You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Notice that the "tamper_protection" is now set to "block".
178
+
Notice that the `tamper_protection` is now set to `block`.
179
179
180
180
### JAMF
181
181
@@ -412,15 +412,14 @@ For example, macOS MDM process can replace Microsoft's Defender's managed config
412
412
There are situations when a Global Administrator needs to restart Defender on all or some managed devices.
413
413
Typically it's done by creating and running a JAMF's policy that runs a script on remote devices (or similar operations for other MDM vendors.)
414
414
415
-
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
415
+
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection blocks the same script from restarting Microsoft Defender, if it's started from a Terminal locally.
416
416
417
417
However, those policy running processes are vendor specific.
418
418
While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
419
419
Instead, a Global Administrator can add their own exclusions to tamper protection.
420
420
Exclusions can be done only through MDM profile, not local configuration.
421
421
422
-
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
423
-
You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the "attack", and pick the process that looks like an MDM helper candidate.
422
+
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation. You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the attack, and pick the process that looks like an MDM helper candidate.
424
423
425
424
Once the process path is identified, you have few choices on how to configure an exclusion:
0 commit comments