Skip to content

Commit fd8a347

Browse files
authored
Merge pull request #4451 from denishdonga27/docs-editor/android-configure-1752055503
Update android-configure.md
2 parents 2fb4ab1 + b73fee1 commit fd8a347

File tree

1 file changed

+3
-69
lines changed

1 file changed

+3
-69
lines changed

defender-endpoint/android-configure.md

Lines changed: 3 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181181

182-
### Configure privacy for device administrator mode
183-
184-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185-
186-
> [!NOTE]
187-
> By default, this is turned off for devices enrolled with device admin mode.
188-
189-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
190-
191-
- **Platform**: Select Android device administrator
192-
- **Profile**: Select "Custom" and select Create.
193-
194-
2. In the **Basics** section, specify a name and description of the profile.
195-
196-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
197-
198-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
199-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderTVMPrivacyMode**
200-
- Data type: Select Integer in the drop-down list.
201-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202-
203-
4. Select **Next** and assign this profile to targeted devices/users.
204-
205182
### Configure privacy for Android Enterprise work profile
206183

207184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222199

223200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224201

225-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226-
227-
Use the following steps to turn it on for targeted users:
228-
229-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
230-
231-
- **Platform**: Select Android device administrator.
232-
- **Profile**: Select "Custom" and select **Create**.
233-
234-
2. In the **Basics** section, specify a name and description of the profile.
235-
236-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
237-
238-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
239-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeURLInReport**
240-
- Data type: Select Integer in the drop-down list.
241-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242-
243-
4. Select **Next** and assign this profile to targeted devices/users.
244-
245-
Using this privacy control won't affect the device compliance check or conditional access.
246-
247202
### Configure privacy for phishing alert report on Android Enterprise work profile
248203

249204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263218

264219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265220

266-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267-
268-
Use the following steps to turn it on for targeted users:
269-
270-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
271-
272-
- **Platform**: Select Android device administrator.
273-
- **Profile**: Select "Custom" and select **Create**.
274-
275-
2. In the **Basics** section, specify a name and description of the profile.
276-
277-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
278-
279-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
280-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport**
281-
- Data type: Select Integer in the drop-down list.
282-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283-
284-
4. Select **Next** and assign this profile to targeted devices/users.
285-
286-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287-
288221
### Configure privacy for malware alert report on Android Enterprise work profile
289222

290223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310243
3. Select **Microsoft Defender for Endpoint** as the target app.
311-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312245

313-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247+
314248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315249

316250
5. Select **Next** and assign this profile to targeted devices and users.

0 commit comments

Comments
 (0)