Skip to content

Commit 1ff1452

Browse files
authored
Merge pull request #4397 from yujiaoMSFT/docs-editor/mac-install-with-intune-1751466068
Update mac-install-with-intune.md
2 parents 2f77fbb + 32fbf66 commit 1ff1452

File tree

2 files changed

+53
-32
lines changed

2 files changed

+53
-32
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 53 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,12 @@ To configure your network filter:
122122

123123
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
124124

125-
1. Choose a **Deployment channel** and select **Next**.
125+
1. Choose a **Deployment channel**.
126126

127127
1. Select the [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
128128

129+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
130+
129131
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
130132

131133
1. Review the configuration profile, then select **Create**.
@@ -157,10 +159,12 @@ To configure Full Disk Access:
157159

158160
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
159161

160-
1. Choose a **Deployment channel** and select **Next**.
162+
1. Choose a **Deployment channel**.
161163

162164
1. Select the [fulldisk.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
163165

166+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
167+
164168
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
165169

166170
1. Review the configuration profile, then select **Create**.
@@ -193,10 +197,12 @@ To configure background services:
193197

194198
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
195199

196-
1. Choose a **Deployment channel** and select **Next**.
200+
1. Choose a **Deployment channel**.
197201

198202
1. Select the [background_services.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
199203

204+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
205+
200206
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
201207

202208
1. Review the configuration profile, then select **Create**.
@@ -229,10 +235,12 @@ To configure notifications:
229235

230236
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
231237

232-
1. Choose a **Deployment channel** and select **Next**.
238+
1. Choose a **Deployment channel**.
233239

234240
1. Select the [notif.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/notif.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
235241

242+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
243+
236244
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
237245

238246
1. Review the configuration profile, then select **Create**.
@@ -259,10 +267,12 @@ Download [accessibility.mobileconfig](https://raw.githubusercontent.com/microsof
259267

260268
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
261269

262-
1. Choose a **Deployment channel** and select **Next**.
270+
1. Choose a **Deployment channel**.
263271

264272
1. Select the [accessibility.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/macos/mobileconfig/profiles/accessibility.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
265273

274+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
275+
266276
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
267277

268278
1. Review the configuration profile, then select **Create**.
@@ -290,10 +300,12 @@ Download **[bluetooth.mobileconfig](https://raw.githubusercontent.com/microsoft/
290300

291301
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
292302

293-
1. Choose a **Deployment channel** and select **Next**.
303+
1. Choose a **Deployment channel**.
294304

295305
1. Select the [bluetooth.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
296306

307+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
308+
297309
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
298310

299311
1. Review the configuration profile, then select **Create**.
@@ -332,10 +344,12 @@ Download **[com.microsoft.autoupdate2.mobileconfig](https://raw.githubuserconten
332344

333345
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name.
334346

335-
1. Choose a **Deployment channel** and select **Next**.
347+
1. Choose a **Deployment channel**.
336348

337349
1. Select the [com.microsoft.autoupdate2.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) **Configuration profile file** downloaded earlier, then select **Next**.
338350

351+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
352+
339353
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
340354

341355
1. Review the configuration profile, then select **Create**.
@@ -391,10 +405,12 @@ To create this profile, copy the code for the [Intune recommended profile](/defe
391405

392406
1. On the **Configuration settings** tab, enter the **Custom configuration profile** **name** `com.microsoft.wdav`
393407

394-
1. Choose a **Deployment channel** and select **Next**.
408+
1. Choose a **Deployment channel**.
395409

396410
1. Select the `com.microsoft.wdav.xml` Configuration profile file created earlier, then select **Next.**
397411

412+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
413+
398414
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
399415

400416
1. Review the configuration profile, then select **Create**.
@@ -421,12 +437,15 @@ The Device Control setting is included in the MacOS Full disk access template cr
421437

422438
For more information about Device Control for Microsoft Defender for Endpoint on macOS see [Device Control for MacOS](/defender-endpoint/mac-device-control-overview)
423439

440+
> [!IMPORTANT]
441+
> You should create and deploy the configuration profiles in the order specified (steps 1-11) for a successful system configuration.
442+
424443
### Step 12: Publish the Microsoft Defender application
425444

426445
> [!IMPORTANT]
427446
> The Microsoft Defender app for macOS splits features for both Microsoft Defender for Endpoint and Microsoft Purview Endpoint Data Loss Prevention, if you are also planning to onboard MacOS devices to Purview (Step 18), ensure Device Monitoring is turned on **at this stage**. To enable Purview Device Monitoring on the [Microsoft Purview Portal](https://purview.microsoft.com) go to **Settings > Devices.**
428447
429-
This step enables deploying Microsoft Defender for Endpoint to enrolled machines.
448+
This step enables deploying Microsoft Defender for Endpoint to machines enrolled in Microsoft Intune.
430449

431450
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), open **Apps**.
432451

@@ -442,18 +461,18 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
442461

443462
:::image type="content" source="media/mdatp-10-properties.png" alt-text="Screenshot that shows the application properties page." lightbox="media/mdatp-10-properties.png":::
444463

464+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
465+
445466
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
446467

447-
:::image type="content" source="media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="media/mdatp-11-assignments.png":::
448-
449-
1. On the Review+Create tab, select **Create**.
468+
:::image type="content" source="media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="media/mdatp-11-assignments.png":::
469+
470+
1. On the **Review+Create** tab, select **Create**.
471+
472+
:::image type="content" source="media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="media/mdatp-12-applications.png":::
473+
474+
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
450475

451-
:::image type="content" source="media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="media/mdatp-12-applications.png":::
452-
453-
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
454-
455-
> [!IMPORTANT]
456-
> You should create and deploy the configuration profiles in the order specified (steps 1-12) for a successful system configuration.
457476

458477
### Step 13: Download the Microsoft Defender for Endpoint onboarding package
459478

@@ -465,26 +484,26 @@ To download the onboarding package from the Microsoft Defender portal:
465484

466485
1. On the **Deployment method** drop-down, select **Mobile Device Management / Microsoft Intune**.
467486

468-
:::image type="content" source="media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="media/macos-install-with-intune.png":::
469-
470-
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
487+
![macos-download-onboarding-package](media/mac-install-with-intune/macos-download-onboarding-package.png)
488+
489+
490+
491+
3. Select **Download onboarding package**. Save it as _GatewayWindowsDefenderATPOnboardingPackage.zip_ to the same directory.
471492

472493
1. Extract the contents of the .zip file:
473494

474495
```bash
475-
unzip WindowsDefenderATPOnboardingPackage.zip
496+
unzip GatewayWindowsDefenderATPOnboardingPackage.zip
476497
```
477498

478499
```console
479-
Archive: WindowsDefenderATPOnboardingPackage.zip
480-
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
500+
Archive: GatewayWindowsDefenderATPOnboardingPackage.zip
501+
warning: GatewayWindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
481502
inflating: intune/kext.xml
482503
inflating: intune/WindowsDefenderATPOnboarding.xml
483504
inflating: jamf/WindowsDefenderATPOnboarding.plist
484505
```
485506

486-
:::image type="content" source="media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="media/deploy-onboarding-package.png":::
487-
488507
### Step 14: Deploy the Microsoft Defender for Endpoint onboarding package for MacOS
489508

490509
This profile contains license information for Microsoft Defender for Endpoint.
@@ -505,10 +524,12 @@ This profile contains license information for Microsoft Defender for Endpoint.
505524

506525
1. On the **Configuration settings** tab, enter a **Custom configuration profile** **name.**
507526

508-
1. Choose a **Deployment channel** and select **Next**.
527+
1. Choose a **Deployment channel**.
509528

510529
1. Select the *WindowsDefenderATPOnboarding.xml* Configuration profile file created earlier, then select **Next.**
511530

531+
1. On the **Scope Tags** tab, (optional) select scope tags, then select **Next.**
532+
512533
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
513534

514535
1. Review the configuration profile, then select **Create**.
@@ -530,19 +551,19 @@ There are multiple ways to look at this information in the [Microsoft Intune adm
530551
1. Confirm device management.
531552

532553
![Screenshot that shows the Confirmed device management page](media/mdatp-3-confirmdevicemgmt.png)
533-
534-
2. Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
554+
555+
1. Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
535556

536557
![Screenshot that shows the Management profile page.](media/mdatp-4-managementprofile.png)
537-
558+
538559
1. Select **Continue** and complete the enrollment.
539560

540561
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
541562

542563
1. In Intune, select **Devices** > **All devices**. Here you can see your device among the listed:
543564

544565
![Screenshot that shows the All Devices page.](media/mdatp-5-alldevices.png)
545-
566+
546567
#### Step 15c. Verify client device state
547568

548569
1. After the configuration profiles are deployed to your devices, open **System Settings > General > Device Management** on your MacOS device.
@@ -562,7 +583,7 @@ There are multiple ways to look at this information in the [Microsoft Intune adm
562583
1. You should also see the **Microsoft Defender** icon in the top-right corner.
563584

564585
![Screenshot that shows the icon for Microsoft Defender for Endpoint in the status bar.](media/mdatp-icon-bar.png)
565-
586+
566587
### Step 16: Verify anti-malware detection
567588

568589
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
115 KB
Loading

0 commit comments

Comments
 (0)