Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Set up Microsoft Defender in the Personal Profile on Android
    Intune

    Set up Microsoft Defender in the Personal Profile on Android

    Peter KlapwijkBy Peter KlapwijkNovember 4, 2022Updated:November 18, 202216 Mins Read

    For some time now Microsoft Defender for Endpoint has been available for our mobile devices which run iOS or Android. Defender is supported on the several management modes we have for Android Enterprise, like the corporate and personally owned devices with a Work profile.

    If we look at the solution for personally owned devices with a work profile, the Defender app is pushed to the work profile. It does its job inside the work profile by protecting you for example against malicious apps or suspicious websites. But to be honest, if I’m installing an app on my personal Android device, and that would be an app that is installed as an APK file (which probably has a high chance of being malicious), it’s done in the personal profile. I’m not even allowed to install unknown applications inside the work profile, certainly not from unknown sources.

    Or when I’m browsing, that’s most of the time also done using the browser in my personal profile and not using the browser in the work profile. So it would be nice and probably is of more value to (also) have Defender running in the personal profile.

    And Defender for Endpoint is now also supported to run in the personal profile of an Android Enterprise device, using the license of the company. So the user doesn’t have to purchase an additional license for Defender or run a similar app from another vendor to keep the personal profile safe.

    By default, the option to run Defender in the personal profile and use the license of the company is not turned on. We need to push an (additional) setting to the device with Microsoft Intune.

    We can’t force the installation of Defender in the personal profile as we do in the work profile, because it’s the personal profile and we don’t manage that part of the device. The user should install the application manually, together with the Company portal app. The Company portal works as a broker app, to apply the required setting from Intune. No sign-in to the Company Portal is needed (inside the personal profile).

    Let’s have a look at the implementation on the Intune side and after that how the user experience is.

    Requirements

    There are some requirements to run Defender for Endpoint in the personal profile:

    • Defender for Endpoint license (to run the Defender app itself)
    • Microsoft Intune license (to manage the device and push the configuration)
    • Microsoft Defender for Endpoint needs already to be installed and activated inside the work profile
    • The Company Portal app needs to be enabled inside the personal profile

    The licenses described above could also be purchased in a bundle like Intune is part of the EMS suite.

    I assume you already were able to deploy and configure Defender for Endpoint using Intune in the work profile. Therefore I’m not showing all the steps to add Defender in the Intune portal and configure the settings the get Defender up and running in the work profile.

    Enable Defender for the personal profile in the Intune portal

    A requirement is that Defender already needs to be installed and active inside the work profile, make sure to get the Defender for Endpoint app from the Google Playstore. Assign the app as a required application to your Android Enterprise devices.

    To enable Defender in the personal profile, there is just one setting that we need to deploy to our devices, besides the settings already deployed to manage the app inside the work profile. That setting is Microsoft Defender in Personal Profile and needs to be deployed with an App Configuration policy.
    Besides this setting, we have a few additional settings that we can configure for the personal profile. These settings are related to the privacy of the information Defender can report from the personal profile, for example, to hide URLs or app details.

    If you already have an App configuration policy deployed to your personally-owned Android devices with a work profile add the below setting to your existing policy. Otherwise, follow the below steps to create a new policy.

    • Sign in to the Microsoft Intune portal
    • Browse to Apps, App Configuration policies
    • Click Add and choose Managed devices
    • Enter a Name and Description (optional)
    • Select Android Enterprise as Platform
    • Select Personally-owned Work Profile Only as Profile type
    • Click Select app and search for Defender
    • Select Defender, click OK, and click Next

    We can add permission-related settings in this part of the policy, but these are for the work profile, not for the personal profile.

    • Select Use configuration designer as Configuration settings format.
    • Click Add (below the Configuration settings format text)

    If we search on Personal, we see a list with all personal profile-related settings we can configure.

    • Select at least Microsoft Defender in Personal Profile
    • Select additional settings (optional)
    • Click OK

    To enable a setting, add a 1 in the Configuration value field.
    Make sure to set the value for Microsoft Defender in Personal Profile to 1.

    The App Configuration policy is ready to be deployed.

    End-user experience

    Let’s have a look at an Android personally-owned device with a Work profile.
    On this device, Defender for Endpoint is already up and running in the work profile.

    To get Defender up and running in our personal profile, we first need to install Defender manually from the Google Play store.

    During enrollment of the Android device in Intune, we already installed the Company Portal app, but during enrollment it is disabled. Therefore the Company Portal only needs to be enabled again in the personal profile.
    There is no need to sign in to the Company Portal app!

    Now we need to sign in to the Defender app, using our corporate credentials.

    We are asked to register our device.

    We need to accept the Notice.

    And we finish the setup of Defender by allowing several permissions.

    And Defender for Endpoint is running in our personal profile!

    To test Defender, we could for example install a test anti-virus app from the store.

    The app is detected as a threat by Defender.

    Microsoft 365 Defender security portal

    If we now have a look at the Android devices in the Microsoft 365 Defender portal, we now see devices with the name ending onAEPersonal. These are de Defender instances running in the personal profile on Android. We have some insight into the threats and alerts triggered on the personal profile.

    But as I have configured the privacy-related settings to hide personal information, we see information replaced by <hidden for privacy> in the alerts.

    Also on the timeline privacy sensitive information is hidden.

    Our Android users are more secure, but privacy is guaranteed!

    Thanks for reading and leave a comment if you have any questions.s

    Intune MEM Microsoft Endpoint Manager Windows Windows 11 Windows Autopilot
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    MEM Monitoring: Get notified on Intune Configuration profile changes

    August 2, 2021

    Windows Autopilot lifecycle automation with Logic Apps

    March 8, 2021

    Manage Mozilla Firefox settings with Microsoft Intune

    March 11, 2020
    View 1 Comment

    1 Comment

    1. FMsec on November 2, 2023 07:11

      Was pulling my hair out on this one… Very weird setup with the auto-disabled Portal. Appreciate it!

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Adam on Get notified on expiring Azure App Registration client secrets
    • Peter Klapwijk on Update Windows Defender during Windows Autopilot enrollments
    • Rob van de Ven on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Carl on Update Windows Defender during Windows Autopilot enrollments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}