You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
334
346
335
-
1. Choose a **Deployment channel** and select **Next**.
347
+
1. Choose a **Deployment channel**.
336
348
337
349
1. Select the [com.microsoft.autoupdate2.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig)**Configuration profile file** downloaded earlier, then select **Next**.
338
350
351
+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
352
+
339
353
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
340
354
341
355
1. Review the configuration profile, then select **Create**.
@@ -391,10 +405,12 @@ To create this profile, copy the code for the [Intune recommended profile](/defe
391
405
392
406
1. On the **Configuration settings** tab, enter the **Custom configuration profile****name**`com.microsoft.wdav`
393
407
394
-
1. Choose a **Deployment channel** and select **Next**.
408
+
1. Choose a **Deployment channel**.
395
409
396
410
1. Select the `com.microsoft.wdav.xml` Configuration profile file created earlier, then select **Next.**
397
411
412
+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
413
+
398
414
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
399
415
400
416
1. Review the configuration profile, then select **Create**.
@@ -421,12 +437,15 @@ The Device Control setting is included in the MacOS Full disk access template cr
421
437
422
438
For more information about Device Control for Microsoft Defender for Endpoint on macOS see [Device Control for MacOS](/defender-endpoint/mac-device-control-overview)
423
439
440
+
> [!IMPORTANT]
441
+
> You should create and deploy the configuration profiles in the order specified (steps 1-11) for a successful system configuration.
442
+
424
443
### Step 12: Publish the Microsoft Defender application
425
444
426
445
> [!IMPORTANT]
427
446
> The Microsoft Defender app for macOS splits features for both Microsoft Defender for Endpoint and Microsoft Purview Endpoint Data Loss Prevention, if you are also planning to onboard MacOS devices to Purview (Step 18), ensure Device Monitoring is turned on **at this stage**. To enable Purview Device Monitoring on the [Microsoft Purview Portal](https://purview.microsoft.com) go to **Settings > Devices.**
428
447
429
-
This step enables deploying Microsoft Defender for Endpoint to enrolled machines.
448
+
This step enables deploying Microsoft Defender for Endpoint to machines enrolled in Microsoft Intune.
430
449
431
450
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), open **Apps**.
432
451
@@ -442,18 +461,18 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
442
461
443
462
:::image type="content" source="media/mdatp-10-properties.png" alt-text="Screenshot that shows the application properties page." lightbox="media/mdatp-10-properties.png":::
444
463
464
+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
465
+
445
466
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
446
467
447
-
:::image type="content" source="media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="media/mdatp-11-assignments.png":::
448
-
449
-
1. On the Review+Create tab, select **Create**.
468
+
:::image type="content" source="media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="media/mdatp-11-assignments.png":::
469
+
470
+
1. On the **Review+Create** tab, select **Create**.
471
+
472
+
:::image type="content" source="media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="media/mdatp-12-applications.png":::
473
+
474
+
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
450
475
451
-
:::image type="content" source="media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="media/mdatp-12-applications.png":::
452
-
453
-
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
454
-
455
-
> [!IMPORTANT]
456
-
> You should create and deploy the configuration profiles in the order specified (steps 1-12) for a successful system configuration.
457
476
458
477
### Step 13: Download the Microsoft Defender for Endpoint onboarding package
459
478
@@ -465,26 +484,26 @@ To download the onboarding package from the Microsoft Defender portal:
465
484
466
485
1. On the **Deployment method** drop-down, select **Mobile Device Management / Microsoft Intune**.
467
486
468
-
:::image type="content" source="media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="media/macos-install-with-intune.png":::
469
-
470
-
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
:::image type="content" source="media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="media/deploy-onboarding-package.png":::
487
-
488
507
### Step 14: Deploy the Microsoft Defender for Endpoint onboarding package for MacOS
489
508
490
509
This profile contains license information for Microsoft Defender for Endpoint.
@@ -505,10 +524,12 @@ This profile contains license information for Microsoft Defender for Endpoint.
505
524
506
525
1. On the **Configuration settings** tab, enter a **Custom configuration profile****name.**
507
526
508
-
1. Choose a **Deployment channel** and select **Next**.
527
+
1. Choose a **Deployment channel**.
509
528
510
529
1. Select the *WindowsDefenderATPOnboarding.xml* Configuration profile file created earlier, then select **Next.**
511
530
531
+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
532
+
512
533
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
513
534
514
535
1. Review the configuration profile, then select **Create**.
@@ -530,19 +551,19 @@ There are multiple ways to look at this information in the [Microsoft Intune adm
530
551
1. Confirm device management.
531
552
532
553

533
-
534
-
2. Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
554
+
555
+
1. Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
535
556
536
557

537
-
558
+
538
559
1. Select **Continue** and complete the enrollment.
539
560
540
561
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
541
562
542
563
1. In Intune, select **Devices** > **All devices**. Here you can see your device among the listed:
543
564
544
565

545
-
566
+
546
567
#### Step 15c. Verify client device state
547
568
548
569
1. After the configuration profiles are deployed to your devices, open **System Settings > General > Device Management** on your MacOS device.
@@ -562,7 +583,7 @@ There are multiple ways to look at this information in the [Microsoft Intune adm
562
583
1. You should also see the **Microsoft Defender** icon in the top-right corner.
563
584
564
585

565
-
586
+
566
587
### Step 16: Verify anti-malware detection
567
588
568
589
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
0 commit comments