You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: reference
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 01/06/2025
18
+
ms.date: 02/04/2025
19
19
---
20
20
21
21
# What's new in Microsoft Defender for Endpoint on Android
@@ -32,31 +32,31 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
32
32
33
33
**February 2025:**
34
34
35
-
As part of our Microsoft Defender for Mobile application, we currently have Open Wi-Fi detection as part of our Network Protection feature set. When enabled, this feature raises an alert in the Security portal. In its current state, the alert acts as an informational one with no action required by the SOC analyst/admin. It serves as a key piece of information that helps when triaging incidents involving mobile devices.
35
+
As part of our Microsoft Defender for Mobile application, we offer Open Wi-Fi detection within our Network Protection feature set. When enabled, this feature generates an alert in the Security portal. Currently, the alert is informational and doesn't require any action from the SOC analyst or admin. It provides valuable information that aids in triaging incidents involving mobile devices.
36
36
37
-
**Current Behaviour:**
37
+
**Current Behavior:**
38
38
39
39
- Every time the end user connects to an open Wi-Fi network, an alert is raised.
40
40
41
41
- If the user goes out of the open Wi-Fi range and reconnects to the same network, another alert is raised.
42
42
43
-
Based on our research insights and inputs from Microsoft and other SOC teams, we are implementing a caching behaviour to ensure the value of the alerts remains and also does not cause fatigue to SOC teams due to sheer volume.
43
+
Based on our research insights and inputs from Microsoft and other SOC teams, we're implementing a caching behavior to ensure the value of the alerts remains and also doesn't cause fatigue to SOC teams due to sheer volume.
44
44
45
-
**New behaviour:**
45
+
**New behavior:**
46
46
47
47
- Every time the end user connects to an open Wi-Fi network, an alert is raised.
48
48
49
-
- If a user re-connects to the same open wi-fi in the next 7 days, another alert won't be raised.
49
+
- If a user reconnects to the same open wi-fi in the next seven days, another alert won't be raised.
50
50
51
-
Please note that if a user connects to a different open Wi-Fi network, an alert will be immediately generated, and there is no change to that behaviour.
51
+
Please note that if a user connects to a different open Wi-Fi network, an alert is immediately generated, and there's no change to that behavior.
52
52
53
53
## Upgrading your experience: Upcoming enhancements you should know about
54
54
55
55
**January 2025**:
56
56
57
57
**Key changes**:
58
58
59
-
We are pleased to introduce the new dashboard for our enterprise users, which has been designed to be more user-friendly and accessible. The updated dashboard structure now includes recommendation cards for alerts and feature tiles.
59
+
We're pleased to introduce the new dashboard for our enterprise users, which has been designed to be more user-friendly and accessible. The updated dashboard structure now includes recommendation cards for alerts and feature tiles.
60
60
61
61
Recommendation cards prominently display any active alerts, ensuring you stay informed. Additionally, features are now presented in the form of tiles, enhancing ease of use and navigation.
62
62
@@ -66,7 +66,7 @@ The following screenshot is an example of what the user sees in their dashboard:
66
66
67
67
**Recommendation cards for alerts**:
68
68
69
-
The structure of the dashboard has been updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert will bring forward the next one. Recommendation cards have been implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard, as shown in the following table:
69
+
The structure of the dashboard has been updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert brings forward the next one. Recommendation cards have been implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard, as shown in the following table:
70
70
71
71
| Card | Description |
72
72
|---|---|
@@ -124,7 +124,7 @@ Although low-touch onboarding is disabled by default, security administrators ca
124
124
Network protection on Microsoft Defender for Endpoint is now generally available. Network protection provides protection against rogue Wi-Fi related threats, rogue hardware like pineapple devices, and rogue certificates. It notifies the user if a related threat is detected. Users also see a guided experience to connect to secure networks and change networks when they're connected to an insecure connection.
125
125
126
126
> [!IMPORTANT]
127
-
> **This feature is now enabled by default for all users.** As a result, users will be able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the set up. Administrators can change the default value for network protection if they decide not to use it via the Intune App Configuration policies.
127
+
> **This feature is now enabled by default for all users.** As a result, users are able to see a network protection card in the Defender for Endpoint app, along with App Protection and Web Protection. Users are also required to provide location permission to complete the setup. Administrators can change the default value for network protection if they decide not to use it via the Intune App Configuration policies.
128
128
There are also several administrator controls to offer flexibility, including privacy controls to configure the data that's sent by Defender for Endpoint from Android devices. For more information, see [network protection](android-configure.md).
129
129
130
130
## Device tagging
@@ -187,12 +187,12 @@ Microsoft Defender for Endpoint has released this update required by [Google](ht
187
187
**How this affects your organization**: These changes take effect if you're using Microsoft Defender for Endpoint on devices running Android 11 or later and updated Defender for Endpoint to release build 1.0.3501.0301 or later.
188
188
189
189
> [!NOTE]
190
-
> The new storage permissions cannot be configured by administrators to auto approve through Microsoft Intune. Users must take action to provide access to this permission.
190
+
> The new storage permissions can't be configured by administrators to auto approve through Microsoft Intune. Users must take action to provide access to this permission.
191
191
192
192
**User experience**: Users receive a notification indicating a missing permission for app security. If the user denies this permission, app security functionality is turned off on the device. If user doesn't accept or deny permission, they continue to receive the prompt when unlocking their device or opening the app, until it's approved.
193
193
194
194
> [!NOTE]
195
-
> If your organization is previewing the tamper protection feature and if the new storage permissions are not granted by the user within seven days of updating to the latest version, the user might lose access to corporate resources.
195
+
> If your organization is previewing the tamper protection feature and if the new storage permissions aren't granted by the user within seven days of updating to the latest version, the user might lose access to corporate resources.
0 commit comments