You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+15-38Lines changed: 15 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,36 +61,34 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
61
61
62
62
1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
63
63
64
-
> [!div class="mx-imgBorder"]
65
-
> 
66
-
64
+
> [!div class="mx-imgBorder"]
65
+
> 
66
+
67
67
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
68
68
69
-
> [!div class="mx-imgBorder"]
70
-
> 
71
-
69
+
> [!div class="mx-imgBorder"]
70
+
> 
71
+
72
72
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
73
73
74
-
> [!div class="mx-imgBorder"]
75
-
> 
76
-
77
-
> [!div class="mx-imgBorder"]
78
-
> 
79
-
74
+
> [!div class="mx-imgBorder"]
75
+
> 
76
+
77
+
> [!div class="mx-imgBorder"]
78
+
> 
79
+
80
80
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
81
81
82
82
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
83
83
84
84
**Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
85
85
86
-
> [!IMPORTANT]
86
+
> [!IMPORTANT]
87
87
> Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
88
88
>
89
89
> This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
90
90
91
-
Any other separation characters are invalid.
92
-
93
-
> 
91
+
Any other separation characters are invalid.
94
92
95
93
1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
96
94
@@ -118,28 +116,7 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
118
116
1. Add the required groups to which the policy has to be applied. Review and create the policy.
119
117
120
118
> [!NOTE]
121
-
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
122
-
123
-
## Configure Low Touch Onboarding
124
-
125
-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is simply required to provide a reduced set of permissions to complete onboarding.
126
-
127
-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
128
-
129
-
1. Push the Defender app to target user group by following these [steps](android-intune.md#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app).
130
-
2. Push a VPN profile to the user's device by following the instructions [here](android-intune.md#auto-setup-of-always-on-vpn).
131
-
3. In Apps > Application configuration policies, select Managed Devices.
132
-
4. Provide a name to uniquely identify the policy. Select 'Android Enterprise' as the Platform, the required Profile type and 'Microsoft Defender: Antivirus' as the targeted app. Click on Next.
133
-
5. Add runtime permissions. Select Location access (fine)(This permission is not supported for Android 13 and above), POST_NOTIFICATIONS and change the Permission state to 'Auto grant'.
134
-
6. Under configuration settings, select 'Use Configuration designer' and click on Add.
135
-
7. Select Low touch onboarding and User UPN. For User UPN, change the Value type to 'Variable' and Configuration value to 'User Principal Name' from the drop down Enable Low touch onboarding by changing the configuration value to 1.
136
-
>[!div class="mx-imgBorder"]
137
-
>
138
-
139
-
8. Assign the policy to the target user group.
140
-
9. Review and create the policy.
141
-
142
-
## Privacy Controls
119
+
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.## Privacy Controls
143
120
144
121
Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
0 commit comments