Skip to content

Commit 16a9981

Browse files
authored
Merge pull request #341 from MicrosoftDocs/main
Publish main to live, Tuesday 3:30PM PDT, 05/07
2 parents d3c260c + 6f99f63 commit 16a9981

14 files changed

+603
-301
lines changed

defender-endpoint/mac-resources.md

Lines changed: 32 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 04/30/2024
17+
ms.date: 05/07/2024
1818
---
1919

2020
# Resources for Microsoft Defender for Endpoint on macOS
@@ -31,7 +31,7 @@ ms.date: 04/30/2024
3131
3232
## Collecting diagnostic information
3333

34-
If you can reproduce a problem, increase the logging level, run the system for some time, and restore the logging level to the default.
34+
If you can reproduce a problem, increase the logging level, run the system for some time, and then restore the logging level to the default.
3535

3636
1. Increase logging level:
3737

@@ -43,9 +43,9 @@ If you can reproduce a problem, increase the logging level, run the system for s
4343
Log level configured successfully
4444
```
4545

46-
2. Reproduce the problem
46+
2. Reproduce the problem.
4747

48-
3. Run `sudo mdatp diagnostic create` to back up the Microsoft Defender for Endpoint logs. The files will be stored inside a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
48+
3. Run `sudo mdatp diagnostic create` to back up the Microsoft Defender for Endpoint logs. The files are stored inside a `.zip` archive. This command also prints the file path to the backup after the operation succeeds.
4949

5050
> [!TIP]
5151
> By default, diagnostic logs are saved to `/Library/Application Support/Microsoft/Defender/wdavdiag/`. To change the directory where diagnostic logs are saved, pass `--path [directory]` to the below command, replacing `[directory]` with the desired directory.
@@ -58,7 +58,7 @@ If you can reproduce a problem, increase the logging level, run the system for s
5858
Diagnostic file created: "/Library/Application Support/Microsoft/Defender/wdavdiag/932e68a8-8f2e-4ad0-a7f2-65eb97c0de01.zip"
5959
```
6060

61-
4. Restore logging level:
61+
4. Restore logging level.
6262

6363
```bash
6464
mdatp log level set --level info
@@ -70,21 +70,20 @@ If you can reproduce a problem, increase the logging level, run the system for s
7070

7171
## Logging installation issues
7272

73-
If an error occurs during installation, the installer will only report a general failure.
73+
If an error occurs during installation, the installer reports a general failure only. The detailed log is saved to `/Library/Logs/Microsoft/mdatp/install.log`. If you experience issues during installation, send us this file when you open your support case so we can help diagnose the cause.
7474

75-
The detailed log will be saved to `/Library/Logs/Microsoft/mdatp/install.log`. If you experience issues during installation, send us this file so we can help diagnose the cause.
76-
For further troubleshooting installation issues, please review [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md)
75+
For further troubleshooting installation issues, see [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md).
7776

7877
## Uninstalling
7978

8079
> [!NOTE]
81-
> Before uninstalling Microsoft Defender for Endpoint on macOS, please offboard per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
80+
> Before uninstalling Microsoft Defender for Endpoint on macOS, offboard each device per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
8281
83-
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune.
82+
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Although centrally managed uninstallation is available on JAMF, it's not yet available for Microsoft Intune.
8483

8584
### Interactive uninstallation
8685

87-
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint > Move to Trash**.
86+
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint**, and then select **Move to Trash**.
8887

8988
### Supported output types
9089

@@ -100,19 +99,27 @@ Supports table and JSON format output types. For each command, there's a default
10099

101100
### Using JAMF Pro
102101

103-
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the **offboarding profile**.
102+
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the offboarding profile.
104103

105-
The **offboarding profile** should be uploaded without any modifications, and with Preference Domain name set to **com.microsoft.wdav.atp.offboarding**:
104+
The offboarding profile should be uploaded without any modifications, and with Preference Domain name set to `com.microsoft.wdav.atp.offboarding`, as shown in the following image:
106105

107106
:::image type="content" source="/defender/media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="/defender/media/defender-endpoint/jamf-pro-offboarding.png":::
108107

108+
109+
> [!NOTE]
110+
> If you have trouble uninstalling Defender for Endpoint on Mac, and you see in your reports an item for *Microsoft Defender Endpoint Security Extension*, follow these steps:
111+
> 1. Reinstall the Microsoft Defender app.
112+
> 2. Drag **Microsoft Defender.app** to **Trash**.
113+
> 3. Run this command: `sudo /Library/Application Support/Microsoft/Defender/uninstall/install_helper execute --path '/Library/Application Support/Microsoft/Defender/uninstall/uninstall' --args --post-uninstall-hook`.
114+
> 4. Restart the device.
115+
109116
## Configuring from the command line
110117

111-
Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line:
118+
Important tasks, such as controlling product settings and triggering on-demand scans, can be done by using the command line:
112119

113120
|Group|Scenario|Command|
114121
|---|---|---|
115-
|Configuration|Turn on/off antivirus passive mode|`mdatp config passive-mode --value [enabled/disabled]`|
122+
|Configuration|Turn on/off antivirus in passive mode|`mdatp config passive-mode --value [enabled/disabled]`|
116123
|Configuration|Turn on/off real-time protection|`mdatp config real-time-protection --value [enabled/disabled]`|
117124
|Configuration|Turn on/off cloud protection|`mdatp config cloud --value [enabled/disabled]`|
118125
|Configuration|Turn on/off product diagnostics|`mdatp config cloud-diagnostic --value [enabled/disabled]`|
@@ -141,11 +148,11 @@ Important tasks, such as controlling product settings and triggering on-demand s
141148
|Quarantine management|Remove all files from the quarantine|`mdatp threat quarantine remove-all`|
142149
|Quarantine management|Add a file detected as a threat to the quarantine|`mdatp threat quarantine add --id [threat-id]`|
143150
|Quarantine management|Remove a file detected as a threat from the quarantine|`mdatp threat quarantine remove --id [threat-id]`|
144-
|Quarantine management|Restore a file from the quarantine. Available in Defender for Endpoint version lower than 101.23092.0012.|`mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`|
145-
|Quarantine management|Restore a file from the quarantine with Threat ID. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat restore threat-id --id [threat-id] --destination-path [destination-folder]`|
146-
|Quarantine management|Restore a file from the quarantine with Threat Original Path. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat restore threat-path --path [threat-original-path] --destination-path [destination-folder]`|
151+
|Quarantine management|Restore a file from the quarantine. Available in Defender for Endpoint version before [101.23092.0012](mac-whatsnew.md#nov-2023-build-101230920007--release-version-2012309270).|`mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`|
152+
|Quarantine management|Restore a file from the quarantine with Threat ID. Available in Defender for Endpoint version [101.23092.0012](mac-whatsnew.md#nov-2023-build-101230920007--release-version-2012309270) or later.|`mdatp threat restore threat-id --id [threat-id] --destination-path [destination-folder]`|
153+
|Quarantine management|Restore a file from the quarantine with Threat Original Path. Available in Defender for Endpoint version [101.23092.0012](mac-whatsnew.md#nov-2023-build-101230920007--release-version-2012309270) or later.|`mdatp threat restore threat-path --path [threat-original-path] --destination-path [destination-folder]`|
147154
|Network Protection Configuration|Configure the Network Protection enforcement level|`mdatp config network-protection enforcement-level --value [Block/Audit/Disabled]`|
148-
|Network Protection management|Check Network protection has been started successfully|`mdatp health --field network_protection_status`|
155+
|Network Protection management|Check Network protection was started successfully|`mdatp health --field network_protection_status`|
149156
|Device Control management|Is Device Control enabled, and what is the Default Enforcement?|`mdatp device-control policy preferences list`|
150157
|Device Control management|What Device Control policy is enabled?|`mdatp device-control policy rules list`|
151158
|Device Control management|What Device Control policy groups are enabled?|`mdatp device-control policy groups list`|
@@ -154,7 +161,7 @@ Important tasks, such as controlling product settings and triggering on-demand s
154161
|Diagnostics|Generate diagnostic logs|`mdatp diagnostic create --path [directory]`|
155162
|Health|Check the product's health|`mdatp health`|
156163
|Health|Check for a specific product attribute|`mdatp health --field [attribute: healthy/licensed/engine_version...]`|
157-
|EDR|EDR list exclusions (root)|`mdatp edr exclusion list [processes|paths|extensions|all]`|
164+
|EDR|EDR list exclusions (root)| `mdatp edr exclusion list [processes|paths|extensions|all]` |
158165
|EDR|Set/Remove tag, only GROUP supported|`mdatp edr tag set --name GROUP --value [name]`|
159166
|EDR|Remove group tag from device|`mdatp edr tag remove --tag-name [name]`|
160167
|EDR|Add Group ID|`mdatp edr group-ids --group-id [group]`|
@@ -175,7 +182,7 @@ To enable autocompletion in zsh:
175182
cat ~/.zshrc | grep autoload
176183
```
177184

178-
- If the preceding command does not produce any output, you can enable autocompletion using the following command:
185+
- If the preceding command doesn't produce any output, you can enable autocompletion using the following command:
179186

180187
```zsh
181188
echo "autoload -Uz compinit && compinit" >> ~/.zshrc
@@ -191,9 +198,12 @@ To enable autocompletion in zsh:
191198

192199
## Client Microsoft Defender for Endpoint quarantine directory
193200

194-
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds is shown with `mdatp threat list`.
201+
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds are shown with `mdatp threat list`.
195202

196203
## Microsoft Defender for Endpoint portal information
204+
197205
The Microsoft Defender for Endpoint blog,
198206
[EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801) provides detailed guidance on what to expect.
207+
208+
199209
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mac-schedule-scan.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: YongRhee-MSFT
66
ms.author: yongrhee
77
manager: dansimp
88
ms.localizationpriority: medium
9-
ms.date: 04/28/2024
9+
ms.date: 05/06/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -183,6 +183,8 @@ The following code shows the schema you need to use to schedule scans according
183183
</dict>
184184
</dict>
185185
</dict>
186+
</array>
187+
</dict>
186188
</plist>
187189
```
188190

@@ -273,6 +275,8 @@ In the following example, an hourly quick scan will run every 6 hours, a daily q
273275
</dict>
274276
</dict>
275277
</dict>
278+
</array>
279+
</dict>
276280
</plist>
277281
```
278282
2. Save the file as _com.microsoft.wdav.mobileconfig_.

0 commit comments

Comments
 (0)