Skip to content

Commit b15a1f9

Browse files
authored
Merge pull request #1651 from MicrosoftDocs/main
publish main to live, 3:30 pm, 10/18/24
2 parents 7383f34 + 1092e7f commit b15a1f9

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 08/30/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -197,9 +197,9 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
197197
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200-
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
200+
1. In Settings page, select **Use configuration designer** and add **Enable TVM Privacy** as the key and value type as **Integer**
201201

202-
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202+
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
203203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204204

205205
5. Select **Next** and assign this profile to targeted devices/users.

defender-endpoint/indicator-ip-domain.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice:
1717
search.appverid: met150
18-
ms.date: 08/26/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Create indicators for IPs and URLs/domains
@@ -81,7 +81,7 @@ URL/IP allow and block requires that the Microsoft Defender for Endpoint compone
8181

8282
### Custom network indicators requirements
8383

84-
To start blocking IP addresses and/or URL's, turn on "**Custom network indicators"** feature in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
84+
To start blocking IP addresses and/or URLs, turn on "**Custom network indicators"** feature in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
8585

8686
For support of indicators on iOS, see [Microsoft Defender for Endpoint on iOS](ios-configure-features.md#configure-custom-indicators).
8787

@@ -178,8 +178,8 @@ The result is that categories 1-4 are all blocked. This is illustrated in the fo
178178

179179
5. Review the details in the **Summary** tab, then select **Save**.
180180

181-
> [!NOTE]
182-
> There may be up to 2 hours of latency between the time a policy is created and the URL or IP being blocked on the device.
181+
> [!IMPORTANT]
182+
> It can take up to 48 hours after a policy is created for a URL or IP address to be blocked on a device.
183183
184184
## Related articles
185185

defender-endpoint/mobile-resources-defender-endpoint.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ngp
1616
search.appverid: met150
17-
ms.date: 02/09/2024
17+
ms.date: 10/18/2024
1818
---
1919
# Resources for Microsoft Defender for Endpoint for mobile devices
2020

@@ -24,8 +24,8 @@ Microsoft Defender for Endpoint provides multiple capabilities on mobile devices
2424

2525
| Configuration| Description | Android AE config key | Android MAM | iOS |
2626
|--------------|-------------|-----------------------|-------------|-----|
27-
|Web Protection|Admins can use this setting to change the web protection feature. When disabled, end users aren't asked for VPN permissions|Antiphishing = 0/1 (default), VPN = 0/1(default)|Antiphishing=0/1(default), VPN = 0/1(default)| WebProtection = true (default) / false|
28-
|Network Protection| Network protection is disabled by default. Admins can enable it to include rogue WiFi and certificate detection (only available on android) on mobile.|Enable Network protection in Microsoft Defender = 0/1 (default)| DefenderNetworkProtectionEnable = 0/1 (default)|DefenderNetworkProtectionEnable = 0 (default)/1|
27+
|Web Protection|Admins can use this setting to change the web protection feature. When disabled, end users aren't asked for VPN permissions|Antiphishing = 0/1 (default), VPN = 0 or 1(default)|Antiphishing = 0 or 1(default), VPN = 0 or 1(default)| WebProtection = true (default) or false|
28+
|Network Protection| Network protection is disabled by default. Admins can enable it to include rogue WiFi and certificate detection (only available on android) on mobile.|Enable Network protection in Microsoft Defender = 0 or 1 (default)| DefenderNetworkProtectionEnable = 0 or 1 (default)|DefenderNetworkProtectionEnable = 0 or 1(default)|
2929

3030
## Privacy configuration
3131

0 commit comments

Comments
 (0)