You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mtd.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Microsoft Defender for Endpoint - Mobile Threat Defense
3
-
ms.reviewer: tdoucette, sunasing
3
+
ms.reviewer: tdoucette, sunasing, denishdonga
4
4
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
5
5
ms.service: defender-endpoint
6
6
ms.subservice: onboard
7
-
ms.author: denishdonga
8
-
author: denishdonga27
7
+
ms.author: deniseb
8
+
author: denisebmsft
9
9
ms.localizationpriority: medium
10
-
ms.date: 11/15/2024
10
+
ms.date: 12/02/2024
11
11
manager: deniseb
12
12
audience: ITPro
13
13
ms.collection:
@@ -37,7 +37,7 @@ Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
37
37
|Capability|Description|
38
38
|---|---|
39
39
|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators aren't currently supported.)|
40
-
|Malware Protection (Android-only)|Scanning for malicious apps.|
40
+
|Malware Protection (Android-only)|Scanning for malicious apps and APK Files.|
41
41
|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
42
42
|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](/defender-vulnerability-management/defender-vulnerability-management) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
43
43
|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to add to the "allow" list the root CA and private root CA certificates in Intune; establish trust with endpoints.|
0 commit comments