Skip to content

Commit ff94f51

Browse files
authored
Merge pull request #5328 from denishdonga27/docs-editor/android-configure-1761136395
Update android-configure.md
2 parents 9c485bc + 13eb10f commit ff94f51

File tree

1 file changed

+6
-8
lines changed

1 file changed

+6
-8
lines changed

defender-endpoint/android-configure.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Configure Microsoft Defender for Endpoint on Android features
33
description: Describes how to configure Microsoft Defender for Endpoint on Android
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.reviewer: denishdonga
88
ms.localizationpriority: medium
99
manager: bagol
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 06/05/2025
18+
ms.date: 10/23/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
@@ -130,14 +130,12 @@ Following privacy controls are available for configuring the data that is sent b
130130

131131
## Root Detection (Preview)
132132

133-
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, these events occur:
133+
Microsoft Defender for Endpoint has the ability to detect unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, the following events occur:
134134

135-
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
135+
- A high-risk alert is reported to the Microsoft Defender portal. If Device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136136

137-
- User data on app is cleared. When user opens the app after rooted.
137+
- User data on the app is cleared after the device has been detected as rooted. The feature is enabled by default; no action is required from admin or user.
138138

139-
The feature is enabled by default; no action is required from admin or user. Any android device running Defender version **1.0.8125.0302** (or later) will have it activated.
140-
141139
**Prerequisite**
142140

143141
- Company portal must be installed, and version must be >=5.0.6621.0

0 commit comments

Comments
 (0)