Skip to content

Commit 238aa2c

Browse files
committed
acrolinx edits
1 parent 0715272 commit 238aa2c

10 files changed

+88
-88
lines changed

defender-endpoint/mac-device-control-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
4040

4141
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
4242

43-
### How do I know whether the policy has been delivered to the client machine?
43+
### How do I know if the policy is delivered to the client machine?
4444

4545
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
4646

defender-endpoint/mac-device-control-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
4545
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4646

4747
> [!NOTE]
48-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4949
5050
### Deploy the mobileconfig file using Intune
5151

defender-endpoint/mac-device-control-jamf.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,27 +43,27 @@ Before you get started with Removable Storage Access Control, you must confirm y
4343

4444
### Step 1: Create policy JSON
4545

46-
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46+
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here's the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4747

48-
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4949

5050
### Step 2: Update MDE Preferences Schema
5151

52-
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) has been updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52+
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) is updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
5353

5454
:::image type="content" source="media/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="media/macos-device-control-jamf-mde-preferences-schema.png":::
5555

5656
### Step 3: Add Device Control Policy to MDE Preferences
5757

58-
A new 'Device Control' property will now be available to add to the UX.
58+
A new 'Device Control' property is now available to add to the UX.
5959

6060
1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
6161

6262
:::image type="content" source="media/macos-device-control-jamf-device-control-property.png" alt-text="Shows how to add Device Control in Microsoft Defender for Endpoint" lightbox="media/macos-device-control-jamf-device-control-property.png":::
6363

64-
2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
64+
2. Next, scroll down until you see the **Device Control** property (it's the bottommost entry), and select **Add/Remove properties** directly underneath it.
6565

66-
3. Select **Device Control Policy**, and then click **Apply**.
66+
3. Select **Device Control Policy**, and then select **Apply**.
6767

6868
:::image type="content" source="media/macos-device-control-jamf-device-control-add-remove-property.png" alt-text="Shows how to apply Device Control Policy in Microsoft Defender for Endpoint." lightbox="media/macos-device-control-jamf-device-control-add-remove-property.png":::
6969

defender-endpoint/mac-device-control-overview.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Microsoft Defender for Endpoint Device Control feature enables you to:
5252

5353
- Microsoft Defender for Endpoint entitlement (can be trial)
5454
- Minimum OS version: macOS 11 or higher
55-
- Deploy Full Disk Access: you may already have previously created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
55+
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
5656
- Enable Device Control on the MDE Preference setting:
5757

5858
- Data Loss Prevention (DLP)/Features/
@@ -90,7 +90,7 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
9090

9191
## Understanding policies
9292

93-
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
93+
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
9494

9595
The Device Control for macOS policy includes settings, groups, and rules:
9696

@@ -112,9 +112,9 @@ The Device Control for macOS policy includes settings, groups, and rules:
112112

113113
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
114114

115-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example on a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there may still be gaps if the operation is performed using an application that isn't supported by macOS device control.
115+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116+
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` ,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117+
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
118118

119119

120120
### Settings
@@ -123,7 +123,7 @@ Here are the properties you can use when you create the groups, rules, and setti
123123

124124
| Property name | Description | Options |
125125
|:---|:---|:---|
126-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it will not apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
127127
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny` |
128128
| ux | You can set a hyperlink on notification. | `navigationTarget: string`. Example: `"http://www.microsoft.com"` |
129129

@@ -190,7 +190,7 @@ The following table lists the properties you can use in your entry:
190190
|:---|:---|:---|
191191
| `$type` | | Includes: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `PortableDevice`<br/>- `bluetoothDevice`<br/>- `generic` |
192192
| enforcement | | - `$type`:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny`<br/><br/>**When $type allow is selected, options value supports:** <br/>- `disable_audit_allow`<br/> Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event.<br/><br/>**When $type deny is selected, options value supports:** <br/>`disable_audit_deny`<br/>Even if **Block** happens and the **auditDeny** is setting configured, the system won't show notification or send event.<br/><br/>**When $type auditAllow is selected, options value supports:** <br/>`send_event`<br/><br/>**When $type auditDeny is selected, options value supports:** <br/>`send_event`<br/>`show_notification` |
193-
| `access`| |Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193+
| `access`| |Specify one or more access rights for this rule. These might include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
194194
| `id`| UUID| |
195195

196196
The following table lists the properties you can use in entry:
@@ -259,7 +259,7 @@ v2_full_disk_access : "approved"
259259
- `active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
260260
- [] - Device Control isn't configured on this machine.
261261
- ["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
262-
- ["v1","v2"] - You have both v1 and v2 enabled. Offboard from v1.
262+
- ["v1,""v2"] - You have both v1 and v2 enabled. Offboard from v1.
263263
- `v1_configured` - v1 configuration is applied
264264
- `v1_enforcement_level` - when v1 is enabled
265265
- `v2_configured` - v2 configuration is applied
@@ -473,7 +473,7 @@ In this case, only have one access rule policy, but if you have multiple, make s
473473
## Known Issues
474474

475475
> [!WARNING]
476-
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering and MIDI.
476+
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering, and MIDI.
477477
478478
> [!WARNING]
479479
> Device Control on macOS doesn't prevent software developed on XCode from being transferred to an external device.

defender-endpoint/mac-exclusions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Exclusions can be useful to avoid incorrect detections on files or software that
4141
To narrow down which process and/or path and/or extension you need to exclude, use [real-time-protection-statistics](mac-support-perf.md).
4242

4343
> [!WARNING]
44-
> Defining exclusions lowers the protection offered by Defender for Endpoint on Mac. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
44+
> Defining exclusions lowers the protection offered by Defender for Endpoint on Mac. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
4545
4646
## Supported exclusion types
4747

@@ -62,9 +62,9 @@ File, folder, and process exclusions support the following wildcards:
6262
|?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not `file123.log`|
6363

6464
> [!NOTE]
65-
> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
65+
> Using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
6666
>
67-
> The product attempts to resolve firmlinks when evaluating exclusions. Firmlink resolution does not work when the exclusion contains wildcards or the target file (on the `Data` volume) does not exist.
67+
> The product attempts to resolve firm links when evaluating exclusions. Firm link resolution doesn't work when the exclusion contains wildcards or the target file (on the `Data` volume) doesn't exist.
6868
6969
## Best practices for adding antimalware exclusions for Microsoft Defender for Endpoint on macOS.
7070

@@ -74,7 +74,7 @@ File, folder, and process exclusions support the following wildcards:
7474

7575
*except for apps that the ISV stated that there's no other tweaking that could be done to prevent the false positive or higher cpu utilization from occurring.
7676

77-
1. Avoid migrating non-Microsoft antimalware exclusions since they may no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
77+
1. Avoid migrating non-Microsoft antimalware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
7878

7979
1. Order of exclusions to consider top (more secure) to bottom (least secure):
8080

0 commit comments

Comments
 (0)