You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
40
40
41
41
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
42
42
43
-
### How do I know whether the policy has been delivered to the client machine?
43
+
### How do I know if the policy is delivered to the client machine?
44
44
45
45
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-intune.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
45
45
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46
46
47
47
> [!NOTE]
48
-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48
+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-jamf.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,27 +43,27 @@ Before you get started with Removable Storage Access Control, you must confirm y
43
43
44
44
### Step 1: Create policy JSON
45
45
46
-
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46
+
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here's the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
47
47
48
-
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48
+
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
49
49
50
50
### Step 2: Update MDE Preferences Schema
51
51
52
-
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json)has been updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52
+
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json)is updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
53
53
54
54
:::image type="content" source="media/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="media/macos-device-control-jamf-mde-preferences-schema.png":::
55
55
56
56
### Step 3: Add Device Control Policy to MDE Preferences
57
57
58
-
A new 'Device Control' property will now be available to add to the UX.
58
+
A new 'Device Control' property is now available to add to the UX.
59
59
60
60
1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
61
61
62
62
:::image type="content" source="media/macos-device-control-jamf-device-control-property.png" alt-text="Shows how to add Device Control in Microsoft Defender for Endpoint" lightbox="media/macos-device-control-jamf-device-control-property.png":::
63
63
64
-
2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
64
+
2. Next, scroll down until you see the **Device Control** property (it's the bottommost entry), and select **Add/Remove properties** directly underneath it.
65
65
66
-
3. Select **Device Control Policy**, and then click**Apply**.
66
+
3. Select **Device Control Policy**, and then select**Apply**.
67
67
68
68
:::image type="content" source="media/macos-device-control-jamf-device-control-add-remove-property.png" alt-text="Shows how to apply Device Control Policy in Microsoft Defender for Endpoint." lightbox="media/macos-device-control-jamf-device-control-add-remove-property.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ Microsoft Defender for Endpoint Device Control feature enables you to:
52
52
53
53
- Microsoft Defender for Endpoint entitlement (can be trial)
54
54
- Minimum OS version: macOS 11 or higher
55
-
- Deploy Full Disk Access: you may already have previously created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
55
+
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
56
56
- Enable Device Control on the MDE Preference setting:
57
57
58
58
- Data Loss Prevention (DLP)/Features/
@@ -90,7 +90,7 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
90
90
91
91
## Understanding policies
92
92
93
-
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
93
+
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
94
94
95
95
The Device Control for macOS policy includes settings, groups, and rules:
96
96
@@ -112,9 +112,9 @@ The Device Control for macOS policy includes settings, groups, and rules:
112
112
113
113
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
114
114
115
-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example on a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116
-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117
-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there may still be gaps if the operation is performed using an application that isn't supported by macOS device control.
115
+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116
+
- To stay consistent with Windows, there are ```generic_read```,```generic_write```,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117
+
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
118
118
119
119
120
120
### Settings
@@ -123,7 +123,7 @@ Here are the properties you can use when you create the groups, rules, and setti
123
123
124
124
| Property name | Description | Options |
125
125
|:---|:---|:---|
126
-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it will not apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126
+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
127
127
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny`|
128
128
| ux | You can set a hyperlink on notification. |`navigationTarget: string`. Example: `"http://www.microsoft.com"`|
129
129
@@ -190,7 +190,7 @@ The following table lists the properties you can use in your entry:
| enforcement || - `$type`:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny`<br/><br/>**When $type allow is selected, options value supports:** <br/>- `disable_audit_allow`<br/> Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event.<br/><br/>**When $type deny is selected, options value supports:** <br/>`disable_audit_deny`<br/>Even if **Block** happens and the **auditDeny** is setting configured, the system won't show notification or send event.<br/><br/>**When $type auditAllow is selected, options value supports:** <br/>`send_event`<br/><br/>**When $type auditDeny is selected, options value supports:** <br/>`send_event`<br/>`show_notification`|
193
-
|`access`||Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193
+
|`access`||Specify one or more access rights for this rule. These might include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
194
194
|`id`| UUID||
195
195
196
196
The following table lists the properties you can use in entry:
-`active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
260
260
-[] - Device Control isn't configured on this machine.
261
261
-["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
262
-
-["v1","v2"] - You have both v1 and v2 enabled. Offboard from v1.
262
+
-["v1,""v2"] - You have both v1 and v2 enabled. Offboard from v1.
263
263
-`v1_configured` - v1 configuration is applied
264
264
-`v1_enforcement_level` - when v1 is enabled
265
265
-`v2_configured` - v2 configuration is applied
@@ -473,7 +473,7 @@ In this case, only have one access rule policy, but if you have multiple, make s
473
473
## Known Issues
474
474
475
475
> [!WARNING]
476
-
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering and MIDI.
476
+
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering, and MIDI.
477
477
478
478
> [!WARNING]
479
479
> Device Control on macOS doesn't prevent software developed on XCode from being transferred to an external device.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-exclusions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Exclusions can be useful to avoid incorrect detections on files or software that
41
41
To narrow down which process and/or path and/or extension you need to exclude, use [real-time-protection-statistics](mac-support-perf.md).
42
42
43
43
> [!WARNING]
44
-
> Defining exclusions lowers the protection offered by Defender for Endpoint on Mac. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
44
+
> Defining exclusions lowers the protection offered by Defender for Endpoint on Mac. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
45
45
46
46
## Supported exclusion types
47
47
@@ -62,9 +62,9 @@ File, folder, and process exclusions support the following wildcards:
62
62
|?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not `file123.log`|
63
63
64
64
> [!NOTE]
65
-
> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
65
+
> Using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
66
66
>
67
-
> The product attempts to resolve firmlinks when evaluating exclusions. Firmlink resolution does not work when the exclusion contains wildcards or the target file (on the `Data` volume) does not exist.
67
+
> The product attempts to resolve firm links when evaluating exclusions. Firm link resolution doesn't work when the exclusion contains wildcards or the target file (on the `Data` volume) doesn't exist.
68
68
69
69
## Best practices for adding antimalware exclusions for Microsoft Defender for Endpoint on macOS.
70
70
@@ -74,7 +74,7 @@ File, folder, and process exclusions support the following wildcards:
74
74
75
75
*except for apps that the ISV stated that there's no other tweaking that could be done to prevent the false positive or higher cpu utilization from occurring.
76
76
77
-
1. Avoid migrating non-Microsoft antimalware exclusions since they may no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
77
+
1. Avoid migrating non-Microsoft antimalware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
78
78
79
79
1. Order of exclusions to consider top (more secure) to bottom (least secure):
0 commit comments