Microsoft Defender for Endpoint on Android and iOS is our mobile threat defense solution (MTD). Typically, companies are proactive in protecting PCs from vulnerabilities and attack while mobile devices often go unmonitored and unprotected. Where mobile platforms have built-in protection such as app isolation and vetted consumer app stores, these platforms remain vulnerable to web-based or other sophisticated attacks. As more employees use devices for work and to access sensitive information, it is imperative that companies deploy an MTD solution to protect devices and your resources from increasingly sophisticated attacks on mobiles.

Key capabilities

Microsoft Defender for Endpoint on Android and iOS provides the below key capabilities, For information about the latest features and benefits, read our announcements.

Capability Description
Web Protection Anti-phishing, blocking unsafe network connections, and support for custom indicators.
Malware Protection (Android-only) Scanning for malicious apps.
Jailbreak Detection (iOS-only) Detection of jailbroken devices.
Threat and Vulnerability Management (TVM). In preview. See note below* Vulnerability assessment of onboarded mobile devices. Visit this page to learn more about threat and vulnerability management in Microsoft Defender for Endpoint. Note that on iOS only OS vulnerabilities are supported in this preview.
Unified alerting Alerts from all platforms in the unified M365 security console
Conditional Access, Conditional launch Blocking risky devices from accessing corporate resources. Defender for Endpoint risk signals can also be added to app protection policies (MAM)
Integration with Microsoft Tunnel Can integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Available only on Android currently
Discover More help  Quickstart: Download the Microsoft Defender for Identity sensor setup package

All these capabilities are available for Microsoft Defender for Endpoint license holders. For more information, see Licensing requirements.


Vulnerability assessment on Android and iOS is currently in preview and may be substantially modified before it’s commercially released. If you’ve enabled public preview features, you can check out the TVM functionality on Android and iOS today! If not, we encourage you to turn on preview features for Microsoft Defender for Endpoint to get access to the newest capabilities.

Overview and Deploy

Deployment of Microsoft Defender for Endpoint on mobile can be done via Microsoft Endpoint Manager (MEM). Watch this video for a quick overview of MTD capabilities and deployment:

For more details, refer to the links below.

Android: Microsoft Defender for Endpoint on Android

iOS: Microsoft Defender for Endpoint on iOS

Pilot evaluation

During evaluation of mobile threat defense with Microsoft Defender for Endpoint, you can verify that certain criteria is met before proceeding to deploy the service to a larger set of devices. You can define the exit criteria and ensure that they are satisfied before deploying widely.

This helps reduce potential issues that could arise while rolling out the service. Below are few tests and exit criteria that might help:

  • Devices show up in the device inventory list: After successful onboarding of Defender for Endpoint on the mobile device, verify that the device is listed in the Device Inventory in the security console.
  • Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here is an example app that can be used for this test: Test virus. Note that on Android Enterprise with a work profile, only the work profile is supported.
  • Run a phishing test: Browse to https://smartscreentestratings2.net and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
  • Alerts appear in dashboard: Verify that alerts for above detection tests appear on the security console.
Discover More help  Prepare your security posture for your first incident (Microsoft)

Deployment best practices

End-user onboarding

  • Configure Conditional Access to enforce user onboarding: This can be applied to ensure end-users onboard to the Microsoft Defender for Endpoint app after deploying. Watch this video for a quick demo on configuring conditional access with Defender for Endpoint risk signals.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

(Visited 1 times, 1 visits today)