You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-get-started.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,7 @@ ms.collection:
19
19
- tier1
20
20
- essentials-get-started
21
21
ms.custom: intro-get-started
22
+
#customer intent: As a Defender for Business admin, I need quick guidance to navigate the Microsoft Defender portal and find first steps so I can get started securing devices and email.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Configure Microsoft Defender for Endpoint on Android features
3
3
description: Describes how to configure Microsoft Defender for Endpoint on Android
4
4
ms.service: defender-endpoint
5
-
ms.author: bagol
6
-
author: batamig
5
+
ms.author: painbar
6
+
author: paulinbar
7
7
ms.reviewer: denishdonga
8
8
ms.localizationpriority: medium
9
9
manager: bagol
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: how-to
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 06/05/2025
18
+
ms.date: 10/23/2025
19
19
appliesto:
20
20
- Microsoft Defender for Endpoint Plan 1
21
21
- Microsoft Defender for Endpoint Plan 2
@@ -130,14 +130,12 @@ Following privacy controls are available for configuring the data that is sent b
130
130
131
131
## Root Detection (Preview)
132
132
133
-
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, these events occur:
133
+
Microsoft Defender for Endpoint has the ability to detect unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, the following events occur:
134
134
135
-
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
135
+
- A high-risk alert is reported to the Microsoft Defender portal. If Device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136
136
137
-
- User data on app is cleared. When user opens the app after rooted.
137
+
- User data on the app is cleared after the device has been detected as rooted. The feature is enabled by default; no action is required from admin or user.
138
138
139
-
The feature is enabled by default; no action is required from admin or user. Any android device running Defender version **1.0.8125.0302** (or later) will have it activated.
140
-
141
139
**Prerequisite**
142
140
143
141
- Company portal must be installed, and version must be >=5.0.6621.0
The Defender for Endpoint client might require the use of proxied connections to relevant cloud services. This article describes the streamlined device connectivity method, the prerequisites and provides additional information for verifying connectivity using the new destination(s).
31
32
32
-
To simplify network configuration and management, you now have the option of onboarding new devices to Defender for Endpoint using a reduced URL set or static IP ranges. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
33
+
To simplify network configuration and management, you can now onboard new devices to Defender for Endpoint using a reduced URL set or static IP ranges. For more information, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
33
34
34
-
The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.microsoft.com` consolidates connectivity to the following core Defender for Endpoint services:
35
+
## Defender for Endpoint-recognized simplified domain
36
+
37
+
The Defender for Endpoint-recognized simplified domain `*.endpoint.security.microsoft.com` (for commercial devices) or `*.endpoint.security.microsoft.us*` (for US government devices - Preview) consolidates connectivity to the following core Defender for Endpoint services:
35
38
36
39
- Cloud-delivered protection
37
40
- Malware sample submission storage
@@ -43,11 +46,11 @@ For more information on preparing your environment and the updated list of desti
43
46
44
47
To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
45
48
46
-
> [!NOTE]
47
-
>- The streamlined connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48
-
> -There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to `*.endpoint.security.microsoft.com` is and remains possible, as future services will require it. This new URL is included in all required URL lists.
49
-
> -Connections to the service leverage certificate pinning and TLS. It is not supported to "break and inspect" traffic. In addition, connections are initiated from a device context, not a user context. Enforcing proxy (user) authentication will disallow (break) connectivity in most cases.
50
-
49
+
> [!NOTE]
50
+
>
51
+
> -The streamlined connectivity method **doesn't change Defender for Endpoint functionality or end-user experience**. Only the URLs or IPs used for service connectivity have changed.
52
+
> -There are no plans to deprecate old service URLs. Devices onboarded with standard connectivity continue to function. Ensure ongoing connectivity to `*.endpoint.security.microsoft.com` (for commercial devices) or `*.endpoint.security.microsoft.us` (for US government devices - Preview) for future services.
53
+
> - Service connections use certificate pinning and TLS. Traffic inspection is not supported. Connections are device-initiated, not user-initiated. Enforcing proxy (user) authentication breaks connectivity.
51
54
52
55
## Prerequisites
53
56
@@ -75,6 +78,7 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
75
78
- Azure Stack HCI OS, version 23H2 and later.
76
79
77
80
> [!IMPORTANT]
81
+
>
78
82
> -**Devices running on MMA agent are not supported** on the streamlined connectivity method and will need to continue using the standard URL set (Windows 7, Windows 8.1, Windows Server 2008 R2 MMA, Server 2012 & 2016 not upgraded to modern unified agent).
79
83
> - Windows Server 2012 R2 and Server 2016 will need to upgrade to unified agent to leverage the new method. <br/>
80
84
> - Windows 10 1607, 1703, 1709, 1803 can leverage the new onboarding option but will use a longer list. For more information, see the [streamlined URL sheet](https://aka.ms/MDE-streamlined-urls).
@@ -107,12 +111,17 @@ Streamlined connectivity allows you to use the following option to configure clo
107
111
108
112
-[Option 1: Use the simplified domain](#option-1-configure-connectivity-using-the-simplified-domain)
109
113
-[Option 2: Use static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges)
110
-
114
+
111
115
#### Option 1: Configure connectivity using the simplified domain
112
116
113
-
Configure your environment to allow connections to the simplified Defender for Endpoint domain: `*.endpoint.security.microsoft.com`. For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
117
+
Configure your environment to allow connections to the simplified Defender for Endpoint domain:
118
+
119
+
- For commercial devices: `*.endpoint.security.microsoft.com`
120
+
- For US government devices (Preview): `*.endpoint.security.microsoft.us`
114
121
115
-
You must maintain connectivity with remaining required services listed under the [updated list](https://aka.ms/MDE-streamlined-urls). For example, the certification revocation list, Windows Update, SmartScreen services may also need to be accessible dependent on your current networking infrastructure and patching approach.
122
+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
123
+
124
+
You must maintain connectivity with remaining required services listed under the [commercial devices streamlined URL list](https://aka.ms/MDE-streamlined-urls) or [government devices streamlined URL list (Preview)](streamlined-device-connectivity-urls-gov.md). For example, the certification revocation list, Windows Update, SmartScreen services may also need to be accessible dependent on your current networking infrastructure and patching approach.
116
125
117
126
#### Option 2: Configure connectivity using static IP ranges
118
127
@@ -133,14 +142,7 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
133
142
|`MicrosoftDefenderForEndpoint`| Cloud-delivered protection, malware sample submission storage, Auto-IR sample storage, Defender for Endpoint command and control. |
134
143
|`OneDsCollector`| Defender for Endpoint cyber and diagnostic data <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
135
144
136
-
The following table lists the current static IP ranges covered by the MicrosoftDefenderForEndpoint service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
For latest service tags list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
144
146
145
147
> [!IMPORTANT]
146
148
> In compliance with Defender for Endpoint security and compliance standards, your data will be processed and stored in accordance with your tenant's physical location. Based on client location, traffic may flow through any of these IP regions (which correspond to Azure datacenter regions). For more information, see [Data storage and privacy](data-storage-privacy.md).
@@ -185,10 +187,6 @@ Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and
185
187
-[Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
186
188
-[Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)
187
189
188
-
189
190
4. Exclude devices from any existing onboarding policies that use the standard onboarding package.
190
191
191
-
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
192
-
193
-
194
-
192
+
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
0 commit comments