Skip to content

Commit 2915851

Browse files
committed
Update mac-device-control-overview.md
1 parent a030633 commit 2915851

File tree

1 file changed

+16
-14
lines changed

1 file changed

+16
-14
lines changed

defender-endpoint/mac-device-control-overview.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -48,16 +48,15 @@ Device control in Defender for Endpoint on macOS enables you to:
4848

4949
## Prepare your endpoints
5050

51-
- Microsoft Defender for Endpoint entitlement (can be trial)
52-
- Minimum OS version: macOS 11 or higher
5351
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
54-
- Enable Device Control on the MDE Preference setting:
5552

56-
- Data Loss Prevention (DLP)/Features/
53+
- Enable Device Control on your Defender for Endpoint preferences:
54+
55+
- Data Loss Prevention (DLP)/Features
5756

58-
- For **Feature Name**, enter "DC_in_dlp"
57+
- For **Feature Name**, type `DC_in_dlp`
5958

60-
- For **State**, enter "enabled"
59+
- For **State**, specify `enabled`
6160

6261
Example 1: JAMF using [schema.json](https://github.com/microsoft/mdatp-xplat/tree/master/macos/schema).
6362

@@ -82,18 +81,19 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
8281

8382

8483
- Minimum product version: 101.91.92 or higher
85-
- Run _mdatp version_ through Terminal to see the product version on your client machine:
84+
85+
- Run `mdatp version` through Terminal to see the product version on your client machine:
8686

8787
:::image type="content" source="media/macos-device-control-mdatp-version-terminal.png " alt-text="Screenshot that shows the results when you run mdatp version in Terminal to see the product version on a client machine." lightbox="media/macos-device-control-mdatp-version-terminal.png ":::
8888

8989
## Understanding policies
9090

9191
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
9292

93-
The Device Control for macOS policy includes settings, groups, and rules:
93+
The device control for macOS policy includes settings, groups, and rules:
9494

9595
- Global setting called 'settings' allows you to define the global environment.
96-
- Group called 'groups' allows you to create media groups. For example, authorized USB group or encrypted USB group.
96+
- Group called `groups` allows you to create media groups. For example, authorized USB group or encrypted USB group.
9797
- Access policy rule called 'rules' allows you to create policy to restrict each group. For example, only allow authorized user to Write access-authorized USB group.
9898

9999

@@ -110,9 +110,10 @@ The Device Control for macOS policy includes settings, groups, and rules:
110110

111111
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
112112

113-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
114-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` ,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
115-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
113+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example, a `portableDevice` policy can deny or allow `download_photos_from_device`.
114+
115+
- To stay consistent with Windows, there are `generic_read`,`generic_write` , and `generic_execute` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116+
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
116117

117118

118119
### Settings
@@ -121,7 +122,7 @@ Here are the properties you can use when you create the groups, rules, and setti
121122

122123
| Property name | Description | Options |
123124
|:---|:---|:---|
124-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
125+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it doesn't apply, even if you create a custom policy for `removableMedia`, because it's disabled by default. |
125126
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny` |
126127
| ux | You can set a hyperlink on notification. | `navigationTarget: string`. Example: `"http://www.microsoft.com"` |
127128

@@ -130,7 +131,7 @@ Here are the properties you can use when you create the groups, rules, and setti
130131
| Property name | Description | Options |
131132
|:---|:---|:---|
132133
| `$type` | The kind of group | "device" |
133-
| `id` | GUID, a unique ID, represents the group and will be used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS |
134+
| `id` | GUID, a unique ID, represents the group and is used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS |
134135
| `name` | Friendly name for the group. | string |
135136
| `query` | The media coverage under this group | See the **query** properties tables below for details. |
136137

@@ -484,4 +485,5 @@ In this case, only have one access rule policy, but if you have multiple, make s
484485
- [Deploy Device Control by using JAMF](mac-device-control-jamf.md)
485486
- [Deploy Device Control manually](mac-device-control-manual.md)
486487
- [macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)
488+
487489
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)