Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Use Microsoft Intune to deploy and configure Defender for Endpoint on Android devices. Intune handles app deployment and policy delivery. Once onboarded, Microsoft Defender provides mobile threat protection on the device. On Android, onboarding is app-driven: a device is considered onboarded when the user opens the Defender app and completes setup. This article covers adding the app from Managed Google Play, assigning and verifying the deployment, creating app configuration policies, setting up always-on VPN, and optionally enabling low-touch onboarding.
Tip
You can also use Intune to deploy Defender for Endpoint to Android devices that aren't enrolled in Intune mobile device management (MDM). This method includes unmanaged devices and devices enrolled with another MDM through use of Intune mobile application management (MAM). For more information, see Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM).
Prerequisites
Licenses: Assign users both a Intune license and a Defender for Endpoint license. For licensing details, see Microsoft Defender for Endpoint licensing requirements.
Enrollment: Enroll devices in Intune by using one of the following Android Enterprise enrollment types:
- Personally-owned devices with a work profile
- Corporate-owned devices with a work profile
- Corporate-owned, fully managed user device enrollment
Important
Android device administrator (DA) management is deprecated and no longer available for devices with access to Google Mobile Services (GMS). If you currently use DA management, we recommend switching to another Android management option. Support and help documentation remain available for some Android 15 and earlier devices without GMS. For more information, see Ending support for Android device administrator on GMS devices.
Android OS version: For supported OS versions, see System requirements for Defender for Endpoint on Android.
Managed Google Play: Before you can add and assign apps for Android Enterprise devices, connect your Intune tenant to Managed Google Play.
Intune–Defender connection: Enable the Intune service-to-service connection with Defender for Endpoint. Without it, onboarding status, device risk signals, and EDR visibility in Intune aren't available. For more information, see Configure Microsoft Defender for Endpoint with Intune and Onboard Devices.
Deploy Defender for Endpoint on Android
Add the app from Managed Google Play
To add the Defender for Endpoint app to your Managed Google Play store and make it available in Intune:
In the Microsoft Intune admin center, go to Apps (1) and then select the Android tile to open the Android apps page (2). Select Create (3) and for App type, select Managed Google Play app (4), and then select Select.
On the Managed Google Play page, search for
Microsoft Defender. Select Defender: Antivirus from the search results, which is the name of the Defender for Endpoint app in the Managed Google Play store.On the apps page, review the app details and then select Select (1), followed by selecting Sync (2) to sync the app with Intune.
The sync completes in a few minutes.
After the sync completes, return to the Intune admin center and on the Android apps screen, select Refresh. Microsoft Defender: Antivirus should now appear in the apps list.
Stay on the Android apps page for the following procedure.
Assign the app
Assign the app as a required app so it installs automatically in the work profile during the next device sync through the Company Portal app.
From the Android apps page of the Intune admin center, select Microsoft Defender: Antivirus from the apps list. Go to Properties (1), and for Assignments, select Edit (2).
On the Edit application pane, go to the Required section (1) and select Add group to open the Select groups pane.
On the Select groups pane, select the groups you want to receive this app, and then select Select.
Back on the Edit application pane, select Review + Save from the bottom of the pane, and then select Save to commit the assignment.
Verify deployment
After you save the assignment, you can confirm the installation status for targeted devices before proceeding with configuration.
From the Android apps page of the Intune admin center, select Microsoft Defender: Antivirus from the apps list. On the default app page, Overview, Intune displays chart tiles that provide a rollup of installation status.
To identify if a specific device installed the app, select Device install status or select the Device status tile. Intune displays a list of targeted devices with more details.
Confirm that target devices show a successful installation state before continuing.
Configure Defender for Endpoint on Android
After deploying the app, use Intune policies to configure Defender for Endpoint on Android devices. Configuration involves creating an app configuration policy to grant app permissions and a device configuration profile to set up always-on VPN for web protection. For optional feature configurations specific to Defender, such as network protection and privacy controls, see Configure Microsoft Defender for Endpoint on Android features in the Defender documentation.
Configure app permissions and onboarding settings
Create an app configuration policy to grant Defender the permissions it needs on the device and, optionally, enable low-touch onboarding to reduce the steps users complete during first launch.
In the Microsoft Intune admin center, go to Apps, expand Managed apps, and select Configuration > Create > Managed devices.
On the Basics page, specify the following details:
- Name: Enter a descriptive name, such as Defender for Endpoint.
- Platform: Android Enterprise
- Profile type: Select the type that matches your device enrollment:
- Personally-owned Work Profile only
- Fully Managed, Dedicated, and Corporate-owned work profile only
- Targeted app: Select Microsoft Defender: Antivirus, select OK, and then select Next.
On the Settings page, leave Configuration settings format at its default for now. For Permissions, select Add. From the Add permissions list, select the available app permissions, and then select OK.
Defender for Endpoint recommends granting the following permissions during deployment:
Permission Recommended state Why it matters Location access (fine) Auto grant Required for web protection and Network Protection. Without it, Defender can only protect against rogue certificates; Wi-Fi threat detection is unavailable. Users must also select Allow all the time during onboarding for full Wi-Fi threat coverage. POST_NOTIFICATIONS Auto grant Required for threat alerts to reach the user. See the note for enrollment-type and OS version limitations. After adding the permissions, use the Permission state dropdown to set the desired behavior for each:
- Prompt: Prompts the user to accept or deny.
- Auto grant: Automatically approves without notifying the user.
- Auto deny: Automatically denies without notifying the user.
Note
On Android 12 and later, Auto grant isn't supported for certain permissions on corporate-owned work profile and dedicated devices. For details, see Add app configuration policies for managed Android Enterprise devices.
(Optional) Enable low-touch onboarding.
Low-touch onboarding is disabled by default. Without it, users who open Defender for Endpoint for the first time must enter their work account credentials and step through the app's setup wizard manually. In low-touch onboarding mode, the policy pre-populates the user's identity (UPN), so users don't need to type their sign-in credentials during first launch. When combined with the always-on VPN profile covered in the next section, this minimizes the prompts and steps users encounter during onboarding.
Low-touch onboarding can be useful for corporate-owned, fully managed deployments where you want to reduce user friction. For personally-owned work profile devices, where users might expect more active participation in app setup, the standard flow can be more appropriate. If you skip this step, the policy works as a permissions-only policy and users complete onboarding through the standard flow.
Note
Unlike iOS (supervised) and Windows, Android doesn't support fully silent or zero-touch onboarding. Android's permission model requires explicit user consent for certain permissions, so some degree of user interaction during first launch is always required. Low-touch onboarding is the closest available option for minimizing that interaction.
To enable low-touch onboarding, on the Settings page set the Configuration settings format dropdown to Use configuration designer, select Add, and then configure the following keys:
Key Value type Configuration value Low touch onboarding Integer 1User UPN Variable User Principal Name (UPN)Select both keys from the list and select OK, then set the Value type and Configuration value for each as shown in the table.
On the Assignments page, assign this policy to the same user groups you used when deploying the Microsoft Defender: Antivirus app.
On Review + create, confirm your choices, and then select Create.
Set up always-on VPN
Use a device configuration profile to deliver Defender's web protection tunnel to enrolled devices through Intune policy, so users don't need to manually configure a VPN during onboarding.
In the Microsoft Intune admin center, go to Devices (1), expand Manage devices, and select Configuration (2). On the Policies tab (3), select Create (4) > New Policy. On the Create a profile pane, set Platform to Android Enterprise and Profile type to Templates (5), and then select Device restrictions (6) for one of the following template types, based on your device enrollment type:
- Fully Managed, Dedicated, and Corporate-Owned Work Profile
- Personally-Owned Work Profile
Then, select Create to open the Device restrictions policy configuration workflow.
On the Basics page, provide a Name and a Description to uniquely identify the configuration profile.
For Configuration settings, expand Connectivity, and then configure your VPN:
Enable Always-on VPN (work profile-level). Set up a VPN client in the work profile to automatically connect and reconnect to the VPN whenever possible. Only one VPN client can be configured for always-on VPN on a given device, so make sure you don't deploy more than one always-on VPN policy to a device.
Use the VPN client dropdown list to select Custom. In this case, the custom VPN is the Defender for Endpoint VPN, which provides Web Protection.
Note
The Defender for Endpoint app must be installed on the user's device for automatic VPN setup to occur.
For Package ID, specify the ID of the Microsoft Defender: Antivirus app from the Managed Google Play store. For the Microsoft Defender app URL, the package ID is
com.microsoft.scmx.Set Lockdown mode to Not configured, which is the default.
On the Assignments page, select the user group to which you want to assign this device configuration profile. Choose Select groups to include, select the applicable group, and then select Next.
The group to select is typically the same group to which you assign the Defender for Endpoint Android app.
On the Review + Create page, review your settings, and then select Create.
Complete device onboarding
After you push policies to devices, users complete onboarding from the device. On personally owned devices with a work profile, Defender appears in the work profile. On corporate-owned fully managed devices, Defender appears in the single device profile.
Users open the Defender for Endpoint app and accept the permissions to complete onboarding.
Tip
Instruct users to select Allow all the time when prompted for location access during app setup. This choice enables full Wi-Fi threat detection through Network Protection. If users select While using the app or deny the permission, Defender can still protect against rogue certificates but can't detect threats on open or suspicious Wi-Fi networks. There's no admin configuration that enforces this choice; it requires user consent at the OS level.
Verify onboarding status
After users complete onboarding, confirm that devices report successfully.
To verify from the Intune admin center:
- Go to Endpoint security > Endpoint detection and response.
- Select the EDR Onboarding Status tab and review the onboarding status for your Android devices. Devices that successfully onboard show a status of Successfully onboarded.
To verify from the Defender portal:
- In the Microsoft Defender portal, go to Endpoints > Device inventory and confirm that your Android devices appear there.
For more detail on using Intune to monitor onboarding status across platforms, see Monitor device onboarding status.
If devices don't appear as expected, check for the following conditions:
- App not installed: Confirm the app configuration policy and app assignment deployed successfully by using the steps in Verify deployment.
- User didn't complete onboarding: The device doesn't appear until the user opens the app and completes setup.
- Intune-Defender connector inactive: Verify the service-to-service connection is enabled. See Configure Microsoft Defender for Endpoint with Intune.
- Sign-in or permission errors: See Troubleshooting issues on Microsoft Defender for Endpoint on Android for solutions to common onboarding errors.
Next steps
- Configure Microsoft Defender for Endpoint web protection settings for Android: Manage web protection settings from Intune by enrollment type.
- Configure Microsoft Defender for Endpoint on Android features: Configure privacy controls and other Android-specific Defender features.