Skip to content

Commit f4111d4

Browse files
authored
Merge pull request #987 from itsmukta/docs-editor/ios-configure-features-1721633194
Update ios-configure-features.md
2 parents fa22ff8 + 86e1cfb commit f4111d4

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

defender-endpoint/ios-configure-features.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 07/18/2024
17+
ms.date: 07/22/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -97,6 +97,9 @@ Use the following steps to disable web protection for unenrolled devices.
9797
- Defender for Endpoint sends the heartbeat to the Microsoft Defender portal whenever a user opens the app.
9898
- Select **Next**, and then assign this profile to targeted devices/users.
9999

100+
> [!NOTE]
101+
> The `WebProtection` key is not applicable for the Control Filter in the list of supervised devices. If you want to disable web protection for supervised devices, you can remove the Control Filter profile.
102+
100103
## Configure network protection
101104

102105
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to configure network protection. This configuration is available for both enrolled devices through MDM config and unenrolled devices through MAM config.
@@ -275,8 +278,8 @@ End users install and open the Microsoft Defender app to start onboarding.
275278

276279
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are jailbroken. These jailbreak checks are done periodically. If a device is detected as jailbroken, these events occur:
277280

278-
- High-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
279-
- User data on app is cleared. When user opens the app after jailbreaking the VPN profile also is deleted and no web protection is offered.
281+
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
282+
- User data on app is cleared. When user opens the app after jailbreaking, the VPN profile (only Defender for Endpoint loopback VPN Profile) also is deleted, and no web protection is offered. VPN profiles delivered by Intune are not removed.
280283

281284
### Configure compliance policy against jailbroken devices
282285

0 commit comments

Comments
 (0)