Archive
Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

2024-11-13 Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune Article10/11/2024 In this article Applies to: Want to ex

Related articles

ÖÐÄÏ´óѧPKºþÄÏ´óѧ VPN Lumos v1.50.20 MOD APK (Pro Unlocked) for Android 俄罗斯VPN服务:快速、安全地获取俄罗斯IP地址

Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  • Article

Applies to:

Want to experience Microsoft Defender for Endpoint? Sign up for a free trial.

Learn deploy Defender Endpoint Android Microsoft Intune Company Portal enrolled devices . information Microsoft Intune device enrollment , Enroll device .

Note

Defender for Endpoint on Android is now available on Google Play

You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across Device Administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.

Deploy on Device Administrator enrolled devices

Learn how to deploy Defender for Endpoint on Android with Microsoft Intune Company Portal – Device Administrator enrolled devices.

Add Android store app

  1. In Microsoft Intune admin center , go to Apps >
    Android Apps > Add > Android store app and choose Select.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  2. On theAdd app page and in the App Information section is enter enter :

    Other fields are optional. SelectNext.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  3. In theAssignments section, go to the Required section and select Add group. You can then choose the user group (or groups) to receive the Defender for Endpoint on Android app. ChooseSelect and then Next.

    Note

    The selected user group should consist of Intune enrolled users.

  4. In theReview+Create section, verify that all the information entered is correct and then select Create.

    moments , Defender Endpoint app created successfully , notification upper right corner screen .

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  5. In theapp information page that is displayed, in the Monitor section, selectDevice install status to verify that the device installation completed successfully.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

Complete onboarding and check status

  1. Once Defender for Endpoint on Android has been installed on the device, you should see the app icon.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  2. Tap the Microsoft Defender for Endpoint app icon, and follow the on-screen instructions to complete onboarding the app. The details include end-user acceptance of Android permissions required by Defender for Endpoint on Android.

  3. Upon successful onboarding, the device shows up in the list of devices in the Microsoft Defender portal.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

Deploy on Android Enterprise enrolled devices

Defender for Endpoint on Android supports Android Enterprise enrolled devices.

For more information on the enrollment options supported by Microsoft Intune, see Enrollment Options.

Currently, Personally-owned devices with work profile, Corporate-owned devices with work profile, and Corporate-owned fully managed user device enrollments are supported in Android Enterprise.

Add Microsoft Defender for Endpoint on Android as a Managed Google Play app

Follow the steps below to add Microsoft Defender for Endpoint app into your managed Google Play.

  1. In Microsoft Intune admin center , go to Apps > Android Apps > Add and select Managed Google Play app.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  2. On your managed Google Play page that loads, go to the search box and type Microsoft Defender. search is display display Microsoft Defender Endpoint app Managed Google Play . SelectMicrosoft Defender Endpoint app Apps search results .

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  3. In theApp description page, you should be able to see app details about the Defender for Endpoint app. Review the information on the page and then select Approve.

  4. When you’re prompted to approve permissions for Defender for Endpoint obtains, review he information, and then select Approve.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  5. On theApproval settings page, review your preference to handle new app permissions that Defender for Endpoint on Android might ask. Review the choices and select your preferred option. SelectDone.

    By default, managed Google Play selects Keep approved when app requests new permissions.

  6. After the permissions handling selection is made, selectSync sync Microsoft Defender Endpoint apps list .

  7. The sync completes in a few minutes.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  8. Selectthe Refresh button is be Android apps screen Microsoft Defender Endpoint visible apps list .

  9. Defender is supports Endpoint supports App configuration policies managed devices Microsoft Intune . capability select different configurations Defender Endpoint .

    1. In theApps page, go to Policy > App configuration policies > Add > Managed devices.

      Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

    2. In theCreate app configuration policy page, enter the following details:

      • Name: Microsoft Defender for Endpoint.
      • ChooseAndroid Enterprise platform .
      • ChoosePersonally-owned Work Profile only or Fully Managed, Dedicated, and Corporate-owned work profile only as Profile Type.
      • SelectSelectApp, choose Microsoft Defender, selectOK and then Next.

      Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

    3. SelectPermissions > Add. From the list, selectthe available app permissions > OK.

    4. Selectan option for each permission to grant with this policy:

      • Prompt – Prompts the user to accept or deny.
      • Auto grant – Automatically approves without notifying the user.
      • Auto deny – Automatically denies without notifying the user.
    5. Go to the Configuration settings section and choose ‘Use configuration designer’ in Configuration settings format.

      Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

    6. SelectAdd to view a list of supported configurations. Selectthe required configuration and select Ok.

      Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

    7. You should see all the selected configurations listed. You can change the configuration value as required and then select Next.

      Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

    8. In theAssignments page, selectthe user group to which this app config policy would be assigned. SelectSelectgroups to include and selecting the applicable group and then selecting Next. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.

    9. In theReview + Create page that comes up next, review all the information and then select Create.

      The app configuration policy for Defender for Endpoint is now assigned to the selected user group.

  10. SelectMicrosoft Defender app in the list > Properties >
    Assignments > Edit.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  11. Assign the app as a Required app to a user group. It’s automatically installed in the work profile during the next sync of the device via Company Portal app. This assignment can be done by navigating to the Required section > Add group, selecting the appropriate user group, and then choosing Select.

  12. In theEdit Application page , review information entered earlier . selectReview + Save and then Save commence assignment .

Auto Setup of Always-on VPN

Defender for Endpoint supports Device configuration policies for managed devices via Microsoft Intune. This capability can be used to Auto setup – VPN Android Enterprise enrolled devices , end user need set VPN service onboarding .

  1. On Devices, selectConfiguration Profiles > Create Profile > Platform > Android Enterprise. SelectDevice restrictions under one of the following, based on your device enrollment type:

    • Fully Managed, Dedicated, and Corporate-Owned Work Profile
    • Personally owned Work Profile

    Then, selectCreate.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  2. Configuration Settings. Provide a Name and a Description to uniquely identify the configuration profile.

  3. SelectConnectivity and configure your VPN:

    • Enable Always-on VPN. Setup a VPN client in the work profile to automatically connect and reconnect to the VPN whenever possible. Only one VPN client can be configured for always-on VPN on a given device, so be sure to have no more than one always-on VPN policy deployed to a single device.

    • SelectCustom in VPN client dropdown list. Custom VPN in this case is Defender for Endpoint VPN, which is used to provide the Web Protection feature.

      Note

      Microsoft Defender for Endpoint app must be installed on user’s device, in order to functioning of auto setup of this VPN.

    • Enter Package ID Microsoft Defender Endpoint app Google Play store . Defender app URL , package ID is iscom.microsoft.scmx.

    • SetLockdown mode to Not configured (Default).

  4. Assignment. On theAssignments page, selectthe user group to which this app config policy would be assigned. ChooseSelectgroups include selecting applicable group selectNext.

    The group to select is typically the same group to which you would assign Microsoft Defender for Endpoint Android app.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  5. In theReview + Create page that comes up next, review all the information and then select Create.
    The device configuration profile is now assigned to the selected user group.

Check status complete onboarding

  1. Confirm the installation status of Microsoft Defender for Endpoint on Android by clicking on the Device Install Status. Verify that the device is displayed here.

  2. On thedevice, you can validate the onboarding status by going to the work profile. Confirm that Defender for Endpoint is available and that you’re enrolled to the Personally owned devices with work profile. If you’re enrolled to a Corporate-owned, fully managed user device, you is have single profile device confirm Defender Endpoint available .

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  3. When the app is installed, open the app and accept the permissions and then your onboarding should be successful.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

  4. At this point, the device is successfully onboarded onto Defender for Endpoint on Android. You can verify this on the Microsoft Defender portal by navigating to the Device Inventory page.

    Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune

Configure low-touch onboarding

Note

feature is is currently preview . Information is relates section relates prerelease product substantially modified commercially released . Microsoft is makes makes warranties , express implied , respect information provided .

Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is required to provide a reduced set of permissions to complete onboarding.

Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:

  1. Push the Defender app to target user group by following the steps in the section, Add Microsoft Defender for Endpoint on Android as a Managed Google Play app (in this article).

  2. Push VPN profile user device following instructions section , Auto Setup – VPN ( article ) .

  3. In Apps > Application configuration policies, selectManaged Devices.

  4. Provide a name to uniquely identify the policy.

    • For Platform, selectAndroid Enterprise.
    • Selectthe required profile type.
    • For the targeted app, selectMicrosoft Defender: Antivirus.

    Then select Next.

  5. Add runtime permissions. SelectLocation access ( fine ), POST_NOTIFICATIONS and change the Permission state to Auto grant. (This permission is not supported for Android 13 and later.)

  6. UnderConfiguration settings, selectUse Configuration designer, and then select Add.

  7. SelectLow touch onboarding and User UPN. For User UPN, change the value type to Variable, set configuration valueUser Principal. Enable low – touch onboarding changing configuration value1.

Note

Once the policy is created, these value types will show as string.

  1. Assign the policy to the target user group.

  2. Review and create the policy.

Setup Microsoft Defender in Personal Profile on Android Enterprise in BYOD mode

Setup Microsoft Defender in Personal Profile

Admins can go to the Microsoft Endpoint Management admin center to set up and configure Microsoft Defender support in personal profiles by following these steps:

  1. Go to Apps> App configuration policies clickAdd. SelectManaged Devices.

  2. Enter Name and Description to uniquely identify the configuration policy. Selectplatform as ‘Android Enterprise’, Profile type as ‘Personally-owned work profile only’ and Targeted app as ‘Microsoft Defender’.

  3. On thesettings page, in ‘Configuration settings format’, select‘Use configuration designer’ clickAdd. From the list of configurations that are displayed, select‘Microsoft Defender in Personal profile’.

  4. The selected configuration will be listed. Change the configuration value to 1 enable Microsoft Defender support personal profiles . notification is appear appear informing admin . ClickNext.

  5. Assign the configuration policy to a group of users. Review and create the policy.

Admins also can set up privacy controls from the Microsoft Intune admin center to control what data can be sent by the Defender mobile client to the security portal. For more information, see configuring privacy controls.

Organizations can communicate to their users to protect Personal profile with Microsoft Defender on their enrolled BYOD devices.

  • Pre-requisite: Microsoft Defender must be already installed and active in work profile to enabled Microsoft Defender in personal profiles.

Finish onboarding a device

  1. Install the Microsoft Defender application in a personal profile with a personal Google Play store account.

  2. Install the Company portal application on personal profile. No sign-in is required.

  3. user launches application , they is see sign – screen .Login using corporate account only.

  4. After signing in successfully, users see the following screens:

    1. EULA screen: Presented only if the user has not consented already in the Work profile.
    2. Notice screen: Users need to provide consent on this screen to move forward with onboarding the application. This is required only during the first run of the app.
  5. Provide required permissions complete onboarding .

    Note

    Pre-requisites:

    1. Company portal is needs needs enabled personal profile .
    2. Microsoft Defender needs to be already installed and active in work profile.

Related articles