+
:::image type="content" source="media/create-policy.png" alt-text="The Create policy tab on the App protection policies menu item." lightbox="media/create-policy.png":::
6969

7070
2. Add apps <br>
7171
a. Choose how you want to apply this policy to apps on different devices. Then add at least one app. <br>
72-
Use this option to specify whether this policy applies to unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
73-
Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
72+
Use this option to specify whether this policy applies to unmanaged devices. You can also choose to target your policy to apps on devices of any management state. Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
7473

75-
b. Select Apps<br>
76-
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
74+
b. Select Apps. <br>
75+
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that is integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that are built using these tools and are available for public use.
7776

7877
*Example: Outlook as a managed app*
7978

80-
:::image type="content" source="media/managed-app.png" alt-text="The Microsoft Outlook menu item on the left navigation pane" lightbox="media/managed-app.png":::
79+
:::image type="content" source="media/managed-app.png" alt-text="The Microsoft Outlook menu item on the left navigation pane." lightbox="media/managed-app.png":::
8180

8281
Select the **Platform, Apps, Data protection, Access requirements** settings that your organization requires for your policy.
8382

84-
3.Set sign-in security requirements for your protection policy. <br>
85-
Select **Setting > Max allowed device threat level** in **Conditional Launch > Device Conditions** and enter a value. This will need to be configured to either Low, Medium, High, or Secured. The actions available to you will be **Block access** or **Wipe data**. Select **Action: "Block Access"**. Microsoft Defender for Endpoint on iOS shares this Device Threat Level.
83+
3. Set sign-in security requirements for your protection policy. <br>
84+
Select **Setting > Max allowed device threat level** in **Conditional Launch > Device Conditions** and enter a value. This needs to be configured to either Low, Medium, High, or Secured. The actions available to you are **Block access** or **Wipe data**. Select **Action: "Block Access"**. Microsoft Defender for Endpoint on iOS shares this Device Threat Level.
8685

87-
:::image type="content" source="media/conditional-launch.png" alt-text="The Device conditions pane" lightbox="media/conditional-launch.png":::
86+
:::image type="content" source="media/conditional-launch.png" alt-text="The Device conditions pane." lightbox="media/conditional-launch.png":::
8887

89-
4.Assign user groups for whom the policy needs to be applied.<br>
90-
Select **Included groups**. Then add the relevant groups.
88+
4. Assign user groups for whom the policy needs to be applied.<br>
89+
Select **Included groups**. Then add the relevant groups.
9190

92-
For more information on MAM or app protection policy, see [iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios).
91+
For more information on MAM or app protection policy, see [iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios).
9392

9493
## Deploy Microsoft Defender for Endpoint for MAM or on unenrolled devices
9594

9695
Microsoft Defender for Endpoint on iOS enables the app protection policy scenario and is available in the Apple app store.
9796

98-
When app protection policies are configured for apps to include device risk signals from Microsoft Defender for Endpoint, users will be redirected to install Microsoft Defender for Endpoint when using such apps. Alternately, users can also install the latest version of the app directly from the Apple app store.
97+
When app protection policies are configured for apps to include device risk signals from Microsoft Defender for Endpoint, users are redirected to install Microsoft Defender for Endpoint when using such apps. Alternately, users can also install the latest version of the app directly from the Apple app store.
9998

10099
Ensure the device is registered to Authenticator with the same account being used to onboard in Defender for successful MAM registration.
101100
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)