You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,16 +48,15 @@ Device control in Defender for Endpoint on macOS enables you to:
48
48
49
49
## Prepare your endpoints
50
50
51
-
- Microsoft Defender for Endpoint entitlement (can be trial)
52
-
- Minimum OS version: macOS 11 or higher
53
51
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
54
-
- Enable Device Control on the MDE Preference setting:
55
52
56
-
- Data Loss Prevention (DLP)/Features/
53
+
- Enable Device Control on your Defender for Endpoint preferences:
54
+
55
+
- Data Loss Prevention (DLP)/Features
57
56
58
-
- For **Feature Name**, enter "DC_in_dlp"
57
+
- For **Feature Name**, type `DC_in_dlp`
59
58
60
-
- For **State**, enter "enabled"
59
+
- For **State**, specify `enabled`
61
60
62
61
Example 1: JAMF using [schema.json](https://github.com/microsoft/mdatp-xplat/tree/master/macos/schema).
63
62
@@ -82,18 +81,19 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
82
81
83
82
84
83
- Minimum product version: 101.91.92 or higher
85
-
- Run _mdatp version_ through Terminal to see the product version on your client machine:
84
+
85
+
- Run `mdatp version` through Terminal to see the product version on your client machine:
86
86
87
87
:::image type="content" source="media/macos-device-control-mdatp-version-terminal.png " alt-text="Screenshot that shows the results when you run mdatp version in Terminal to see the product version on a client machine." lightbox="media/macos-device-control-mdatp-version-terminal.png ":::
88
88
89
89
## Understanding policies
90
90
91
91
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
92
92
93
-
The Device Control for macOS policy includes settings, groups, and rules:
93
+
The device control for macOS policy includes settings, groups, and rules:
94
94
95
95
- Global setting called 'settings' allows you to define the global environment.
96
-
- Group called 'groups' allows you to create media groups. For example, authorized USB group or encrypted USB group.
96
+
- Group called `groups` allows you to create media groups. For example, authorized USB group or encrypted USB group.
97
97
- Access policy rule called 'rules' allows you to create policy to restrict each group. For example, only allow authorized user to Write access-authorized USB group.
98
98
99
99
@@ -110,9 +110,10 @@ The Device Control for macOS policy includes settings, groups, and rules:
110
110
111
111
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
112
112
113
-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
114
-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` ,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
115
-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
113
+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example, a `portableDevice` policy can deny or allow `download_photos_from_device`.
114
+
115
+
- To stay consistent with Windows, there are `generic_read`,`generic_write` , and `generic_execute` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116
+
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
116
117
117
118
118
119
### Settings
@@ -121,7 +122,7 @@ Here are the properties you can use when you create the groups, rules, and setti
121
122
122
123
| Property name | Description | Options |
123
124
|:---|:---|:---|
124
-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
125
+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it doesn't apply, even if you create a custom policy for `removableMedia`, because it's disabled by default. |
125
126
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny`|
126
127
| ux | You can set a hyperlink on notification. |`navigationTarget: string`. Example: `"http://www.microsoft.com"`|
127
128
@@ -130,7 +131,7 @@ Here are the properties you can use when you create the groups, rules, and setti
130
131
| Property name | Description | Options |
131
132
|:---|:---|:---|
132
133
|`$type`| The kind of group | "device" |
133
-
|`id`| GUID, a unique ID, represents the group and will be used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS |
134
+
|`id`| GUID, a unique ID, represents the group and is used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS |
134
135
|`name`| Friendly name for the group. | string |
135
136
|`query`| The media coverage under this group | See the **query** properties tables below for details. |
136
137
@@ -484,4 +485,5 @@ In this case, only have one access rule policy, but if you have multiple, make s
484
485
-[Deploy Device Control by using JAMF](mac-device-control-jamf.md)
485
486
-[Deploy Device Control manually](mac-device-control-manual.md)
486
487
-[macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)
488
+
487
489
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments