You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-install.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,42 +37,42 @@ This topic describes deploying Defender for Endpoint on iOS on Microsoft Intune
37
37
38
38
- Ensure iOS enrollment is done for your users. Users need to have a Defender for Endpoint license assigned in order to use Defender for Endpoint on iOS. Refer to [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign) for instructions on how to assign licenses.
39
39
40
-
- Ensure the end users have company portal app installed, signed in and enrollment completed.
40
+
- Ensure the end users have company portal app installed, signed inC, and enrollment completed.
41
41
42
42
> [!NOTE]
43
43
> Microsoft Defender for Endpoint on iOS is available in the [Apple App Store](https://aka.ms/mdatpiosappstore).
44
44
45
45
This section covers:
46
46
47
-
1.**Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step is not needed for VPP (volume purchase) apps.
47
+
1.**Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step isn't needed for VPP (volume purchase) apps.
48
48
49
49
1.**Complete deployment** (only for Supervised devices)- Admins can select to deploy any one of the given profiles.
50
50
1.**Zero touch (Silent) Control Filter** - Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
51
51
1.**Control Filter** - Provides Web Protection without the local loopback VPN.
52
52
53
53
1.**Automated Onboarding setup** (only for **Unsupervised** devices) - Admins can automate the Defender for Endpoint onboarding for users in two different ways:
54
54
1.**Zero touch (Silent) Onboarding** - App is automatically installed and activated without the need for users to open the app.
55
-
1.**Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step is not recommended in Zero touch configurations.
55
+
1.**Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step isn't recommended in Zero touch configurations.
56
56
57
57
1.**User Enrollment setup** (only for Intune User Enrolled devices) - Admins can deploy and configure the Defender for Endpoint app on the Intune User Enrolled devices also.
58
58
59
-
1.**Complete onboarding and check status** - This step is applicable for all enrollment types to ensure app is installed on the device, onboarding is completed and device is visible in the Microsoft Defender portal. It can be skipped for the zero touch (silent) onboarding.
59
+
1.**Complete onboarding and check status** - This step is applicable for all enrollment types to ensure app is installed on the device, onboarding is completed, and device is visible in the Microsoft Defender portal. It can be skipped for the zero touch (silent) onboarding.
60
60
61
61
## Deployment steps (applicable for both Supervised and Unsupervised devices)
62
62
63
63
Deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal.
64
64
65
65
### Add iOS store app
66
66
67
-
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and click**Select**.
67
+
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and select**Select**.
68
68
69
69
:::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
70
70
71
-
1. On the **Add app** page, click on **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, click on *Microsoft Defender* and click**Select**.
71
+
1. On the **Add app** page, select **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, select *Microsoft Defender* and select**Select**.
72
72
73
-
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and click**Next**.
73
+
1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and select**Next**.
74
74
75
-
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user group(s) that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
75
+
1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user groups that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
76
76
77
77
> [!NOTE]
78
78
> The selected user group should consist of Microsoft Intune enrolled users.
@@ -120,7 +120,7 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
120
120
121
121
1. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
122
122
123
-
1. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it is best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
123
+
1. On the **Assignments** page, select the groups that receive this profile. For this scenario, it's best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
124
124
125
125
When deploying to user groups, a user must sign in to a device before the policy applies.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-saltack.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ There are two ways you can create the Saltstack state files:
98
98
```
99
99
100
100
> [!NOTE]
101
-
> The installer script also supports other parameters such as channel (insiders-fast, insiders-slow, prod (default) ), realtime protection, version, etc. To select from the list of available options, check help through the following command:
101
+
> The installer script also supports other parameters such as channel (insiders-fast, insiders-slow, prod (default) ), real-time protection, version, etc. To select from the list of available options, check help through the following command:
102
102
>```./mde_installer.sh --help```
103
103
104
104
### Create Saltstack state files by manually configuring repositories
@@ -116,14 +116,14 @@ In this step, you create a SaltState state file in your configuration repository
116
116
> In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
117
117
118
118
> [!WARNING]
119
-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
119
+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, reconfigure your device to use the new channel, and follow the steps in this document to install the package from the new location.
120
120
121
121
1. Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
122
122
123
123
2. In the following commands, replace *[distro]* and *[version]* with your information.
124
124
125
125
> [!NOTE]
126
-
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
126
+
> For Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel." For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-static-proxy-configuration.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ During installation, the `HTTPS_PROXY` environment variable must be passed to th
48
48
```
49
49
50
50
> [!CAUTION]
51
-
> Note that above two methods could define the proxy to use for other applications on your system. Use this method with caution, or only if this is meant to be a generally global configuration.
51
+
> The above two methods could define the proxy to use for other applications on your system. Use this method with caution, or only if this is meant to be a global configuration.
52
52
53
53
- The `HTTPS_PROXY` variable is prepended to the installation or uninstallation commands. For example, with the APT package manager, prepend the variable as follows when installing Microsoft Defender for Endpoint:
54
54
@@ -57,11 +57,11 @@ During installation, the `HTTPS_PROXY` environment variable must be passed to th
57
57
```
58
58
59
59
> [!NOTE]
60
-
> Do not add sudo between the environment variable definition and apt, otherwise the variable will not be propagated.
60
+
> Don't add sudo between the environment variable definition and apt, otherwise the variable won't be propagated.
61
61
62
62
The `HTTPS_PROXY` environment variable may similarly be defined during uninstallation.
63
63
64
-
Note that installation and uninstallation will not necessarily fail if a proxy is required but not configured. However, telemetry won't be submitted, and the operation could take longer due to network timeouts.
64
+
Installation and uninstallation won't necessarily fail if a proxy is required but not configured. However, telemetry won't be submitted, and the operation could take longer due to network timeouts.
0 commit comments