You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+8-18Lines changed: 8 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,8 @@ Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company
38
38
39
39
## Deploy on Device Administrator enrolled devices
40
40
41
+
(Intune and MDE will be ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024. Refer to [this article](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443) for more details.)
42
+
41
43
Learn how to deploy Defender for Endpoint on Android with Microsoft Intune Company Portal - Device Administrator enrolled devices.
42
44
43
45
### Add as Android store app
@@ -282,9 +284,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
282
284
283
285
1. Select **Low touch onboarding and User UPN**. For User UPN, change the value type to `Variable`, and set the configuration value to `User Principal Name`. Enable low-touch onboarding by changing its configuration value to `1`.
284
286
285
-
> [!div class="mx-imgBorder"]
286
-
> 
287
-
287
+
> [!div class="mx-imgBorder"]
288
288
> [!Note]
289
289
> Once the policy is created, these value types will show as string.
290
290
@@ -300,29 +300,19 @@ Admins can go to the [Microsoft Endpoint Management admin center](https://intune
300
300
301
301
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
302
302
303
-
> [!div class="mx-imgBorder"]
304
-
> 
305
-
303
+
> [!div class="mx-imgBorder"]
306
304
1. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
307
305
308
-
> [!div class="mx-imgBorder"]
309
-
> 
310
-
306
+
> [!div class="mx-imgBorder"]
311
307
1. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and click on **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
312
308
313
-
> [!div class="mx-imgBorder"]
314
-
> 
315
-
309
+
> [!div class="mx-imgBorder"]
316
310
1. The selected configuration will be listed. Change the **configuration value to 1** to enable Microsoft Defender support personal profiles. A notification will appear informing the admin about the same. Click on **Next**.
317
311
318
-
> [!div class="mx-imgBorder"]
319
-
> 
320
-
312
+
> [!div class="mx-imgBorder"]
321
313
1.**Assign** the configuration policy to a group of users. **Review and create** the policy.
322
314
323
-
> [!div class="mx-imgBorder"]
324
-
> 
325
-
315
+
> [!div class="mx-imgBorder"]
326
316
Admins also can set up **privacy controls** from the Microsoft Intune admin center to control what data can be sent by the Defender mobile client to the security portal. For more information, see [configuring privacy controls](android-configure.md).
327
317
328
318
Organizations can communicate to their users to protect Personal profile with Microsoft Defender on their enrolled BYOD devices.
0 commit comments