Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»Microsoft Defender ATP for Mobile
    Android

    Microsoft Defender ATP for Mobile

    Peter KlapwijkBy Peter KlapwijkJune 23, 2020Updated:June 26, 202018 Mins Read

    Microsoft released Microsoft Defender Advanced Threat Protection (ATP) for mobile devices in public preview. By this release, Microsoft made Defender ATP available for Android (and iOS will follow later this year), where it was already available on Windows, macOS and Linux.

    The first version of Defender ATP for Android devices provides malware scan, web protection and MDM support;

    • Alert when a malicious app (APK) is downloaded/installed
    • Notify users on install of clean apps
    • Block loading of unsafe pages
    • Block unsafe network connections that apps might make behind the scenes
    • ATP integration
    • Conditional Access based on device risk level
    • Mobile Device Management support

    As is already the case for Windows, we are now also able to connect ATP to Microsoft Intune for mobile devices. This allows us to use the Device Risk Level of the mobile devices in a Compliance policy. In combination with a Conditional Access policy, we can block mobile devices from accessing corporate data as soon as ATP detects a threat on the mobile device.

    In this post, I will show you how to get started with Defender ATP on mobile devices by connecting ATP with Microsoft Intune. By making this connection we are able to use the device state (machine risk score) from ATP in our Compliance policies.
    We also have a look at how to deploy the mobile app with Intune to our mobile devices and push an App configuration policy to configure Defender ATP. And as of last we test what happens when a threat is detected by ATP on the mobile device.

    Pre-requisites

    There are some pre-requisites before we can start using Microsoft Defender ATP (preview) on our mobile devices;

    • Active Microsoft 365 E5, Windows E5 or Microsoft 365 Security add-on license
    • Defender ATP already deployed in the tenant
    • Devices are managed/ enrolled in Microsoft Intune (MAM is not yet supported)
    • Android 6.0 and above

    Integrate ATP with Microsoft Intune

    To use the Device Risk Level in an Intune Compliance policy, we need to connect ATP with Intune.
    When you are already using the status of ATP for your Windows devices, skip this first step in Security Center and move to the second step.

    • Sign-in the the Microsoft Defender Security Center
    • Browse to Settings – Advanced features
    • Turn on Microsoft Intune Connection
    • Click Save
    • Sign-in to the Endpoint Manager admin center
    • Browse to Tenant Administration – Connectors and tokens
    • On the Microsoft Defender ATP tab turn on Connect Android devices of version 6.0.0 and above to Microsoft Defender ATP

    That`s all for the integration between ATP and Intune for mobile devices.

    Deploy Microsoft Defender ATP mobile

    We can deploy the Defender ATP app with Microsoft Intune.

    • Still in the Endpoint Manager Admin center browse to Apps – Android Apps
    • Click +Add
    • Choose Managed Google Play app
    • Click Select
    • In the search box enter Microsoft Defender ATP and click the search icon
    • Click Microsoft Defender ATP
    • Click Approve (twice)
    • Click Done
    • Back in the previous screen click Sync (on the top left)

    As soon as the sync is completed the new app shows up in the list of applications. Assign the app (as required) to a (pilot) group.

    Create Device risk-based Compliance policy

    To use the Device Risk Level from ATP, we need to add the Machine Risk Score to our Compliance Policy.

    • In the Endpoint Manager admin center browse to Devices – Android
    • On the Compliance policies tab click +Create Policy
    • Choose Android Enterprise (or Device admin) as Platform
    • Choose Device Owner or Work profile
    • Click Create
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Click Next
    • Open Microsoft Defender ATP
    • Choose the (maximum allowed) Machine risk score
    • Choose all other required Compliance settings of choice
    • Click Next

    Finish the profile creation wizard and assign the profile to a (test) group.

    Create App configuration policy

    Defender ATP on Android Enterprise supports App Configuration policies. At the moment of the preview, we can automatically grant read/ write permissions for External storage to Defender ATP with this policy.
    We also have the option to turn the Web protection on or off.

    • In the Endpoint Manager admin center browse to Apps – App configuration policies
    • Click +Add
    • Choose Managed devices
    • Give the profile a Name
    • Enter a Description (Optional)
    • Choose Android Enterprise as Platform
    • Choose your Platform (I choose Work profile and Device Owner Profile)
    • Choose Select app
    • Search for Defender
    • Select Microsoft Defender
    • Click OK
    • Back at the previous screen click Next
    • Click +Add under Permissions
    • Select External Storage (read) and select External storage (write)
    • Click OK
    • Select Auto grant from the drop down list under Permission state (twice)
    • Select Use configuration designer for the Configuration settings format
    • Click +Add
    • Select Web protection – Click OK
    • Set the Configuration value of your choice to enable or disable Web protection
    • Click Next

    Finish the App configuration policy wizard by assigning the correct scope and assign into your (pilot) group.

    Everything is in-place, time for testing!

    Test Microsoft Defender ATP for Mobile

    Let`s have a look at how Microsoft Defender ATP behaves on a threat on an Android device. First, we have a look at the mobile device and after that in the Security Center (Defender ATP) and Intune portal.

    For this example, I only allow access to corporate data when a device is compliant, by using a Conditional Access policy. If the device is marked as not compliant, access is blocked.

    I won`t go through the complete sign-in and activation process of Defender ATP on a mobile device. To activate it, you need to sign-in with your Azure AD account (and have a required license assigned).

    As you can see the storage permissions are already granted (via the App configuration policy), at this moment the other permissions need to be granted manually.

    When all permissions are granted, Microsoft Defender ATP is running.

    To test web protection, we can use this example site from Microsoft and open this in a web browser.
    I tested Microsoft Edge, Google Chrome and Mozilla Firefox on an Android device. As you can see, the phishing site is blocked on all browsers.

    To test the installation of a malicious app, we can install a test virus app from the Google Play store. Just search for test virus and you will find several different apps.

    As soon as the malicious app (test virus) is installed, it is detected by ATP and a pop-up is shown;
    Threats found on your device

    If we open the Company Portal app, we see the device is marked as Not Compliant.

    Access to apps with corporate data is blocked.
    It varies per application how fast access is blocked, Teams, for example, is blocked in seconds after the device is marked as not compliant, Outlook took some longer during my tests.

    The threat needs to be removed manually from the device, ATP cannot automatically clean-up the app;
    Swipe to the left on the threat info to remove it.

    This is not a limitation of ATP, I have seen this in the past with other vendors.

    After swiping to the left, a pop-up is shown.
    Click OK and the app/ threat is removed.

    If we switch to the Defender ATP portal we see the active alert Microsoft Defender ATP detected ‘EICAR-Test-File’ malware triggered by this test virus app.

    And if we search for our Android device, we see the device is marked with Risk level Medium.

    A

    If we open the device Alerts, we see the malware detection is marked as Medium Severity and the phishing sites are marked are Informational.

    On de device Timeline we see the alerts of the malware EICAR-TEST-File and the failed connections of the phishing sites.

    If we open the malware alert, we get some more information about the threat which is found. From here you can open the VirusTotal site with information about the threat, classify the alert, etc.

    If you clicked on Expand for more details in the previous screen and Open file page, you can dig further in this threat and see if this threat is seen on more devices.

    If we take a look at the Endpoint Manager Admin center (Intune portal) the device is marked as Not compliant.

    And that`s because the machine risk score is above the risk level we set in the Compliance policy.

    Pretty soon after removing the threat from the mobile device, the device is marked as Compliant and access to corporate data is allowed.

    For Android the current Defender ATP version is a good starting point, the basic features we expect for such a solution are in-place and the ATP app seems stable on Android.
    As this is just released in public preview, I expect the options to control ATP will be expanded in the coming months. And I`m looking forward to the ATP version for iOS.

    Android intu Intune MD ATP MEM Microsoft 365 Microsoft Endpoint Manager Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    MEM Monitoring: Get notified on Intune Configuration profile changes

    August 2, 2021

    Automatically configure Outlook contact sync to the native contacts app with Microsoft Intune

    July 6, 2020

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    March 29, 2019
    View 1 Comment

    1 Comment

    1. Pablo on February 26, 2021 20:24

      Excellent information. Thank you very much for your contributions.

      I have a question. If I need to automatically approve the other permissions that the application needs, how can I do it? I want to avoid that the user has to approve them, for example the accessibility permission

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}