Skip to content

Commit 5d90dae

Browse files
committed
Update tamperprotection-macos.md
1 parent 5d81188 commit 5d90dae

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -412,14 +412,14 @@ As an example, macOS can upgrade Defender's package, if tamper protection verifi
412412
There are other exclusions as well.
413413
For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
414414

415-
There are situations when a Global Administrator needs to restart Defender on all or some managed devices.
415+
There are situations when a Security Administrator needs to restart Defender on all or some managed devices.
416416
Typically it's done by creating and running a JAMF's policy that runs a script on remote devices (or similar operations for other MDM vendors.)
417417

418418
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection blocks the same script from restarting Microsoft Defender, if it's started from a Terminal locally.
419419

420420
However, those policy running processes are vendor specific.
421421
While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
422-
Instead, a Global Administrator can add their own exclusions to tamper protection.
422+
Instead, a Security Administrator can add their own exclusions to tamper protection.
423423
Exclusions can be done only through MDM profile, not local configuration.
424424

425425
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation. You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the attack, and pick the process that looks like an MDM helper candidate.

0 commit comments

Comments
 (0)