7

Announcing Microsoft Defender ATP for Android

 1 year ago
source link: https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-microsoft-defender-atp-for-android/ba-p/1480787
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Announcing Microsoft Defender ATP for Android%3CLINGO-SUB%20id%3D%22lingo-sub-1487350%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1487350%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20so%20awesome!%20Can't%20wait%20to%20try%20it%20out.%3C%2FP%3E%3CP%3EI%20know%20IOS%20is%20%22later%20this%20year%22%20but%20is%20there%20any%20more%20information%20if%20it%20is%20in%20Q3%20or%20Q4%3F%3CBR%20%2F%3E%3CBR%20%2F%3EHave%20a%20great%20you%20all!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1487830%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1487830%22%20slang%3D%22en-US%22%3E%3CP%3Egreat%20work!%20this%20is%20amazing!%20%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Flaugh_40x40.gif%22%20alt%3D%22%3Alol%3A%22%20title%3D%22%3Alol%3A%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1488383%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1488383%22%20slang%3D%22en-US%22%3E%3CP%3EShould%20we%20assume%20an%20E5%20license%20is%20required%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1488877%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1488877%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20to%20see%20the%20move%20into%20protection%20of%20Mobile%20as%20its%20needed%2C%20big%20concern%20is%20privacy%20of%20these%20users%20as%20it%20looks%20like%20the%20detection%20is%20in%20the%20cloud%2C%20could%20you%20confirm%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1500637%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1500637%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F321134%22%20target%3D%22_blank%22%3E%40bthomas%3C%2FA%3E%26nbsp%3B-%20Sorry%20about%20the%20inconvenience%20caused.%20Your%20second%20e-mail%20for%20preview%20just%20came%20thru%20and%20has%20been%20approved.%20Sorry%2C%20your%20first%20e-mail%20doesn't%20seem%20to%20have%20made%20it%20thru%20and%20thanks%20for%20following%20up.%20Look%20forward%20to%20your%20feedback%20on%20the%20preview.%20Preview%20instructions%20are%20available%20in%20the%20e-mail%20sent%20to%20you.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3EAshwin%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1500628%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1500628%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20long%20does%20it%20take%20for%20the%20preview%20to%20be%20activated%3F%26nbsp%3B%3CBR%20%2F%3EI've%20send%20out%20a%20mail%20to%26nbsp%3B%3CA%20href%3D%22mailto%3Amdatpmobile%40microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Emdatpmobile%40microsoft.com%3C%2FA%3E%26nbsp%3Bwith%20our%20Google%20Play%20org%20ID%2C%20but%20one%20week%20later%20we%20haven't%20got%20a%20reply%20nor%20are%20we%20able%20to%20import%20the%20Defender%20app%20in%20Google%20Play%20for%20Android%20Enterprise.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1500644%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1500644%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F427466%22%20target%3D%22_blank%22%3E%40ashwin123%3C%2FA%3E%26nbsp%3BThanks%20for%20the%20follow%20up%20and%20response!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1502013%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1502013%22%20slang%3D%22en-US%22%3E%3CP%3EI%20would%20also%20be%20interested%20about%20the%20licensing%20prerequisites.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1502944%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1502944%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22TextRun%20SCXW6269485%20BCX0%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW6269485%20BCX0%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F395228%22%20target%3D%22_blank%22%3E%40Simes27622762%3C%2FA%3E%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F4852%22%20target%3D%22_blank%22%3E%40Friedrich%20Grosseibel%3C%2FA%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW6269485%20BCX0%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW6269485%20BCX0%22%3ELicensing%20details%20around%20Android%20and%20iOS%20will%20become%20available%20as%20we%20get%20closer%20to%20GA%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1503087%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1503087%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703967%22%20target%3D%22_blank%22%3E%40Kanishka_Srivastava%3C%2FA%3E%20No%20hints%20then%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1503100%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1503100%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F395228%22%20target%3D%22_blank%22%3E%40Simes27622762%3C%2FA%3E%26nbsp%3B-%20we%20don't%20have%20any%20details%20or%20hints%20on%20the%20licensing%20to%20share%20at%20this%20time.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1503933%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1503933%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20Android%20versions%20are%20supported%3F%20All%20the%20way%20back%20to%20Marshmallow%2C%20or%20something%20different%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1503936%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1503936%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F614206%22%20target%3D%22_blank%22%3E%40VesaP1695%3C%2FA%3E%26nbsp%3B-%20Android%206.0%20(Marshmallow)%20%26amp%3B%20above.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1506399%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1506399%22%20slang%3D%22en-US%22%3E%3CP%3EMy%20test%20device%20is%20a%20Blackberry%20Key2%20and%20I%20do%20not%20see%20a%20big%20decrease%20with%20the%20battery.%20On%20the%20other%20hand%20I%20only%20use%20the%20device%20for%20testing%20so%20I%20can%E2%80%99t%20tell.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EThat%20the%20app%20needs%20to%20be%20constantly%20running%20however%20is%20understandable%20in%20my%20opinion.%20I%20guess%20however%20this%20can%20be%20tuned%20in%20future%20releases.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EI%20am%20looking%20forward%20to%20the%20iOS%20variant%20of%20the%20ATP%20protection%20where%20this%20for%20sure%20is%20more%20tricky%20in%20regards%20of%20background%20activity%20etc.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1509637%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1509637%22%20slang%3D%22en-US%22%3E%3CP%3E%22%3CSPAN%3EIt%20doesn't%20include%20any%20timeline%20info%20in%20the%20security%20center%3C%2FSPAN%3E%22%3C%2FP%3E%3CP%3Eand%20IMHO%20it%20should%20stay%20this%20way%20to%20avoid%20battery%20drain%20or%20hitting%20mobile%20data%20limit%20on%20metered%20data%20plan.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1509652%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1509652%22%20slang%3D%22en-US%22%3E%3CP%3E%22%3CSPAN%3Eand%20IMHO%20it%20should%20stay%20this%20way%20to%20avoid%20battery%20drain%20or%20hitting%20mobile%20data%20limit%20on%20metered%20data%20plan.%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EAgreed%20-%20was%20just%20pointing%20it%20out%20in%20case%20anyone%20was%20wondering.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1511817%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1511817%22%20slang%3D%22en-US%22%3E%3CP%3ERunning%20this%20on%20my%20OnePlus%206T%20without%20any%20concerning%20battery%20issues%20so%20far.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAre%20there%20plans%20to%20have%20software%20inventory%20and%20discovered%20vulnerabilities%20for%20the%20mobile%20devices%3F%20I'm%20also%20wondering%20is%20this%20would%20then%20show%20the%20apps%20that%20are%20not%20running%20in%20the%20Android%20Enterprise%20Work%20Profile%20or%20also%20apps%20running%20in%20the%20personal%20profile.%20Having%20COPE%20in%20mind%20for%20future%20deployments%2C%20this%20will%20be%20important%20for%20some%20customers.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1537641%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1537641%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Rocks%20!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1537805%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1537805%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20have%26nbsp%3Bmalicious%20URLs%20blocked%20at%20ATP%2F%20MS%20365%20Security%2C%20on%20the%20windows%20Client%20the%20Defender%20is%20blocking%20it%20successfully%26nbsp%3Bbut%20on%20the%20Android%20this%20URL%20still%20available%2C%20the%20MSATP%20do%20nothing.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20Android%20Device%20is%20also%20available%2Fregister%20at%26nbsp%3BMicrosoft%20Defender%20Security%20Center%20with%20Health%20State%20%22active%22%20but%20Exposure%20level%20%22No%20data%20available%22%20and%20Risk%20Level%20%22No%20know%20risk%22%20%3A(.%20Last%20seen%20from%20today%2C%20so%20I%20assume%20that%20the%20connection%20between%20ATP%20and%20the%20Android%20Device%20is%20%22alive%22.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20send%20a%20Mail%20to%20%22atpm%40microsoft.com%22%26nbsp%3Band%20also%20as%20Feedback%20trough%20the%20App%20but%20still%20no%20receive%20any%20%22help%22%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703967%22%20target%3D%22_blank%22%3E%40Kanishka_Srivastava%3C%2FA%3E%26nbsp%3B%26nbsp%3B%2C%20could%20you%20please%20tell%20me%20who%20I%20need%20to%20contact%20for%20this%20issue%2F%20problem%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1541278%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1541278%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F472431%22%20target%3D%22_blank%22%3E%40Mela1984%3C%2FA%3E%26nbsp%3Bthanks%20for%20reaching%20out.%20We'll%20work%20with%20you%20over%20mail%20to%20troubleshoot%20the%20issue.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1542508%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1542508%22%20slang%3D%22en-US%22%3E%3CP%3EExcited%20to%20try%20this%20out.%20Glad%20to%20see%20experiences%20so%20far%20have%20been%20good.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1549998%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1549998%22%20slang%3D%22en-US%22%3E%3CP%3EAny%20visibility%20as%20to%20when%20this%20will%20be%20available%20in%20GCC%20High%2FAzure%20Gov%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1506298%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1506298%22%20slang%3D%22en-US%22%3E%3CP%3EFirst%20impressions%3A%20I%20onboarded%20my%20android%20phone%20the%20day%20this%20was%20announced.%26nbsp%3B%20We're%20encouraged%20by%20this%20as%20an%20alternative%20to%20options%20such%20as%20Lookout.%26nbsp%3B%20Onboarding%20was%20easy%20enough%2C%20but%20it%20opens%20a%20persistent%20connection%20to%20Microsoft%2C%20and%20takes%20up%20far%20more%20power%20than%20any%20other%20applications%20on%20my%20phone%20(20%25).%26nbsp%3B%20It%20actually%20%22overloaded%22%20my%20s10%20and%20was%20forced%20to%20shut%20down.%26nbsp%3B%20I%20haven't%20had%20that%20happen%20before.%26nbsp%3B%20Feedback%20has%20been%20submitted.%26nbsp%3B%20I%20understand%20this%20is%20in%20preview%20and%20it%20will%20be%20improved%20before%20general%20availability.%26nbsp%3B%20I%20will%20say%20that%20it%20will%20require%20a%20good%20deal%20of%20attention%20to%20power%20usage%20if%20it's%20going%20to%20be%20something%20our%20organization%20can%20use.%26nbsp%3B%20Curious%20if%20anyone%20else%20has%20had%20this%20issue.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E*UPDATE%208.6.20*%20-%20According%20to%20Microsoft%3A%26nbsp%3BWe%20have%20resolved%20battery%20consumption%20issues%20in%20latest%20build%20%3CSTRONG%3E1.0.1928.0203%3C%2FSTRONG%3E.%20We%20will%20be%20sharing%20this%20build%20soon.%20Please%20look%20forward%20for%20the%20communications%20on%20the%20same.%20If%20you%20see%20any%20issue%20please%20submit%20feedback%20thru%20In-app%20feedback%20with%20diagnostics%20turned%20on.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20expected%2C%20It%20doesn't%20include%20any%20timeline%20info%20in%20the%20security%20center%20or%20allow%20use%20of%20any%20of%20the%20more%20advanced%20actions%20that%20can%20be%20performed%20on%20Win%2010%20devices.%26nbsp%3B%20I%20haven't%20run%20across%20anything%20it%20blocks%20me%20from%20accessing%20as%20of%20yet.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERE%3A%20Licensing.%26nbsp%3B%20I'm%20also%20curious%20how%20that%20will%20be%20handled%2C%20especially%20for%20frontline%20workers.%26nbsp%3B%20A%20standalone%20license%20would%20need%20to%20be%20made%20available.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1588695%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1588695%22%20slang%3D%22en-US%22%3E%3CP%3EJust%20starting%20to%20enroll%20and%20test%20this%20on%20my%20Android%20Enterprise%20environment.%20Waiting%20for%20certain%20help%20from%20Microsoft%20Defender%20team.%20I%20will%20share%20my%20experience%20with%20Android%20Enterprise%20integration.%20thanks%20for%20the%20above%20feedback%20%2Creally%20helpful%20for%20me.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1607005%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1607005%22%20slang%3D%22en-US%22%3E%3CP%3EToday%20Successfully%20activated%20and%20integrated%20with%20Intune%20%2B%20Microsoft%20Defender%20ATP%20.!%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703967%22%20target%3D%22_blank%22%3E%40Kanishka_Srivastava%3C%2FA%3E%26nbsp%3Babove%20you%20mentioned%20possibilities%26nbsp%3B%20we%20can%20test%20with%20Android%20Enterprise%20%3CSTRONG%3EWork%20Profile%3C%2FSTRONG%3E%26nbsp%3Bmode%20too%20or%20mainly%20for%20Device%20Owner%20mode%20%3F%20request%20you%20to%20clarify.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1622399%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1622399%22%20slang%3D%22en-US%22%3E%3CP%3EEven%20the%20web%20protection%20is%20enabled%20!%20still%20the%20%3CSTRONG%3EMicrosoft%20defender%20App%20in%20Android%20Work%20Profile%20didn't%20block%20or%20alert%20when%20i%20visit%20a%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fsmartscreentestratings2.net%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ephishing%20test%20page%3C%2FA%3E%26nbsp%3B%3C%2FSTRONG%3E%3A%20%3CA%20href%3D%22https%3A%2F%2Fsmartscreentestratings2.net%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsmartscreentestratings2.net%2F%3C%2FA%3E%26nbsp%3B.%20how%20i%20can%20troubleshoot%20this%20%3F%20also%20my%20device%20details%20are%20only%20shown%20and%20visible%20in%20MEM%20portal%2C%20but%20not%20in%20Endpoint%20SecurityCenter%20portal.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1622401%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1622401%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F759487%22%20target%3D%22_blank%22%3E%40govindannarayanan%3C%2FA%3E%26nbsp%3B%2C%20we%20have%20also%20the%20same%20%22problem%22.%20you%20can%20read%20my%20post%20a%20few%20post%20up.%3C%2FP%3E%3CP%3EI%20still%20waiting%20for%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703967%22%20target%3D%22_blank%22%3E%40Kanishka_Srivastava%3C%2FA%3E%26nbsp%3B%20for%20Help.%3C%2FP%3E%3CP%3EPlease%20let%20me%20know%20if%20you%20get%20any%20help.%20%3A(%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1622454%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1622454%22%20slang%3D%22en-US%22%3E%3CP%3Ethanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F472431%22%20target%3D%22_blank%22%3E%40Mela1984%3C%2FA%3E%26nbsp%3Bfor%20your%20update.%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703967%22%20target%3D%22_blank%22%3E%40Kanishka_Srivastava%3C%2FA%3E%26nbsp%3Blet%20us%20know%20your%20view%20and%20possible%20help%20from%20your%20side.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1625000%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1625000%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F472431%22%20target%3D%22_blank%22%3E%40Mela1984%3C%2FA%3E%26nbsp%3B%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F759487%22%20target%3D%22_blank%22%3E%40govindannarayanan%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B-%20Currently%20we%20do%20not%20support%20device%20owner%20%2F%20fully%20managed%20devices.%20We'll%20update%20the%20documentation%20when%20this%20is%20ready.%3C%2FP%3E%0A%3CP%3EOn%20the%20phish%20test%20URL%20not%20being%20blocked%20-%20can%20you%20confirm%20that%20on%20the%20work%20profile%20device%2C%20you%20were%20accessing%20the%20URL%20from%20within%20the%20work%20profile%20and%20not%20from%20the%20personal%20profile%20which%20Defender%20ATP%20does%20not%20monitor%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1625041%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1625041%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F427466%22%20target%3D%22_blank%22%3E%40Ashwin_msft%3C%2FA%3E%26nbsp%3B%2C%20yes%20I%20can%20confirm%20That.%3C%2FP%3E%3CP%3EWe%20are%20using%20also%20MS%20Edge%20on%20the%20Work%20Profile.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1625063%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1625063%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F427466%22%20target%3D%22_blank%22%3E%40Ashwin_msft%3C%2FA%3E%26nbsp%3Byes%2C%20i%20tried%20opening%20the%20Link%20in%20Work%20browser%20only.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1625062%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1625062%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F246615%22%20target%3D%22_blank%22%3E%40Melany%3C%2FA%3E%26nbsp%3B-%20can%20you%20please%20submit%20a%20feedback%20along%20with%20logs%20via%20the%20'Send%20Feedback'%20option%20within%20the%20app%20so%20we%20can%20take%20a%20look%20%3F%20Thanks%3C%2FP%3E%0A%3CP%3EIf%20you%20can%20also%20include%20your%20e-mail%20address%20as%20part%20of%20the%20feedback%2C%20we%20can%20contact%20you%20for%20further%20information%2C%20if%20needed%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1625124%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1625124%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F427466%22%20target%3D%22_blank%22%3E%40Ashwin_msft%3C%2FA%3E%26nbsp%3B%2C%20Done.%20With%20Email%20and%20Log%20Info%20files.%3C%2FP%3E%3CP%3EI%20have%20test%20two%20Bad%20URL's%20and%20both%20were%20allowed%20without%20blocking.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELet%20me%20please%20know%20if%20you%20need%20other%20test.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20for%20your%20HELP%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1627601%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1627601%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EGood%20news%20%3C%2FSPAN%3E%3CSPAN%3Eis%20web%20protection%20started%20working%20for%20me.%20Only%20the%20Bad%20App%20blocking%20is%20missing.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1630751%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1630751%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F759487%22%20target%3D%22_blank%22%3E%40govindannarayanan%3C%2FA%3E%26nbsp%3Breally%3F%20I%20still%20can%20open%20the%20%22Malicious%22%20URL's%20%3A(%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1642747%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1642747%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F472431%22%20target%3D%22_blank%22%3E%40Mela1984%3C%2FA%3E%26nbsp%3Btry%20this%20and%20FYI%2C%20i%20tested%20this%20workprofile%20in%20AE%20environment%20and%20web-protection%20is%20working%20fine.%20But%20still%20malicious%20App%20is%20not%20blocked%20in%20my%20device.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fandroid-intune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fandroid-intune%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EThere%20is%20also%20a%20step-by-step%20guide%20for%20Android%20Enterprise%20enrolled%20devices%3A%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fandroid-intune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fandroid-intune%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EWould%20you%20be%20so%20kind%20and%20double-check%20the%20configuration%20settings%3F!%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1643074%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1643074%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F759487%22%20target%3D%22_blank%22%3E%40govindannarayanan%3C%2FA%3E%26nbsp%3B%2C%20thanks%20for%20the%20info.%3C%2FP%3E%3CP%3EI%20have%20double%20check%20my%20configuration%2C%20I%20have%20all%20as%20describe%20in%20the%20Guide.%20APP%20deployment%20and%20Configuration.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20the%20main%20Time%20we%20have%20installed%20also%20the%20new%20release%20version%20of%20ATP%20(%3CSPAN%3EMicrosoft%20Defender%20ATP%20Preview%20(Enterprise)%3C%2FSPAN%3E)%2C%20but%20still%20the%20same%20problem.%20Old%20App%20deinstalled%20and%20new%20one%20with%20also%20a%20new%20Configuration%2C%20but%20same%20%3A(.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EInteresting%20is%20that%20sometime%20works%2C%20before%20yesterday%20some%20URLS%20was%20blocked%20but%20yesterday%20and%20today%20no%20any%20more%20%3A(.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20also%20contacted%20MS%20trough%20the%20Feedback%20on%20the%20APP%20and%20they%20write%20yesterday%20an%20Emil%20asking%20me%20for%20more%20details%2C%20I%20have%20send%20it%20all%20right%20now.%20I%20hope%20now%20we%20can%20resolve%20this.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1672517%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1672517%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F427466%22%20target%3D%22_blank%22%3E%40Ashwin_msft%3C%2FA%3E%26nbsp%3B%3A%20I%20haven't%20hear%20anything%20since%20my%20Report%20but%2C%20%3CSTRONG%3EToday%3C%2FSTRONG%3E%26nbsp%3Bworks%2C%20the%26nbsp%3B%3CSPAN%3E%22Malicious%22%20URL's%20are%20blocked%2C%20Thanks.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1672530%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1672530%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F472431%22%20target%3D%22_blank%22%3E%40Mela1984%3C%2FA%3E%26nbsp%3B-%20Thanks%20for%20the%20update%20and%20your%20contribution%20to%20the%20preview.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1480787%22%20slang%3D%22en-US%22%3EAnnouncing%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1480787%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Android%20public%20preview2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200552iF480B36A39A8BD03%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Android%20public%20preview2.png%22%20alt%3D%22Android%20public%20preview2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUpdate%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fmicrosoft-defender-for-endpoint-adds-depth-and-breadth-to-threat%2Fba-p%2F1695824%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Defender%20for%20Endpoint%20on%20Android%20is%20now%20generally%20available%3C%2FA%3E.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20excited%20to%20announce%20the%20public%20preview%20of%20our%20mobile%20threat%20defense%20capabilities%20with%20Microsoft%20Defender%20ATP%20for%20Android.%20As%20Rob%20Lefferts%2C%20Corporate%20Vice%20President%2C%20Microsoft%20365%20Security%20and%20Compliance%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F06%2F23%2Fmicrosoft-continues-to-extend-security-for-all-with-mobile-protection-for-android%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ementioned%20in%20his%20blog%3C%2FA%3E%2C%26nbsp%3Bthe%20threats%20in%20the%20mobile%20space%20are%20unique%2C%20and%20as%20more%20and%20more%20people%20use%20mobile%20devices%20for%20work%2C%20the%20need%20for%20organizations%20to%20protect%20data%20that%20is%20accessed%20through%20their%20users%E2%80%99%20devices%20is%20increasingly%20imperative.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20offering%20a%20preview%20of%20these%20capabilities%20at%20RSA%20Conference%202020%2C%20we%20were%20thrilled%20by%20the%20response%20from%20our%20customers%20and%20the%20industry.%20Over%20the%20last%20several%20months%2C%20we%E2%80%99ve%20been%20working%20closely%20with%20customers%20who%20are%20our%20design%20partners%2C%20listening%20to%20their%20feedback%2C%20and%20enhancing%20the%20product.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EKey%20Capabilities%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20public%20preview%20of%20Microsoft%20Defender%20ATP%20for%20Android%20will%20offer%20protection%20against%20phishing%20and%20unsafe%20network%20connections%20from%20apps%2C%20websites%2C%20and%20malicious%20apps.%20In%20addition%2C%20the%20ability%20to%20restrict%20access%20to%20corporate%20data%20from%20devices%20that%20are%20deemed%20%E2%80%9Crisky%E2%80%9D%20will%20enable%20enterprises%20to%20secure%20users%20and%20data%20on%20their%20Android%20devices.%20All%20events%20and%20alerts%20will%20be%20available%20through%20a%20single%20pane%20of%20glass%20in%20the%20Microsoft%20Defender%20Security%20Center%2C%20giving%20security%20teams%20a%20centralized%20view%20of%20threats%20on%20Android%20devices%20along%20with%20other%20platforms.%20These%20capabilities%20empower%20enterprises%20to%20enable%20strong%20security%20while%20ensuring%20their%20employees%20remain%20productive%20working%20on%20their%20Android%20devices.%20Let%E2%80%99s%20dive%20into%20each%20of%20these%20capabilities%20in%20more%20detail.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EWeb%20protection%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EPhishing%20is%20one%20of%20the%20biggest%20threat%20vectors%20on%20mobile%2C%20with%20the%20majority%20of%20attacks%20happening%20outside%20of%20email%20such%20as%20via%20phishing%20sites%2C%20messaging%20apps%2C%20games%2C%20and%20other%20applications.%20Other%20potential%20threats%20come%20from%20apps%20which%20may%20make%20connections%20to%20unsafe%20domains%2C%20unknowingly%20to%20the%20user%20and%20security%20teams.%20Web%20protection%20capabilities%20in%20Microsoft%20Defender%20ATP%20for%20Android%20help%20to%20address%20these%20challenges%20with%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CEM%3EAnti-phishing%3A%20%3C%2FEM%3EAccess%20to%20unsafe%20websites%20from%20SMS%2Ftext%2C%20WhatsApp%2C%20email%2C%20browsers%2C%20and%20other%20apps%20is%20instantly%20blocked.%20To%20do%20this%2C%20we%20leverage%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Defender%20SmartScreen%3C%2FA%3E%20service%20to%20help%20determine%20whether%20a%20URL%20is%20potentially%20malicious.%20This%20works%20in%20conjunction%20with%20Android%20to%20enable%20the%20app%20to%20inspect%20the%20URL%20to%20provide%20anti-phishing%20protection.%20If%20access%20to%20a%20malicious%20site%20is%20blocked%2C%20the%20device%20user%20will%20get%20a%20notification%20about%20this%20with%20the%20options%20to%20allow%20the%20connection%2C%20report%20it%20safe%2C%20or%20dismiss%20the%20notification.%20Security%20teams%20are%20notified%20about%20attempts%20to%20access%20malicious%20sites%20via%20an%20alert%20in%20the%20Microsoft%20Defender%20Security%20Center.%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EBlocking%20unsafe%20connections%3A%3C%2FEM%3E%20The%20same%20Microsoft%20Defender%20SmartScreen%20technology%20is%20used%20to%20also%20block%20unsafe%20network%20connections%20that%20apps%20automatically%20might%20make%20on%20the%20user%E2%80%99s%20behalf%20without%20them%20knowing.%20Just%20as%20in%20the%20phishing%20example%2C%20the%20user%20is%20immediately%20informed%20that%20this%20activity%20is%20blocked%20and%20is%20given%20the%20same%20choices%20to%20allow%20it%2C%20report%20it%20as%20unsafe%2C%20or%20dismiss%20the%20notification%20as%20the%20product%20screenshot%20shows.%20Alerts%20for%20this%20scenario%20also%20show%20up%20in%20the%20Microsoft%20Defender%20Security%20Center.%20When%20these%20connections%20are%20attempted%20on%20a%20user%E2%80%99s%20device%2C%20security%20teams%20are%20notified%20of%20this%20via%20an%20alert%20in%20the%20Microsoft%20Defender%20Security%20Center.%20%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CEM%3ECustom%20indicators%3A%3C%2FEM%3E%20Security%20teams%20can%20create%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fmanage-indicators%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ecustom%20indicators%3C%2FA%3E%2C%20giving%20them%20more%20fine-grained%20control%20over%20allowing%20and%20blocking%20URLs%20and%20domains%20users%20connect%20to%20from%20their%20Android%20devices.%20This%20can%20be%20done%20in%20the%20Microsoft%20Defender%20Security%20Center%20and%20is%20an%20extension%20of%20our%20custom%20indicators%20capability%20already%20available%20for%20Windows.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Unsafe%20site2.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200351iA5FAEC394744774E%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Unsafe%20site2.png%22%20alt%3D%22Unsafe%20site2.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Connectionblocked.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200352i0F32D8F3AFA350CC%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22Connectionblocked.png%22%20alt%3D%22Connectionblocked.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EMalware%20scanning%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EEnterprises%20deploying%20Android%20can%20leverage%20built-in%20protections%20in%20the%20Android%20platform%20to%20limit%20installation%20of%20apps%20to%20trusted%20sources%20as%20well%20as%20tools%20like%20Google%20Play%20Protect%20to%20significantly%20reduce%20the%20threat%20surface%20of%20potentially%20harmful%20apps%20being%20installed%20on%20devices.%20Microsoft%20Defender%20ATP%20fortifies%20this%20by%20introducing%20additional%20visibility%20and%20controls%20to%20deliver%20further%20assurances%20on%20keeping%20devices%20free%20of%20threats%20to%20device%20security.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20for%20Android%20uses%20cloud%20protection%20powered%20by%20deep%20learning%20and%20heuristics%20to%20provide%20coverage%20for%20low-fidelity%20signals%20which%20are%20inconclusively%20handled%20by%20signatures%2C%20in%20addition%20to%20offering%20signature%20based%20malware%20detection.%20This%20protection%20extends%20to%20both%20malicious%20apps%20and%20files%20on%20the%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EScans%20are%20instantly%20performed%20detect%20malware%20and%20potentially%20unwanted%20applications%20(PUA).%20If%20a%20safe%20app%20is%20downloaded%2C%20the%20end%20user%20will%20see%20a%20lightweight%20notification%20letting%20them%20know%20the%20app%20is%20clean.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ThreatFound.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200355i333146F4F2EEF3D3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ThreatFound.png%22%20alt%3D%22ThreatFound.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EBlocking%20access%20to%20sensitive%20data%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAdditional%20layers%20of%20protection%20against%20malicious%20access%20to%20sensitive%20corporate%20information%20is%20offered%20by%20integrating%20with%20Microsoft%20Endpoint%20Manager%2C%20which%20includes%20both%20Microsoft%20Intune%20and%20Configuration%20Manager.%20For%20example%2C%20a%20compromised%20device%20would%20be%20blocked%20from%20accessing%20Outlook%20email.%20When%20Microsoft%20Defender%20ATP%20for%20Android%20finds%20that%20a%20device%20has%20malicious%20apps%20installed%2C%20it%20will%20classify%20the%20device%20as%20%E2%80%9Chigh%20risk%E2%80%9D%20and%20will%20flag%20it%20in%20the%20Microsoft%20Defender%20Security%20Center.%20Microsoft%20Intune%20uses%20the%20device%E2%80%99s%20risk%20level%20in%20conjunction%20with%20pre-defined%20compliance%20polices%20to%20activate%20Conditional%20Access%20rules%20that%20block%20access%20to%20corporate%20assets%20from%20the%20high%20risk%20device.%20The%20screenshot%20shows%20an%20example%20of%20how%20the%20end-user%20would%20get%20a%20notification%20that%20their%20device%20doesn%E2%80%99t%20comply%20with%20their%20organization%E2%80%99s%20policies%2C%20and%20how%20to%20remediate.%20Once%20the%20malicious%20app%20is%20uninstalled%2C%20access%20to%20corporate%20assets%20is%20restored%20automatically%20for%20the%20mobile%20device.%20You%20can%20learn%20about%20how%20to%20set%20up%20this%20integration%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fprotect%2Fadvanced-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Outlookblocked.png%22%20style%3D%22width%3A%20296px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200367i45F929CE24498E4C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Outlookblocked.png%22%20alt%3D%22Outlookblocked.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EUnified%20SecOps%20experience%20%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Defender%20Security%20Center%20acts%20as%20the%20single%20pane%20of%20glass%20experience%20for%20security%20teams%20to%20get%20a%20centralized%20view%20of%20threats%20and%20activities.%20All%20the%20alerts%20for%20phishing%20and%20malware%20on%20Android%20devices%20are%20surfaced%20here.%20As%20part%20of%20the%20alert%2C%20analysts%20see%20the%20name%20of%20the%20threat%2C%20its%20severity%2C%20the%20alert%20process%20tree%20for%20the%20incident%2C%20and%20other%20additional%20context%20including%20file%20details%20and%20associated%20SHA%20information.%20Android%20device%20related%20alerts%20also%20roll%20up%20into%20the%20incident%20where%20analysts%20can%20get%20a%20more%20holistic%20view%20of%20attacks%20associated%20with%20a%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20devices%20list%2C%20Android%20devices%20are%20also%20visible%20with%20their%20associated%20risk%20levels.%20In%20the%20device%20information%20page%2C%20security%20analysts%20can%20see%20the%20number%20of%20incidents%2C%20active%20alerts%2C%20and%20logged%20on%20users%20associated%20with%20the%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20the%20same%20familiar%20experience%20that%20we%20deliver%20to%20security%20teams%20for%20Windows%2C%20Mac%2C%20and%20Linux.%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3CEM%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MDSC_Android.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200381i469256146613FC01%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22MDSC_Android.png%22%20alt%3D%22MDSC_Android.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20excited%20to%20be%20sharing%20these%20new%20features%20with%20you.%20In%20the%20coming%20months%2C%20we%E2%80%99ll%20be%20rolling%20out%20more%20capabilities%20for%20Android%20and%20we%E2%80%99ll%20be%20releasing%20Microsoft%20Defender%20ATP%20for%20iOS%20later%20this%20year%20%E2%80%93%20stay%20tuned!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGetting%20started%20with%20Microsoft%20Defender%20ATP%20for%20Android%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThose%20customers%20that%20have%20preview%20features%20turned%20on%20can%20start%20trying%20out%20Microsoft%20Defender%20ATP%20for%20Android%20today.%20If%20you%20haven%E2%80%99t%20yet%20opted%20in%2C%20we%20encourage%20you%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fpreview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eturn%20on%20preview%20features%3C%2FA%3E%20in%20the%20Microsoft%20Defender%20Security%20Center%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJoin%20us%20as%20we%20advance%20in%20our%20journey%20across%20platforms.%20For%20more%20information%2C%20including%20detailed%20system%20requirements%2C%20prerequisites%2C%20deployment%20and%20configuration%20steps%2C%20and%20a%20list%20of%20improvements%20and%20new%20features%2C%20check%20out%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fmicrosoft-defender-atp-android%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20share%20feedback%2C%20you%20can%20use%20the%20%E2%80%9Csend%20feedback%E2%80%9D%20option%20in%20the%20Microsoft%20Defender%20ATP%20for%20Android%20app.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AndroidFeedback.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200368iAD28BD475F863D60%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22AndroidFeedback.png%22%20alt%3D%22AndroidFeedback.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20not%20yet%20taking%20advantage%20of%20Microsoft%E2%80%99s%20industry%20leading%20security%20optics%20and%20detection%20capabilities%20for%20endpoints%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fmicrosoft-365%2Fwindows%2Fmicrosoft-defender-atp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esign%20up%20for%20a%20free%20trial%3C%2FA%3E%20of%20Microsoft%20Defender%20ATP%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1480787%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Android%20public%20preview2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200552iF480B36A39A8BD03%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Android%20public%20preview2.png%22%20alt%3D%22Android%20public%20preview2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWe're%20excited%20to%20announce%20the%20public%20preview%20of%20Microsoft%20Defender%20ATP%20for%20Android.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1480787%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAndroid%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Threat%20Defense%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

‎06-23-2020 09:00 AM

Update: Microsoft Defender for Endpoint on Android is now generally available.

We are excited to announce the public preview of our mobile threat defense capabilities with Microsoft Defender ATP for Android. As Rob Lefferts, Corporate Vice President, Microsoft 365 Security and Compliance, mentioned in his blog, the threats in the mobile space are unique, and as more and more people use mobile devices for work, the need for organizations to protect data that is accessed through their users’ devices is increasingly imperative.

After offering a preview of these capabilities at RSA Conference 2020, we were thrilled by the response from our customers and the industry. Over the last several months, we’ve been working closely with customers who are our design partners, listening to their feedback, and enhancing the product.

Key Capabilities

The public preview of Microsoft Defender ATP for Android will offer protection against phishing and unsafe network connections from apps, websites, and malicious apps. In addition, the ability to restrict access to corporate data from devices that are deemed “risky” will enable enterprises to secure users and data on their Android devices. All events and alerts will be available through a single pane of glass in the Microsoft Defender Security Center, giving security teams a centralized view of threats on Android devices along with other platforms. These capabilities empower enterprises to enable strong security while ensuring their employees remain productive working on their Android devices. Let’s dive into each of these capabilities in more detail.

Web protection

Phishing is one of the biggest threat vectors on mobile, with the majority of attacks happening outside of email such as via phishing sites, messaging apps, games, and other applications. Other potential threats come from apps which may make connections to unsafe domains, unknowingly to the user and security teams. Web protection capabilities in Microsoft Defender ATP for Android help to address these challenges with:

  1. Anti-phishing: Access to unsafe websites from SMS/text, WhatsApp, email, browsers, and other apps is instantly blocked. To do this, we leverage the Microsoft Defender SmartScreen service to help determine whether a URL is potentially malicious. This works in conjunction with Android to enable the app to inspect the URL to provide anti-phishing protection. If access to a malicious site is blocked, the device user will get a notification about this with the options to allow the connection, report it safe, or dismiss the notification. Security teams are notified about attempts to access malicious sites via an alert in the Microsoft Defender Security Center.
  2. Blocking unsafe connections: The same Microsoft Defender SmartScreen technology is used to also block unsafe network connections that apps automatically might make on the user’s behalf without them knowing. Just as in the phishing example, the user is immediately informed that this activity is blocked and is given the same choices to allow it, report it as unsafe, or dismiss the notification as the product screenshot shows. Alerts for this scenario also show up in the Microsoft Defender Security Center. When these connections are attempted on a user’s device, security teams are notified of this via an alert in the Microsoft Defender Security Center.  
  3. Custom indicators: Security teams can create custom indicators, giving them more fine-grained control over allowing and blocking URLs and domains users connect to from their Android devices. This can be done in the Microsoft Defender Security Center and is an extension of our custom indicators capability already available for Windows.

Malware scanning

Enterprises deploying Android can leverage built-in protections in the Android platform to limit installation of apps to trusted sources as well as tools like Google Play Protect to significantly reduce the threat surface of potentially harmful apps being installed on devices. Microsoft Defender ATP fortifies this by introducing additional visibility and controls to deliver further assurances on keeping devices free of threats to device security.

Microsoft Defender ATP for Android uses cloud protection powered by deep learning and heuristics to provide coverage for low-fidelity signals which are inconclusively handled by signatures, in addition to offering signature based malware detection. This protection extends to both malicious apps and files on the device.

Scans are instantly performed detect malware and potentially unwanted applications (PUA). If a safe app is downloaded, the end user will see a lightweight notification letting them know the app is clean.

Blocking access to sensitive data

Additional layers of protection against malicious access to sensitive corporate information is offered by integrating with Microsoft Endpoint Manager, which includes both Microsoft Intune and Configuration Manager. For example, a compromised device would be blocked from accessing Outlook email. When Microsoft Defender ATP for Android finds that a device has malicious apps installed, it will classify the device as “high risk” and will flag it in the Microsoft Defender Security Center. Microsoft Intune uses the device’s risk level in conjunction with pre-defined compliance polices to activate Conditional Access rules that block access to corporate assets from the high risk device. The screenshot shows an example of how the end-user would get a notification that their device doesn’t comply with their organization’s policies, and how to remediate. Once the malicious app is uninstalled, access to corporate assets is restored automatically for the mobile device. You can learn about how to set up this integration in our documentation.

Unified SecOps experience

The Microsoft Defender Security Center acts as the single pane of glass experience for security teams to get a centralized view of threats and activities. All the alerts for phishing and malware on Android devices are surfaced here. As part of the alert, analysts see the name of the threat, its severity, the alert process tree for the incident, and other additional context including file details and associated SHA information. Android device related alerts also roll up into the incident where analysts can get a more holistic view of attacks associated with a device.

In the devices list, Android devices are also visible with their associated risk levels. In the device information page, security analysts can see the number of incidents, active alerts, and logged on users associated with the device.

This is the same familiar experience that we deliver to security teams for Windows, Mac, and Linux.

We’re excited to be sharing these new features with you. In the coming months, we’ll be rolling out more capabilities for Android and we’ll be releasing Microsoft Defender ATP for iOS later this year – stay tuned!

Getting started with Microsoft Defender ATP for Android

Those customers that have preview features turned on can start trying out Microsoft Defender ATP for Android today. If you haven’t yet opted in, we encourage you to turn on preview features in the Microsoft Defender Security Center today.

Join us as we advance in our journey across platforms. For more information, including detailed system requirements, prerequisites, deployment and configuration steps, and a list of improvements and new features, check out the documentation.

To share feedback, you can use the “send feedback” option in the Microsoft Defender ATP for Android app.

If you’re not yet taking advantage of Microsoft’s industry leading security optics and detection capabilities for endpoints, sign up for a free trial of Microsoft Defender ATP today.

39 Comments

‎06-24-2020 12:55 PM

This is so awesome! Can't wait to try it out.

I know IOS is "later this year" but is there any more information if it is in Q3 or Q4?

Have a great you all!

‎06-24-2020 05:44 PM

great work! this is amazing! :lol:

‎06-25-2020 01:26 AM

Should we assume an E5 license is required?

‎06-25-2020 05:55 AM

Great to see the move into protection of Mobile as its needed, big concern is privacy of these users as it looks like the detection is in the cloud, could you confirm?

‎06-30-2020 10:16 PM

How long does it take for the preview to be activated? 
I've send out a mail to [email protected] with our Google Play org ID, but one week later we haven't got a reply nor are we able to import the Defender app in Google Play for Android Enterprise.

‎06-30-2020 10:28 PM

@bthomas - Sorry about the inconvenience caused. Your second e-mail for preview just came thru and has been approved. Sorry, your first e-mail doesn't seem to have made it thru and thanks for following up. Look forward to your feedback on the preview. Preview instructions are available in the e-mail sent to you.

Thanks

Ashwin

‎06-30-2020 10:34 PM

@Ashwin_msft Thanks for the follow up and response! 

‎07-01-2020 10:28 AM

I would also be interested about the licensing prerequisites.

‎07-02-2020 08:30 AM

@Simes27622762@Friedrich Grosseibel Licensing details around Android and iOS will become available as we get closer to GA

‎07-02-2020 10:10 AM

@Kanishka_Srivastava No hints then?

‎07-02-2020 10:14 AM

@Simes27622762 - we don't have any details or hints on the licensing to share at this time. 

‎07-03-2020 05:47 AM

What Android versions are supported? All the way back to Marshmallow, or something different?

‎07-03-2020 05:56 AM

@VesaP1695 - Android 6.0 (Marshmallow) & above.

‎07-07-2020 08:12 AM

First impressions: I onboarded my android phone the day this was announced.  We're encouraged by this as an alternative to options such as Lookout.  Onboarding was easy enough, but it opens a persistent connection to Microsoft, and takes up far more power than any other applications on my phone (20%).  It actually "overloaded" my s10 and was forced to shut down.  I haven't had that happen before.  Feedback has been submitted.  I understand this is in preview and it will be improved before general availability.  I will say that it will require a good deal of attention to power usage if it's going to be something our organization can use.  Curious if anyone else has had this issue.

*UPDATE 8.6.20* - According to Microsoft: We have resolved battery consumption issues in latest build 1.0.1928.0203. We will be sharing this build soon. Please look forward for the communications on the same. If you see any issue please submit feedback thru In-app feedback with diagnostics turned on.

As expected, It doesn't include any timeline info in the security center or allow use of any of the more advanced actions that can be performed on Win 10 devices.  I haven't run across anything it blocks me from accessing as of yet.

RE: Licensing.  I'm also curious how that will be handled, especially for frontline workers.  A standalone license would need to be made available.

‎07-07-2020 09:37 AM

My test device is a Blackberry Key2 and I do not see a big decrease with the battery. On the other hand I only use the device for testing so I can’t tell. 

That the app needs to be constantly running however is understandable in my opinion. I guess however this can be tuned in future releases. 

I am looking forward to the iOS variant of the ATP protection where this for sure is more tricky in regards of background activity etc. 

‎07-08-2020 10:18 AM

"It doesn't include any timeline info in the security center"

and IMHO it should stay this way to avoid battery drain or hitting mobile data limit on metered data plan.

‎07-08-2020 10:26 AM

"and IMHO it should stay this way to avoid battery drain or hitting mobile data limit on metered data plan."

Agreed - was just pointing it out in case anyone was wondering.

‎07-09-2020 07:14 AM

Running this on my OnePlus 6T without any concerning battery issues so far. 

Are there plans to have software inventory and discovered vulnerabilities for the mobile devices? I'm also wondering is this would then show the apps that are not running in the Android Enterprise Work Profile or also apps running in the personal profile. Having COPE in mind for future deployments, this will be important for some customers.

‎07-21-2020 10:53 PM

Microsoft Rocks !

‎07-22-2020 12:28 AM

We have malicious URLs blocked at ATP/ MS 365 Security, on the windows Client the Defender is blocking it successfully but on the Android this URL still available, the MSATP do nothing.

The Android Device is also available/register at Microsoft Defender Security Center with Health State "active" but Exposure level "No data available" and Risk Level "No know risk" :(. Last seen from today, so I assume that the connection between ATP and the Android Device is "alive".

I have send a Mail to "[email protected]" and also as Feedback trough the App but still no receive any "help",

@Kanishka_Srivastava  , could you please tell me who I need to contact for this issue/ problem?

Best regards

‎07-23-2020 08:20 AM

@Mela1984 thanks for reaching out. We'll work with you over mail to troubleshoot the issue.

‎07-23-2020 01:32 PM

Excited to try this out. Glad to see experiences so far have been good.

‎07-28-2020 06:22 AM

Any visibility as to when this will be available in GCC High/Azure Gov?

‎08-14-2020 02:49 AM

Just starting to enroll and test this on my Android Enterprise environment. Waiting for certain help from Microsoft Defender team. I will share my experience with Android Enterprise integration. thanks for the above feedback ,really helpful for me.

‎08-23-2020 05:46 PM

Today Successfully activated and integrated with Intune + Microsoft Defender ATP .! @Kanishka_Srivastava above you mentioned possibilities  we can test with Android Enterprise Work Profile mode too or mainly for Device Owner mode ? request you to clarify.

‎08-31-2020 01:37 AM

Even the web protection is enabled ! still the Microsoft defender App in Android Work Profile didn't block or alert when i visit a phishing test page : https://smartscreentestratings2.net/ . how i can troubleshoot this ? also my device details are only shown and visible in MEM portal, but not in Endpoint SecurityCenter portal.

‎08-31-2020 01:43 AM

Hi @govindannarayanan , we have also the same "problem". you can read my post a few post up.

I still waiting for @Kanishka_Srivastava  for Help.

Please let me know if you get any help. :(

‎08-31-2020 02:43 AM

thanks @Mela1984 for your update.  @Kanishka_Srivastava let us know your view and possible help from your side.

‎09-01-2020 04:54 AM

@Mela1984 , @govindannarayanan   - Currently we do not support device owner / fully managed devices. We'll update the documentation when this is ready.

On the phish test URL not being blocked - can you confirm that on the work profile device, you were accessing the URL from within the work profile and not from the personal profile which Defender ATP does not monitor 

‎09-01-2020 05:11 AM

@Ashwin_msft , yes I can confirm That.

We are using also MS Edge on the Work Profile.

‎09-01-2020 05:16 AM

@Melany - can you please submit a feedback along with logs via the 'Send Feedback' option within the app so we can take a look ? Thanks

If you can also include your e-mail address as part of the feedback, we can contact you for further information, if needed

‎09-01-2020 05:16 AM

@Ashwin_msft yes, i tried opening the Link in Work browser only.

‎09-01-2020 05:34 AM

@Ashwin_msft , Done. With Email and Log Info files.

I have test two Bad URL's and both were allowed without blocking.

Let me please know if you need other test.

Thanks for your HELP

‎09-02-2020 04:43 AM

Good news is web protection started working for me. Only the Bad App blocking is missing. 

‎09-03-2020 02:35 AM

@govindannarayanan really? I still can open the "Malicious" URL's :(

‎09-07-2020 06:19 PM

@Mela1984 try this and FYI, i tested this workprofile in AE environment and web-protection is working fine. But still malicious App is not blocked in my device.

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/android-i...

There is also a step-by-step guide for Android Enterprise enrolled devices:

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/android-i...

Would you be so kind and double-check the configuration settings?!

‎09-07-2020 10:55 PM

@govindannarayanan , thanks for the info.

I have double check my configuration, I have all as describe in the Guide. APP deployment and Configuration.  

In the main Time we have installed also the new release version of ATP (Microsoft Defender ATP Preview (Enterprise)), but still the same problem. Old App deinstalled and new one with also a new Configuration, but same :(.

Interesting is that sometime works, before yesterday some URLS was blocked but yesterday and today no any more :(. 

I have also contacted MS trough the Feedback on the APP and they write yesterday an Emil asking me for more details, I have send it all right now. I hope now we can resolve this.

‎09-16-2020 02:18 AM

@Ashwin_msft : I haven't hear anything since my Report but, Today works, the "Malicious" URL's are blocked, Thanks.

‎09-16-2020 02:21 AM

@Mela1984 - Thanks for the update and your contribution to the preview.

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK