You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-migrate-app.md
+35-34Lines changed: 35 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 01/31/2022
8
+
ms.date: 03/08/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -38,22 +38,14 @@ The following device platforms support Microsoft Defender for Endpoint as the tu
38
38
-**Android Enterprise**:
39
39
- Fully managed
40
40
- Corporate-owned work profile
41
-
- Personally-owned work Profile
41
+
- Personallyowned work Profile
42
42
43
43
On June 14, 2021, Microsoft Defender for Endpoint became generally available as the Microsoft Tunnel client app for Android for use with the Microsoft Tunnel Gateway in Microsoft Intune.
44
44
45
45
If you've previously configured Microsoft Tunnel for Android using the standalone Microsoft Tunnel client app, you must migrate your devices to use Microsoft Defender for Endpoint as the Tunnel client app before support for the Android standalone Tunnel client app ends on October 26, 2021.
46
46
47
47
When using Microsoft Defender for Endpoint to connect to Tunnel for Android, use [custom settings](../protect/microsoft-tunnel-configure.md#use-custom-settings-for-microsoft-defender-for-endpoint) in the VPN profile to manage Defender for Endpoint instead of using a separate app configuration profile. If you don't intend to use any Defender functionality, including web protection, use [custom settings](../protect/microsoft-tunnel-configure.md#use-custom-settings-for-microsoft-defender-for-endpoint) in the VPN profile and set the **defendertoggle** setting to **0**.
48
48
49
-
<!-- Hiding the following info box, but keeping it for historical context and in case these issues resurface in the future >
50
-
51
-
> [!IMPORTANT]
52
-
> If you are using per-app VPN and also have Defender web protection enabled, you may experience connectivity issues for apps outside your per-app VPN list in the following scenarios, which may prevent devices from communicating with Intune:
53
-
> - You are using an internal proxy. In this case, you must disable web protection in the VPN profile by adding the **antiphishing** setting in the [custom settings](../protect/microsoft-tunnel-configure.md#use-custom-settings-for-microsoft-defender-for-endpoint) section and entering a value of **0**.
54
-
> - You are using internal DNS servers. You must include the IP address of at least one publicly-accessible DNS server, like 1.1.1.1, in your Tunnel Gateway [server configurations](../protect/microsoft-tunnel-configure.md#create-a-server-configuration).
55
-
-->
56
-
57
49
-**iOS/iPadOS devices (in public preview)**:
58
50
59
51
In January 2022, a preview version of Microsoft Defender for Endpoint became available as the Microsoft Tunnel client app for iOS/iPadOS devices for use with the Microsoft Tunnel Gateway in Microsoft Intune.
@@ -119,12 +111,6 @@ Screenshot of the Defender for Endpoint app on Android:
119
111
120
112
:::image type="content" source="./media/microsoft-tunnel-migrate-app/defender-app-android.png" alt-text="Screenshot of the Defender for Endpoint app on Android.":::
121
113
122
-
<!--
123
-
Screenshot of the Defender for Endpoint app on iOS/iPadOS:
124
-
125
-
:::image type="content" source="./media/microsoft-tunnel-migrate-app/defender-app-ios.png" alt-text="Screenshot of the Defender for Endpoint app on iOS/iPadOS.":::
126
-
-->
127
-
128
114
For information about license requirements for Microsoft Defender for Endpoint, see [Get Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare#get-microsoft-defender-for-endpoint).
129
115
130
116
## Migrate Android devices to Defender for Endpoint
@@ -138,16 +124,6 @@ Migrating to Microsoft Defender for Endpoint requires the following broad action
138
124
3. Create new VPN profiles.
139
125
4. Clean up your previous deployments.
140
126
141
-
<!-- No longer needed due to fix made in early September, 2021, but retaining for history and in case issues arise again
142
-
143
-
> [!IMPORTANT]
144
-
>
145
-
> If you use *Always-on VPN* with the standalone Tunnel client app today, during migration to Microsoft Defender for Endpoint:
146
-
>
147
-
> - Set *Always-on VPN* to **Not configured** in profiles for **Microsoft Tunnel (standalone client)**, which is the old client app.
148
-
> - Set *Always-on VPN* to **Enable** in profiles for **Microsoft Tunnel**, which is the new Microsoft Defender for Endpoint client app.
149
-
-->
150
-
151
127
### Deploy Defender for Endpoint for Android
152
128
153
129
Microsoft Defender for Endpoint with support for Microsoft Tunnel on Android, is available from the Managed Google Play store.
@@ -189,7 +165,7 @@ To enable devices to use Microsoft Defender for Endpoint to connect to Microsoft
189
165
190
166
If you’re using only the Tunnel functionality from the Defender for Endpoint app, and not Defender-specific functionality, add a [custom setting](../protect/microsoft-tunnel-configure.md#use-custom-settings-for-microsoft-defender-for-endpoint) of **defendertoggle** that is set to **0**. This configuration disables the Defender functionality, leaving only the Tunnel capabilities.
191
167
192
-
> [!NOTE]
168
+
> [!NOTE]
193
169
> If you are using the Microsoft Defender for Endpoint app for Android, have web protection enabled, and are using per-app VPN, web protection will only apply to the apps in the per-app VPN list. On devices with a work profile, in this scenario we recommend adding all web browsers in the work profile to the per-app VPN list to ensure all work profile web traffic is protected.
194
170
195
171
### Clean up previous deployments for Android
@@ -212,14 +188,14 @@ Migrating to Defender for Endpoint requires the following broad actions, which a
212
188
213
189
1. Deploy Microsoft Defender for Endpoint to supported devices.
214
190
2. Review and record your current Tunnel configurations.
215
-
3. Create new VPN profiles that use *Microsoft Tunnel (preview)* as the connection type.
191
+
3. Create new VPN profiles or reconfigure existing profiles to use *Microsoft Tunnel (preview)* as the connection type.
216
192
4. Clean up your previous deployments.
217
193
218
194
The server settings stay exactly the same regardless of the client you’re using.
219
195
220
196
### Install the preview version of Defender for Endpoint
221
197
222
-
The preview version of Microsoft Defender for Endpoint with support for Microsoft Tunnel on iOS, is available from the Apple app store.
198
+
The preview version of Microsoft Defender for Endpoint with support for Microsoft Tunnel on iOS is available from the Apple app store.
223
199
224
200
1. Locate and **Approve** the app in the Apple app store for your tenant, and then **Sync** it. For information on this process, see [Add iOS store apps to Microsoft Intune](../apps/store-apps-ios.md).
225
201
2.**Assign** the app to groups.
@@ -241,9 +217,34 @@ Before you begin your migration to Defender for Endpoint, use the [Microsoft End
241
217
242
218
2. From Properties, record the available values including those that are assigned as *required* or are assigned as *available*. This information will help you to create similar deployments for the Microsoft Defender for Endpoint app.
243
219
244
-
### Create new VPN profiles for iOS/iPadOS
220
+
### Manage VPN profiles for iOS/iPadOS
221
+
222
+
To enable devices to use Microsoft Defender for Endpoint to connect to Microsoft Tunnel Gateway, deploy VPN profiles that use the **Microsoft Tunnel (preview)** connection type. During migration you can choose to edit your existing profiles to use the new connection type, or create new VPN profiles with the new connection type.
223
+
224
+
#### Modify a VPN Profile for Microsoft Tunnel
225
+
226
+
Use the following steps to modify a VPN profile to migrate devices from the standalone tunnel client app to Microsoft Defender for Endpoint as the tunnel client app.
227
+
228
+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to > **Devices** > **Configuration profiles** > **iOS/iPadOS**.
229
+
2. Select the VPN profile you want to edit, and then select **Properties**, and then **Edit** the *Configuration settings*.
230
+
3. On the *Configuration settings* page:
231
+
232
+
1. Review the current settings for each category. When you change the *Connection type* the profiles settings are cleared and you’ll need to restore them.
233
+
2. Change the *Connection type* from *Microsoft Tunnel (standalone client)(preview)* to **Microsoft Tunnel(preview)**.
234
+
3. Reenter the applicable settings for this VPN profile.
235
+
236
+
> [!IMPORTANT]
237
+
> Even when a setting appears to remain configured and not cleared, reenter each setting to ensure the correct values are applied.
238
+
239
+
4. If you’re using only the Tunnel functionality from the Defender for Endpoint app, and not Defender-specific functionality, add a [custom setting](../protect/microsoft-tunnel-configure.md#use-custom-settings-for-microsoft-defender-for-endpoint) of **TunnelOnly** that is set to **True**. This configuration disables the Defender functionality, leaving only the Tunnel capabilities.
240
+
241
+
4. Select **Review + save** to save the profile.
242
+
5. After the profile redeploys, wait for devices to check in or force devices to sync to get the new policies.
243
+
6. Verify that users can connect to Tunnel manually in the Defender for Endpoint app. If your VPN profile includes on-demand rules, users must open the Defender for Endpoint app one time before the new on-demand rules can apply.
244
+
245
+
#### Create a new VPN profile for Microsoft Tunnel
245
246
246
-
To enable devices to use Microsoft Defender for Endpoint to connect to Microsoft Tunnel Gateway, deploy new VPN profiles with the **Microsoft Tunnel (preview)** connection type. Editing the connection type of an existing profile isn’t supported.
247
+
Use the following steps to create a new VPN profile for devices that will use *Microsoft Defender for Endpoint* as the tunnel client app. When the profile is configured as a per-app VPN, the last step requires you to restart devices after they receive the VPN profile. To avoid this you can choose to [modify an existing VPN profile](#modify-a-vpn-profile-for-microsoft-tunnel) instead of creating and deploying a new one.
247
248
248
249
1. Use the information from [Create a VPN Profile](../protect/microsoft-tunnel-configure.md#create-a-vpn-profile) to create and deploy new VPN profiles for your iOS/iPadOS devices.
249
250
@@ -252,12 +253,12 @@ If you’re using only the Tunnel functionality from the Defender for Endpoint a
252
253
253
254
3. After the profile deploys, wait for devices to check in or force devices to sync to get the new policies.
254
255
255
-
4. Verify that users can connect to Tunnel manually in the Defender for Endpoint app. If your VPN Profile includes on-demand rules, users must open the Defender for Endpoint app one time before the new on-demand rules can apply.
256
+
4. Verify that users can connect to Tunnel manually in the Defender for Endpoint app. If your VPN profile includes on-demand rules, users must open the Defender for Endpoint app one time before the new on-demand rules can apply.
256
257
257
258
5. If you’re using per-app VPN:
258
-
1. Wait at least 10 minutes after creating the new VPN profile. After 10 minutes you can then change the app deployment assignments from the *Microsoft Tunnel (standalone client) (preview)* VPN profile to the new VPN Profile for *Microsoft Tunnel (preview)*.
259
+
1. Wait at least 10 minutes after creating the new VPN profile. After 10 minutes you can then change the app deployment assignments from the *Microsoft Tunnel (standalone client) (preview)* VPN profile to the new VPN profile for *Microsoft Tunnel (preview)*.
259
260
260
-
2.For each app that is assigned as *available*, users must reinstall the app ***after the new VPN profile is installed on their device*** so that the VPN profile assignment can update. This can be done by going to Company Portal, going to **Apps**, tapping the app, and tapping **Install**.
261
+
2.After the new VPN profile deploys to a device, that device must restart before the new VPN profile is used. To restart a device, see [remotely restart devices with Intune](/intune/remote-actions/device-restart.md).
0 commit comments