Skip to content

Commit 6bb2ddf

Browse files
committed
Update tamperprotection-macos.md
1 parent fa308d8 commit 6bb2ddf

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ data_loss_prevention_status : "disabled"
175175
full_disk_access_enabled : true
176176
```
177177

178-
Notice that the "tamper_protection" is now set to "block".
178+
Notice that the `tamper_protection` is now set to `block`.
179179

180180
### JAMF
181181

@@ -412,15 +412,14 @@ For example, macOS MDM process can replace Microsoft's Defender's managed config
412412
There are situations when a Global Administrator needs to restart Defender on all or some managed devices.
413413
Typically it's done by creating and running a JAMF's policy that runs a script on remote devices (or similar operations for other MDM vendors.)
414414

415-
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
415+
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection blocks the same script from restarting Microsoft Defender, if it's started from a Terminal locally.
416416

417417
However, those policy running processes are vendor specific.
418418
While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
419419
Instead, a Global Administrator can add their own exclusions to tamper protection.
420420
Exclusions can be done only through MDM profile, not local configuration.
421421

422-
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
423-
You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the "attack", and pick the process that looks like an MDM helper candidate.
422+
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation. You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the attack, and pick the process that looks like an MDM helper candidate.
424423

425424
Once the process path is identified, you have few choices on how to configure an exclusion:
426425

0 commit comments

Comments
 (0)