You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-mac-prerequisites.md
+29-20Lines changed: 29 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,9 @@ This article lists the prerequisites for installing and configuring Microsoft De
38
38
39
39
- A Defender for Endpoint subscription and access to the Microsoft Defender portal
40
40
- Beginner-level experience in macOS and BASH scripting
41
-
- Administrative privileges on the device (in manual deployment)
41
+
- For [manual deployments](#manual-deployment-requirements), administrative privileges on the device
42
+
- For [enterprise deployments](#enterprise-deployment-requirements), a Mobile Device Management (MDM) solution such as Microsoft Intune
43
+
-[Network connectivity](#network-connectivity) to the Microsoft Defenender for Endpoint service.
42
44
43
45
### System requirements
44
46
@@ -47,26 +49,31 @@ These three most recent major releases of macOS are supported.
47
49
- 14 (Sonoma)
48
50
- 13 (Ventura)
49
51
52
+
> [!NOTE]
53
+
> Beta versions of macOS aren't supported, but new releases of macOS are supported from day 1.
54
+
50
55
- Supported processors: x64 and ARM64
51
56
52
57
- Disk space: 1 GB
53
58
54
-
- Beta versions of macOS aren't supported.
59
+
> [!CAUTION]
60
+
> We recommend that you keep [System Integrity Protection](https://support.apple.com/HT204899) (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.
61
+
55
62
56
-
### Deployment methods
63
+
### Enterprise deployment requirements
57
64
58
-
There are several methods and deployment tools that you can use to install and configure Defender for Endpoint on macOS.
65
+
There are several methods and deployment tools that you can use to centrally install and configure Defender for Endpoint on macOS across
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#deployment-methods).
74
+
You can also configure Defender for Endpoint on macOS locally
68
75
69
-
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
@@ -101,6 +108,19 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
101
108
> Authenticated proxies aren't supported. Ensure that only PAC, WPAD, or a static proxy is being used.
102
109
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store won't allow for interception.
103
110
111
+
## Next steps
112
+
113
+
### Onboard client devices to Microsoft Defender for Endpoint
114
+
115
+
Onboarding Microsoft Defender for Endpoint for macOS requires the following steps:
116
+
117
+
- Install the .pkg containing the software
118
+
- Test the [network connectivity](#test-network-connectivity)
119
+
- Install the required system extensions
120
+
- On-board the device to Microsoft Defender for Endpoint
121
+
122
+
See [Onboard client devices running macOS to Microsoft Defender for Endpoint](onboard-client.md) for details.
123
+
104
124
#### Test network connectivity
105
125
106
126
To test that a connection isn't blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://cdn.x.cp.wd.microsoft.com/ping` in a browser.
@@ -117,29 +137,18 @@ The output from this command should be similar to the following:
117
137
118
138
`OK https://cdn.x.cp.wd.microsoft.com/ping`
119
139
120
-
> [!CAUTION]
121
-
> We recommend that you keep [System Integrity Protection](https://support.apple.com/HT204899) (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.
122
140
123
141
Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:
124
142
125
143
```bash
126
144
mdatp connectivity test
127
145
```
128
146
129
-
## Next steps
130
-
131
-
### How to update Microsoft Defender for Endpoint on macOS
132
-
133
-
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint on macOS devices, a program named Microsoft AutoUpdate (MAU) is used. To learn more, see [Deploy updates for Microsoft Defender for Endpoint on macOS](mac-updates.md).
134
-
135
-
### How to configure Microsoft Defender for Endpoint on macOS
136
-
137
-
Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).
138
147
139
148
## Resources
140
149
141
150
- For more information about logging, uninstalling, or other articles, see [Resources for Microsoft Defender for Endpoint on macOS](mac-resources.md).
142
151
-[Privacy for Microsoft Defender for Endpoint on macOS](mac-privacy.md).
143
152
-[Turn on Network protection for macOS](network-protection-macos.md)
144
153
145
-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
154
+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments