Skip to content

Commit 6a3f9a5

Browse files
authored
Merge pull request #1070 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 966b9e4 + 833f078 commit 6a3f9a5

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 01/29/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Protect macOS security settings with tamper protection
@@ -298,7 +298,7 @@ Tampering alert is raised in the Microsoft Defender portal
298298
- Try to stop the Defender for Endpoint process (kill).
299299
- Try to delete, rename, modify, move Defender for Endpoint files (similar to what a malicious user would do), for example:
300300

301-
- /Applications/Microsoft Defender ATP.app/
301+
- /Applications/Microsoft Defender.app/
302302
- /Library/LaunchDaemons/com.microsoft.fresno.plist
303303
- /Library/LaunchDaemons/com.microsoft.fresno.uninstall.plist
304304
- /Library/LaunchAgents/com.microsoft.wdav.tray.plist

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/05/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -69,7 +69,7 @@ This article provides instructions on how to run the tool via Live Response on W
6969
```console
7070
PutFile MDEClientAnalyzerPreview.zip -overwrite
7171
Run MDELiveAnalyzer.ps1
72-
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult.zip"
72+
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
7373
```
7474

7575
- For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or doesn't appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).

0 commit comments

Comments
 (0)