Skip to content

Commit 2aa69be

Browse files
committed
Update mac-install-with-intune.md
1 parent 6575754 commit 2aa69be

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/20/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -100,7 +100,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
100100

101101
Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
102102

103-
To configure network filter:
103+
To configure your network filter:
104104

105105
1. Under **Configuration profiles**, select **Create Profile**.
106106

@@ -160,7 +160,7 @@ To configure Full Disk Access:
160160
1. Review the configuration profile. Select **Create**.
161161

162162
> [!NOTE]
163-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
163+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
164164
165165
### Step 4: Background services
166166

@@ -267,8 +267,8 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
267267

268268
### Step 7: Bluetooth permissions
269269

270-
> [!CAUTION]
271-
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
270+
> [!CAUTION]
271+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
272272
273273
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings above to enable Bluetooth access.
274274

@@ -288,7 +288,7 @@ For more information, see [Deploy updates for Microsoft Defender for Endpoint on
288288
Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/settings/microsoft_auto_update).
289289

290290
> [!NOTE]
291-
> The sample AutoUpdate2.mobileconfig from the GitHub repository has it set to Current Channel (Production).
291+
> The sample `AutoUpdate2.mobileconfig` from the GitHub repository has it set to Current Channel (Production).
292292
293293
1. Under **Configuration profiles**, select **Create Profile**.
294294

@@ -320,6 +320,7 @@ In this step, we go over *Preferences* that enables you to configure anti-malwar
320320

321321
> [!NOTE]
322322
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
323+
323324
> [!IMPORTANT]
324325
> Important
325326
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
@@ -355,9 +356,8 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
355356

356357
1. Review the policy in **Review+Create** and select **Save**.
357358

358-
359359
> [!TIP]
360-
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the .mobileconig from step 8.
360+
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the `.mobileconfig` from step 8.
361361
362362
### Step 11: Device Control for Microsoft Defender for Endpoint on macOS
363363

0 commit comments

Comments
 (0)