Skip to content

Commit b73fee1

Browse files
committed
Learn Editor: Update android-configure.md
1 parent 92cbfd5 commit b73fee1

File tree

1 file changed

+3
-46
lines changed

1 file changed

+3
-46
lines changed

defender-endpoint/android-configure.md

Lines changed: 3 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -199,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
199199

200200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
201201

202-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
203-
204-
Use the following steps to turn it on for targeted users:
205-
206-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
207-
208-
- **Platform**: Select Android device administrator.
209-
- **Profile**: Select "Custom" and select **Create**.
210-
211-
2. In the **Basics** section, specify a name and description of the profile.
212-
213-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
214-
215-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
216-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeURLInReport**
217-
- Data type: Select Integer in the drop-down list.
218-
- Value: Enter 1 to enable privacy setting. The default value is 0.
219-
220-
4. Select **Next** and assign this profile to targeted devices/users.
221-
222-
Using this privacy control won't affect the device compliance check or conditional access.
223-
224202
### Configure privacy for phishing alert report on Android Enterprise work profile
225203

226204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -240,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
240218

241219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
242220

243-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
244-
245-
Use the following steps to turn it on for targeted users:
246-
247-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
248-
249-
- **Platform**: Select Android device administrator.
250-
- **Profile**: Select "Custom" and select **Create**.
251-
252-
2. In the **Basics** section, specify a name and description of the profile.
253-
254-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
255-
256-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
257-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport**
258-
- Data type: Select Integer in the drop-down list.
259-
- Value: Enter 1 to enable privacy setting. The default value is 0.
260-
261-
4. Select **Next** and assign this profile to targeted devices/users.
262-
263-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
264-
265221
### Configure privacy for malware alert report on Android Enterprise work profile
266222

267223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -285,9 +241,10 @@ Use the following steps to configure Disable out sign:
285241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
286242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
287243
3. Select **Microsoft Defender for Endpoint** as the target app.
288-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
289245

290-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247+
291248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
292249

293250
5. Select **Next** and assign this profile to targeted devices and users.

0 commit comments

Comments
 (0)