You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-install-with-intune.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/20/2024
17
+
ms.date: 08/01/2024
18
18
---
19
19
20
20
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -100,7 +100,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
100
100
101
101
Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
102
102
103
-
To configure network filter:
103
+
To configure your network filter:
104
104
105
105
1. Under **Configuration profiles**, select **Create Profile**.
106
106
@@ -160,7 +160,7 @@ To configure Full Disk Access:
160
160
1. Review the configuration profile. Select **Create**.
161
161
162
162
> [!NOTE]
163
-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
163
+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
270
+
> [!CAUTION]
271
+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
272
272
273
273
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings above to enable Bluetooth access.
274
274
@@ -288,7 +288,7 @@ For more information, see [Deploy updates for Microsoft Defender for Endpoint on
288
288
Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/settings/microsoft_auto_update).
289
289
290
290
> [!NOTE]
291
-
> The sample AutoUpdate2.mobileconfig from the GitHub repository has it set to Current Channel (Production).
291
+
> The sample `AutoUpdate2.mobileconfig` from the GitHub repository has it set to Current Channel (Production).
292
292
293
293
1. Under **Configuration profiles**, select **Create Profile**.
294
294
@@ -320,6 +320,7 @@ In this step, we go over *Preferences* that enables you to configure anti-malwar
320
320
321
321
> [!NOTE]
322
322
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
323
+
323
324
> [!IMPORTANT]
324
325
> Important
325
326
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
@@ -355,9 +356,8 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
355
356
356
357
1. Review the policy in **Review+Create** and select **Save**.
357
358
358
-
359
359
> [!TIP]
360
-
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the .mobileconig from step 8.
360
+
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the `.mobileconfig` from step 8.
361
361
362
362
### Step 11: Device Control for Microsoft Defender for Endpoint on macOS
0 commit comments