Skip to content

Commit 2d11b7d

Browse files
Update mac-jamfpro-policies.md
Changed from JamF to Jamf
1 parent a2ea9c2 commit 2d11b7d

File tree

1 file changed

+29
-29
lines changed

1 file changed

+29
-29
lines changed

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ search.appverid: met150
1717
ms.date: 08/26/2024
1818
---
1919

20-
# Set up the Microsoft Defender for Endpoint on macOS policies in JamF Pro
20+
# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
2121

2222
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2323

@@ -44,15 +44,15 @@ Use this article to set up policies for Defender for Endpoint on Mac using Jamf
4444

4545
4. Extract `WindowsDefenderATPOnboardingPackage.zip`.
4646

47-
1. Copy the file to your preferred location. For example, `C:\Users\JaneDoe_or_JohnDoe.contoso\Downloads\WindowsDefenderATPOnboardingPackage_macOS_MDM_contoso\JamF\WindowsDefenderATPOnboarding.plist`.
47+
1. Copy the file to your preferred location. For example, `C:\Users\JaneDoe_or_JohnDoe.contoso\Downloads\WindowsDefenderATPOnboardingPackage_macOS_MDM_contoso\Jamf\WindowsDefenderATPOnboarding.plist`.
4848

49-
## Step 2: Create a configuration profile in JamF Pro using the onboarding package
49+
## Step 2: Create a configuration profile in Jamf Pro using the onboarding package
5050

5151
1. Locate the file `WindowsDefenderATPOnboarding.plist` from the previous section.
5252

5353
:::image type="content" source="media/plist-onboarding-file.png" alt-text="The Windows Defender ATP Onboarding file." lightbox="media/plist-onboarding-file.png":::
5454

55-
1. Sign in to JamF Pro, navigate to **Computers** > **Configuration Profiles**, and select **New**.
55+
1. Sign in to Jamf Pro, navigate to **Computers** > **Configuration Profiles**, and select **New**.
5656

5757
:::image type="content" source="media/jamf-pro-configure-profile.png" alt-text="The page on which you create a new Jamf Pro dashboard." lightbox="media/jamf-pro-configure-profile.png":::
5858

@@ -106,10 +106,10 @@ Use this article to set up policies for Defender for Endpoint on Mac using Jamf
106106

107107
## Step 3: Configure Microsoft Defender for Endpoint settings
108108

109-
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) or JamF.
109+
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) or Jamf.
110110

111111
> [!IMPORTANT]
112-
> Microsoft Defender for Endpoint Security Settings Management policies take precedence over JamF set (and other 3rd party MDM) policies.
112+
> Microsoft Defender for Endpoint Security Settings Management policies take precedence over Jamf set (and other 3rd party MDM) policies.
113113
114114
### 3a. Set policies using Microsoft Defender portal
115115

@@ -131,9 +131,9 @@ For more information about managing security settings, see the following article
131131

132132
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
133133

134-
### 3b. Set policies using JamF
134+
### 3b. Set policies using Jamf
135135

136-
You can either use JamF Pro GUI to edit individual settings of the Microsoft Defender for Endpoint configuration, or use the legacy method by creating a configuration Plist in a text editor, and uploading it to JamF Pro.
136+
You can either use Jamf Pro GUI to edit individual settings of the Microsoft Defender for Endpoint configuration, or use the legacy method by creating a configuration Plist in a text editor, and uploading it to Jamf Pro.
137137

138138
Note that you must use exact `com.microsoft.wdav` as the **Preference Domain**; Microsoft Defender for Endpoint uses only this name and `com.microsoft.wdav.ext` to load its managed settings.
139139

@@ -219,7 +219,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
219219
- `tags`
220220
- `hideStatusMenuIcon`
221221
222-
For information, see [Property list for JamF full configuration profile](mac-preferences.md#property-list-for-jamf-full-configuration-profile).
222+
For information, see [Property list for Jamf full configuration profile](mac-preferences.md#property-list-for-jamf-full-configuration-profile).
223223
224224
```XML
225225
<?xml version="1.0" encoding="UTF-8"?>
@@ -324,7 +324,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
324324
325325
2. Save the file as `MDATP_MDAV_configuration_settings.plist`.
326326
327-
1. In the JamF Pro dashboard, open **Computers**, and their **Configuration Profiles**. Select **New** and switch to the **General** tab.
327+
1. In the Jamf Pro dashboard, open **Computers**, and their **Configuration Profiles**. Select **New** and switch to the **General** tab.
328328
329329
:::image type="content" source="media/644e0f3af40c29e80ca1443535b2fe32.png" alt-text="The page displaying a new profile." lightbox="media/644e0f3af40c29e80ca1443535b2fe32.png":::
330330
@@ -398,8 +398,8 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
398398
## Step 4: Configure notifications settings
399399
400400
> [!NOTE]
401-
> These steps are applicable on macOS 11 (Big Sur) or later. Even though JamF supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
402-
1. In the JamF Pro dashboard, select **Computers**, then **Configuration Profiles**.
401+
> These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
402+
1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
403403
404404
2. Select **New**, and then, on the **General** tab, for **Options**, specify the following details:
405405
@@ -471,7 +471,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
471471

472472
2. Save it as `MDATP_MDAV_MAU_settings.plist`.
473473

474-
1. In the JamF Pro dashboard, select **General**.
474+
1. In the Jamf Pro dashboard, select **General**.
475475

476476
:::image type="content" source="media/eaba2a23dd34f73bf59e826217ba6f15.png" alt-text="The configuration settings." lightbox="media/eaba2a23dd34f73bf59e826217ba6f15.png":::
477477

@@ -528,7 +528,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
528528

529529
## Step 6: Grant full disk access to Microsoft Defender for Endpoint
530530

531-
1. In the JamF Pro dashboard, select **Configuration Profiles**.
531+
1. In the Jamf Pro dashboard, select **Configuration Profiles**.
532532

533533
:::image type="content" source="media/264493cd01e62c7085659d6fdc26dc91.png" alt-text="The profile for which settings are to be configured." lightbox="media/264493cd01e62c7085659d6fdc26dc91.png":::
534534

@@ -611,7 +611,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
611611

612612
:::image type="content" source="media/6c8b406ee224335a8c65d06953dc756e.png" alt-text="The configuration setting illustration." lightbox="media/6c8b406ee224335a8c65d06953dc756e.png":::
613613

614-
Alternatively, you can download [fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) and upload it to JamF Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to JamF Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
614+
Alternatively, you can download [fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) and upload it to Jamf Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
615615

616616
> [!NOTE]
617617
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
@@ -672,8 +672,8 @@ Alternatively, you can download [fulldisk.mobileconfig](https://github.com/micro
672672
As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal.
673673

674674
> [!NOTE]
675-
> These steps are applicable on macOS 11 (Big Sur) or later. Even though JamF supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
676-
1. In the JamF Pro dashboard, select **Computers**, then **Configuration Profiles**.
675+
> These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
676+
1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
677677

678678
2. Select **New**, and enter the following details for **Options**:
679679

@@ -717,16 +717,16 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
717717

718718
:::image type="content" source="media/netext-final.png" alt-text="The configuration settings netext - final." lightbox="media/netext-final.png":::
719719

720-
Alternatively, you can download [netfilter.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/netfilter.mobileconfig) and upload it to JamF Configuration Profiles as described in [Deploying Custom Configuration Profiles using JamF Pro|](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro)
720+
Alternatively, you can download [netfilter.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/netfilter.mobileconfig) and upload it to Jamf Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro)
721721

722722
## Step 9: Configure Background Services
723723

724724
> [!CAUTION]
725725
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
726-
> > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through JamF, we recommend you update the deployment with this configuration profile.
726+
> > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Jamf, we recommend you update the deployment with this configuration profile.
727727
Download [**background_services.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [our GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
728728

729-
Upload downloaded mobileconfig to JamF Configuration Profiles as described in [Deploying Custom Configuration Profiles using JamF Pro|Method 2: Upload a Configuration Profile to JamF Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
729+
Upload downloaded mobileconfig to Jamf Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
730730

731731
## Step 10: Grant Bluetooth Permissions
732732

@@ -736,8 +736,8 @@ Upload downloaded mobileconfig to JamF Configuration Profiles as described in [D
736736
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
737737

738738
> [!WARNING]
739-
> Current version of JamF Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, JamF Pro will remove unsupported payload,
740-
> and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that JamF Pro will consider it "sealed" and will not
739+
> Current version of Jamf Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro will remove unsupported payload,
740+
> and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro will consider it "sealed" and will not
741741
> tamper with it. See instructions below:
742742
- You need to have at least one signing certificate installed into your KeyChain, even a self-signed certificate works. You can inspect what you have with:
743743

@@ -757,7 +757,7 @@ Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/
757757
/usr/bin/security cms -S -N "DevCert" -i bluetooth.mobileconfig -o bluetooth-signed.mobileconfig
758758
```
759759

760-
- Now you can upload the generated bluetooth-signed.mobileconfig to JamF Pro as described in [Deploying Custom Configuration Profiles using JamF Pro|Method 2: Upload a Configuration Profile to JamF Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
760+
- Now you can upload the generated bluetooth-signed.mobileconfig to Jamf Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
761761

762762
> [!NOTE]
763763
> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
@@ -781,9 +781,9 @@ Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint
781781

782782
:::image type="content" source="media/fb2220fed3a530f4b3ef36f600da0c27.png" alt-text="The file explorer1 wdavmdm package." lightbox="media/fb2220fed3a530f4b3ef36f600da0c27.png":::
783783

784-
1. Open the JamF Pro dashboard.
784+
1. Open the Jamf Pro dashboard.
785785

786-
:::image type="content" source="media/990742cd9a15ca9fdd37c9f695d1b9f4.png" alt-text="The configuration settings for jamfpro." lightbox="media/990742cd9a15ca9fdd37c9f695d1b9f4.png":::
786+
:::image type="content" source="media/990742cd9a15ca9fdd37c9f695d1b9f4.png" alt-text="The configuration settings for Jamf pro." lightbox="media/990742cd9a15ca9fdd37c9f695d1b9f4.png":::
787787

788788
4. Select your computer and select the gear icon at the top, and then select **Computer Management**.
789789

@@ -813,7 +813,7 @@ Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint
813813
814814
:::image type="content" source="media/56dac54634d13b2d3948ab50e8d3ef21.png" alt-text="The limitation tab for the configuration settings." lightbox="media/56dac54634d13b2d3948ab50e8d3ef21.png":::
815815
816-
1. Select **Save**. The package is uploaded to JamF Pro.
816+
1. Select **Save**. The package is uploaded to Jamf Pro.
817817
818818
:::image type="content" source="media/33f1ecdc7d4872555418bbc3efe4b7a3.png" alt-text="The configuration settings pack uploading process for the package related to the configuration settings." lightbox="media/33f1ecdc7d4872555418bbc3efe4b7a3.png":::
819819
@@ -855,7 +855,7 @@ Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint
855855
856856
For a better user experience, configuration profiles to enrolled machines must be installed before Microsoft Defender's package. In most cases JamF Pro pushes configuration profiles immediately, and those policies are executed after some time (that is, during check-in). However, in some cases, configuration profiles deployment can be deployed with a significant delay (that is, if a user's machine is locked).
857857
858-
JamF Pro provides a way to ensure the correct order. You can create a smart group for machines that already received Microsoft Defender's configuration profile, and install Microsoft Defender's package only to those machines (and as soon as they receive this profile).
858+
Jamf Pro provides a way to ensure the correct order. You can create a smart group for machines that already received Microsoft Defender's configuration profile, and install Microsoft Defender's package only to those machines (and as soon as they receive this profile).
859859
860860
Follow these steps:
861861
@@ -901,10 +901,10 @@ Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint
901901
902902
## Configuration profile scope
903903
904-
JamF requires you to define a set of machines for a configuration profile. You need to make sure that all machines receiving Defender's package, also receive *all* configuration profiles listed above.
904+
Jamf requires you to define a set of machines for a configuration profile. You need to make sure that all machines receiving Defender's package, also receive *all* configuration profiles listed above.
905905

906906
> [!WARNING]
907-
> JAMF supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically.
907+
> Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically.
908908
> It is a powerful concept that is widely used for configuration profiles distribution.
909909
>
910910
> However, keep in mind that these criteria should not include presence of Defender on a machine.

0 commit comments

Comments
 (0)