Skip to content

Commit cbf9fd2

Browse files
authored
pencil edit
1 parent d4fa5e0 commit cbf9fd2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,15 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
6565
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
6666

6767
> [!div class="mx-imgBorder"]
68-
> ![Image of policy details.](media/appconfigdetails.png)
68+
> ![Screenshot of policy details.](media/appconfigdetails.png)
6969
7070
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
7171

7272
> [!div class="mx-imgBorder"]
73-
> ![Image of how to select enable network protection policy](media/selectnp.png)
73+
> ![Screenshot of how to select enable network protection policy](media/selectnp.png)
7474
7575
> [!div class="mx-imgBorder"]
76-
> ![Image of add configuration policy.](media/npvalue.png)
76+
> ![Screenshot of add configuration policy.](media/npvalue.png)
7777
7878
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
7979

0 commit comments

Comments
 (0)