mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Various fixes: Acrolinx spelling, layout, note styles, indentation
This commit is contained in:
@ -54,30 +54,28 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
|
||||
|
||||
2. On the **Add app** page and in the *App Information* section enter:
|
||||
- **Name**
|
||||
- **Description**
|
||||
- **Publisher** as Microsoft.
|
||||
- **Appstore URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Microsoft Defender ATP Preview app Google Play Store URL)
|
||||
|
||||
Other fields are optional. Select **Next**.
|
||||
- **Name**
|
||||
- **Description**
|
||||
- **Publisher** as Microsoft.
|
||||
- **Appstore URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Microsoft Defender ATP Preview app Google Play Store URL)
|
||||
|
||||

|
||||
Other fields are optional. Select **Next**.
|
||||
|
||||
3. In the *Assignments* section, go to the **Required** section and select **Add
|
||||
group.** You can then choose the user group(s) that you would like to target
|
||||
Microsoft Defender ATP for Android app. Click **Select** and then **Next**.
|
||||

|
||||
|
||||
3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Microsoft Defender ATP for Android app. Click **Select** and then **Next**.
|
||||
|
||||
>[!NOTE]
|
||||
>The selected user group should consist of Intune enrolled users.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
6. In the **Review+Create** section, verify that all the information entered is
|
||||
correct and then select **Create**.
|
||||
6. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**.
|
||||
|
||||
In a few moments, the Microsoft Defender ATP app would be created successfully,
|
||||
and a notification would show up at the top-right corner of the page.
|
||||
In a few moments, the Microsoft Defender ATP app would be created successfully, and a notification would show up at the top-right corner of the page.
|
||||
|
||||

|
||||
|
||||
@ -86,7 +84,8 @@ and a notification would show up at the top-right corner of the page.
|
||||
select **Device install status** to verify that the device installation has
|
||||
completed successfully.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
### Complete onboarding and check status
|
||||
@ -98,8 +97,8 @@ completed successfully.
|
||||
2. Tap the Microsoft Defender ATP app icon and follow the on-screen instructions
|
||||
to complete onboarding the app. The details include end-user acceptance of Android permissions required by Microsoft Defender ATP for Android.
|
||||
|
||||
>[!NOTE]
|
||||
>If you already have **preview version of Microsoft Defender ATP app** installed, follow onboarding instruction to replace the existing version of app
|
||||
> [!NOTE]
|
||||
> If you already have **preview version of Microsoft Defender ATP app** installed, follow onboarding instruction to replace the existing version of app
|
||||
|
||||
3. Upon successful onboarding, the device will start showing up on the Devices
|
||||
list in Microsoft Defender Security Center.
|
||||
@ -130,7 +129,8 @@ Defender ATP app into your managed Google Play.
|
||||
center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
|
||||
**Android Apps** \> **Add** and select **managed Google Play app**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
2. On your managed Google Play page that loads subsequently, go to the search
|
||||
@ -144,7 +144,8 @@ ATP app from the Apps search result.
|
||||
details on Microsoft Defender ATP. Review the information on the page and then
|
||||
select **Approve**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
4. You should now be presented with the permissions that Microsoft Defender ATP
|
||||
@ -161,13 +162,15 @@ Android might ask. Review the choices and select your preferred option. Select
|
||||
By default, managed Google Play selects *Keep approved when app requests new
|
||||
permissions*
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
6. After the permissions handling selection is made, select **Sync** to sync
|
||||
Microsoft Defender ATP to your apps list.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
7. The sync will complete in a few minutes.
|
||||
@ -177,48 +180,55 @@ Microsoft Defender ATP to your apps list.
|
||||
8. Select the **Refresh** button in the Android apps screen and Microsoft
|
||||
Defender ATP should be visible in the apps list.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
9. Microsoft Defender ATP supports App configuration policies for managed devices via Intune. This capability can be leveraged to autogrant applicable Android permission(s), so the end user does not need to accept these permission(s).
|
||||
|
||||
a. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**.
|
||||
1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**.
|
||||
|
||||

|
||||

|
||||
|
||||
b. In the **Create app configuration policy** page, enter the following details:
|
||||
1. In the **Create app configuration policy** page, enter the following details:
|
||||
|
||||
- Name: Microsoft Defender ATP.
|
||||
- Choose **Android Enterprise** as platform.
|
||||
- Choose **Work Profile only** as Profile Type.
|
||||
- Click **Select App**, choose **Microsoft Defender ATP**, select **OK** and then **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
c. In the **Settings** page, go to the Permissions section click on Add to view the list of supported permissions. In the Add Permissions section, select the following permissions
|
||||
- External storage (read)
|
||||
- External storage (write)
|
||||
1. In the **Settings** page, go to the Permissions section click on Add to view the list of supported permissions. In the Add Permissions section, select the following permissions:
|
||||
|
||||
Then select **OK**.
|
||||
- External storage (read)
|
||||
- External storage (write)
|
||||
|
||||

|
||||
Then select **OK**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||
|
||||
|
||||
d. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**.
|
||||
1. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
e. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender ATP Android app.
|
||||
1. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender ATP Android app.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
f. In the **Review + Create** page that comes up next, review all the information and then select **Create**. <br>
|
||||
1. In the **Review + Create** page that comes up next, review all the information and then select **Create**. <br>
|
||||
|
||||
The app configuration policy for Microsoft Defender ATP auto-granting the storage permission is now assigned to the selected user group.
|
||||
|
||||

|
||||
The app configuration policy for Microsoft Defender ATP auto-granting the storage permission is now assigned to the selected user group.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
10. Select **Microsoft Defender ATP** app in the list \> **Properties** \>
|
||||
@ -232,7 +242,8 @@ the device via Company Portal app. This assignment can be done by navigating to
|
||||
the *Required* section \> **Add group,** selecting the user group and click
|
||||
**Select**.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
12. In the **Edit Application** page, review all the information that was entered
|
||||
@ -245,7 +256,8 @@ assignment.
|
||||
clicking on the **Device Install Status**. Verify that the device is
|
||||
displayed here.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
|
||||
2. On the device, you can confirm the same by going to the **work profile** and
|
||||
|
Reference in New Issue
Block a user