Skip to content

Commit 7611581

Browse files
committed
Merge branch 'main' into maccruz-datasecurity
2 parents 954f050 + e196331 commit 7611581

40 files changed

+347
-195
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -171,6 +170,31 @@
171170
"redirect_url": "/defender-xdr/",
172171
"redirect_document_id": false
173172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
174198
{
175199
"source_path": "defender-xdr/tickets.md",
176200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -181,10 +205,15 @@
181205
"redirect_url": "/defender-xdr/troubleshoot",
182206
"redirect_document_id": false
183207
},
208+
{
209+
"source_path": "defender-xdr/portals.md",
210+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
211+
"redirect_document_id": false
212+
},
184213
{
185214
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
186215
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
187216
"redirect_document_id": false
188217
}
189218
]
190-
}
219+
}

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: mac-troubleshoot-mode.md
235235
- name: Troubleshoot macOS installation issues
236236
href: mac-support-install.md
237+
- name: Troubleshoot macOS configuration
238+
href: mac-support-configuration.md
237239
- name: Troubleshoot macOS performance issues overview
238240
href: mac-support-perf-overview.md
239241
displayName: Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS

defender-endpoint/linux-installer-script.md

Lines changed: 34 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
5050

5151
4. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
5252

53-
:::image type="content" source="media/linux-script-image.png" alt-text="Screenshot showing the options to select to download the onboarding package." lightbox="media/linux-script-image.png":::
53+
:::image type="content" source="media/linux-script-image.png" alt-text="Screenshot showing the options to select to download the onboarding package." lightbox="media/linux-script-image.png":::
5454

5555
5. From a command prompt, extract the contents of the archive:
5656

@@ -77,19 +77,19 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
7777
chmod +x mde_installer.sh
7878
```
7979
80-
4. Execute the installer script and provide the onboarding package as a parameter to install the agent and onboard the device to the Defender portal.
80+
1. Execute the installer script and provide the onboarding package as a parameter to install the agent and onboard the device to the Defender portal.
8181
8282
```bash
83-
84-
sudo ./mde_installer.sh --install --onboard ~/MicrosoftDefenderATPOnboardingLinuxServer.py --channel prod --min_req -y
85-
83+
84+
sudo ./mde_installer.sh --install --onboard ./MicrosoftDefenderATPOnboardingLinuxServer.py --channel prod --min_req
85+
8686
```
87+
88+
This command deploys the latest agent version to the production channel, check for min system requisites and onboard the device to Defender Portal.
8789
88-
This command deploys the latest agent version to the production channel, check for min system requisites and onboard the device to Defender Portal.
89-
90-
Additionally you can pass more parameter based on your requirements to modify the installation. Check help for all the available options:
90+
Additionally you can pass more parameter based on your requirements to modify the installation. Check help for all the available options:
9191
92-
```bash
92+
```bash
9393
9494
❯ ./mde_installer.sh --help
9595
mde_installer.sh v0.7.0
@@ -108,7 +108,7 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
108108
-m|--min_req enforce minimum requirements
109109
-x|--skip_conflict skip conflicting application verification
110110
-w|--clean remove repo from package manager for a specific channel
111-
-y|--yes assume yes for all mid-process prompts (default, depracated)
111+
-y|--yes assume yes for all mid-process prompts (default, deprecated)
112112
-n|--no remove assume yes sign
113113
-s|--verbose verbose output
114114
-v|--version print out script version
@@ -124,19 +124,19 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
124124
125125
| Scenario | Command |
126126
|---|---|
127-
| Install a specific agent version | `sudo ~/mde_installer.sh --install --channel prod --onboard ~/MicrosoftDefenderATPOnboardingLinuxServer.py --min_req -y –-mdatp 101.24082.0004 ` |
128-
| To upgrade to the latest version | `sudo ~/mde_installer.sh --upgrade -y` |
129-
| For upgrading to a specific version | `sudo ~/mde_installer.sh --upgrade -y –-mdatp 101.24082.0004` |
130-
| To downgrade to a specific version | `sudo ~/mde_installer.sh --downgrade -y –-mdatp 101.24082.0004` |
131-
| To remove `mdatp` | `sudo ~/mde_installer.sh --remove -y` |
132-
133-
134-
> [!NOTE]
135-
> Upgrading your operating system to a new major version after the product installation requires the product to be reinstalled. You need to uninstall the existing Defender for Endpoint on Linux, upgrade the operating system, and then reconfigure Defender for Endpoint on Linux.
127+
|Install a specific agent version | `sudo ./mde_installer.sh --install --channel prod --onboard ./MicrosoftDefenderATPOnboardingLinuxServer.py --min_req –-mdatp 101.24082.0004 ` |
128+
|Upgrade to the latest agent version | `sudo ./mde_installer.sh --upgrade` |
129+
|Upgrade to a specific agent version | `sudo ./mde_installer.sh --upgrade –-mdatp 101.24082.0004` |
130+
|Downgrade to a specific agent version | `sudo ./mde_installer.sh --downgrade –-mdatp 101.24082.0004` |
131+
|Uninstall agent | `sudo ./mde_installer.sh --remove` |
132+
133+
134+
> [!NOTE]
135+
> Upgrading your operating system to a new major version after the product installation requires the product to be reinstalled. You need to uninstall the existing Defender for Endpoint on Linux, upgrade the operating system, and then reconfigure Defender for Endpoint on Linux.
136136
137137
## Verify deployment status
138138
139-
1. In the [Microsoft Defender portal](https://security.microsoft.com), open the device inventory. It might take 5-20 mins for the device to show up in the portal.
139+
1. In the [Microsoft Defender portal](https://security.microsoft.com), open the device inventory. It might take 5-20 minutes for the device to show up in the portal.
140140
141141
2. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
142142
@@ -170,14 +170,22 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
170170
mdatp threat list
171171
```
172172

173-
3. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
173+
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
174174

175-
1. Verify that the onboarded Linux server appears in the Microsoft Defender portal. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
176-
177-
2. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, and run the following command:
178-
179-
`./mde_linux_edr_diy.sh`
175+
1. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server.
176+
177+
1. Grant executable permissions to the script:
180178

179+
```bash
180+
chmod +x mde_linux_edr_diy.sh
181+
```
182+
183+
1. Run the following command:
184+
185+
```bash
186+
./mde_linux_edr_diy.sh
187+
```
188+
181189
3. After a few minutes, a detection should be raised in the Microsoft Defender XDR.
182190

183191
4. Check the alert details, machine timeline, and perform your typical investigation steps.
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Troubleshoot configuration issues for Microsoft Defender for Endpoint on Mac
3+
description: Troubleshoot configuration issues in Microsoft Defender for Endpoint on Mac.
4+
ms.service: defender-endpoint
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
8+
manager: deniseb
9+
ms.localizationpriority: medium
10+
audience: ITPro
11+
ms.collection:
12+
- m365-security
13+
- tier3
14+
- mde-macos
15+
ms.topic: conceptual
16+
ms.subservice: macos
17+
search.appverid: met150
18+
ms.date: 04/30/2024
19+
---
20+
21+
# Troubleshoot configuration issues for Microsoft Defender for Endpoint on macOS
22+
23+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
24+
25+
26+
**Applies to:**
27+
28+
- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)
29+
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
30+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
31+
- [Microsoft Defender XDR](/defender-xdr)
32+
33+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
34+
35+
## Configuration isn't applied as expected
36+
37+
You configured Microsoft Defender with settings that you need, and you don't see some (or all) of them applied.
38+
How to troubleshoot it?
39+
40+
### Sources of configuration
41+
42+
Microsoft Defender collects configuration from multiple sources.
43+
44+
In almost all cases you can change configuration dynamically, and it will be applied immediately, with no restart required.
45+
46+
Different sources have different priorities.
47+
When the same setting comes from more than one source, Microsoft Defender will merge values from different sources.
48+
In most cases it means that the value with the higher priority prevails, and sources from lower priorities are ignored. In some cases (for example, [Antivirus Exclusions](mac-preferences.md#exclusion-merge-policy)). Refer to configuration documentation for details.
49+
50+
Configuration sources in the order of priority ("1" is the highest priority):
51+
52+
1) MDE Attach, Defender configured in Intune portal
53+
2) [MDM configuration profile](mac-jamfpro-policies.md), configured using your MDM software
54+
3) [Local configuration](mac-resources.md#supported-output-types), that you made using `mdatp config ...` command as local administrator, or through Microsoft Defender's application
55+
4) Default setting that is used when you provided no explicit setting
56+
57+
### MDE Attach and MDM Configuration profile
58+
59+
> [!CAUTION]
60+
> MDE Attach and MDM Configuration Profile are mutually excluded. If you provide *some* configuration for both, then only MDE Attach settings are used, and *all* MDM settings are ignored! Don't use them together.
61+
62+
Use `mdatp health --field managed_by` to find out if you use MDE Attach.
63+
64+
1) "MDE" indicates MDE Attach. Any configuration specified with an MDM configuration profile is ignored.
65+
2) "MEM" indicates MDM Configuration Profile, or only local configuration
66+
67+
You can run `mdatp health` to get the configuration that Microsoft Defender is currently used. If you see "[managed]" next to a value, then it's currently configured through an MDM Configuration Profile. If there's no "[managed]", then it's configured locally or via MDE Attach.
68+
69+
### MDE Attach and MDM configurations troubleshooting
70+
71+
Check the following files:
72+
73+
1) `/Library/Preferences/com.microsoft.mdeattach.plist` - Microsoft Defender reads this file for settings delivered by MDE Attach. If you expect some setting and you don't see it configured, then check that it's there
74+
2) `/Library/Managed Preferences/com.microsoft.wdav.plist` and `/Library/Managed Preferences/com.microsoft.wdav.ext.plist` - Microsoft Defender reads these files for settings delivered by MDM.
75+
76+
The file paths and names must be exactly like described! If you see a similar but a bit different file path, then it means that Microsoft Defender ignores it.
77+
78+
If you expect some MDM settings and don't see those files, it means that MDM has not delivered configuration profiles to your machine at all.
79+
To troubleshoot profiles delivery, consult your MDM software (JAMF, Intune, etc.) resources.
80+
81+
If you expect some settings and you see those files, then check their content:
82+
83+
```
84+
> plutil -p '/Library/Managed Preferences/com.microsoft.wdav.plist
85+
{
86+
"antivirusEngine" => {
87+
"enforcementLevel" => "real_time"
88+
}
89+
}
90+
```
91+
92+
Those settings must match those settings that you configured.
93+
Their names, level of indirection, type must be exactly as [documented](mac-preferences.md).
94+
95+
For example, if `plist` tells you that "antivirusEngine" is inside a different group, then you can be confident that Microsoft Defender *ignores* "enforcementLevel" setting altogether:
96+
```
97+
# Bad configuration!
98+
> plutil -p '/Library/Managed Preferences/com.microsoft.wdav.plist
99+
{
100+
"Forced" => {
101+
"mcx_preference_settings" => {
102+
"antivirusEngine" => {
103+
"enforcementLevel" => "real_time"
104+
}
105+
}
106+
}
107+
}
108+
```
109+
110+
### MDM Configuration - where does it come from?
111+
112+
macOS updates /Library/Managed Preferences/ files based on Profiles deployed over MDM.
113+
114+
If you don't see an expected managed preferences file, or its content is different from what you expect, then open  => System Settings => Profiles.
115+
116+
You can see all profiles deployed over MDM under "Device (Managed)." Find a profile that you configured in MDM for Microsoft Defender configuration.
117+
You can open it and inspect its content. It must match what is in /Library/Managed Preferences/com.microsoft.wdav.plist and what you configured in MDM.
118+
119+
If you don't see any managed profile for com.microsoft.wdav, then MDM didn't deliver it. Consult your MDM software documentation for troubleshooting, there can be multiple reasons why it happened, troubleshooting of MDM is out of scope for Microsoft Defender documentation.
120+
121+
If you see *more than one* configuration profile for the same com.microsoft.wdav, then it can be the reason of not expected configuration of Microsoft Defender.
122+
macOS performs some merging of those profiles into a single .plist, but it can properly merge only the top level of configuration.
123+
I.e., you can't spread different "antivirusEngine" settings across two com.microsoft.wdav configuration profiles, MDM uses only one of them randomly, and ignore the rest. You can use extra com.microsoft.wdav.ext profile if you need to put settings to two profiles (again, there must be at most one configuration profile with com.microsoft.wdav.ext as well).
124+
125+
In other words, avoid having more than one configuration profile for the same identifier.
126+
127+
### MDE Attach Configuration - where does it come from?
128+
129+
It isn't delivered over MDM. Consult MDE Attach documentation for how to troubleshoot it.

0 commit comments

Comments
 (0)