Skip to content

Commit 77a2f20

Browse files
authored
Merge pull request #2163 from MicrosoftDocs/main
Pushing doc updates live -- Mac
2 parents 079d6a4 + 72b3643 commit 77a2f20

File tree

4 files changed

+89
-24
lines changed

4 files changed

+89
-24
lines changed

defender-endpoint/behavior-monitor-macos.md

Lines changed: 79 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Behavior Monitoring in Microsoft Defender Antivirus on macOS
33
description: Behavior Monitoring in Microsoft Defender Antivirus on macOS
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
9-
ms.date: 05/29/2024
9+
ms.date: 12/11/2024
1010
ms.subservice: ngp
1111
audience: ITPro
1212
ms.collection:
@@ -35,26 +35,26 @@ f1.keywords: NOCSH
3535
> [!IMPORTANT]
3636
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3737
38-
## Prerequisites
38+
## Overview of behavior monitoring
3939

40-
- Device is onboarded to Microsoft Defender for Endpoint.
41-
- [Preview features](/defender-endpoint/preview) is enabled in the Microsoft XDR portal ([https://security.microsoft.com](https://security.microsoft.com)).
42-
- Device must be in the [Beta channel](/defender-endpoint/mac-updates) (formerly InsiderFast).
43-
- Minimal Microsoft Defender for Endpoint version number must be Beta (Insiders-Fast): 101.24042.0002 or newer. Version number refers to the **app_version** (also known as **Platform update**).
44-
- Ensure that Real-Time Protection (RTP) is enabled.
45-
- Ensure [cloud-delivered protection](/defender-endpoint/mac-preferences) is enabled.
46-
- Device must be explicitly enrolled into the preview.
40+
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them.
4741

48-
## Overview
42+
## Prerequisites
4943

50-
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them.
44+
- The device must be onboarded to Microsoft Defender for Endpoint.
45+
- [Preview features](/defender-endpoint/preview) must be enabled in the [Microsoft Defender portal](https://security.microsoft.com).
46+
- The device must be in the [Beta channel](/defender-endpoint/mac-updates) (formerly `InsiderFast`).
47+
- The minimum Microsoft Defender for Endpoint version number must be Beta (Insiders-Fast): [101.24042.0002](/defender-endpoint/mac-whatsnew#may-2024-build-101240420008---release-version-2012404280) or newer. The version number refers to the `app_version` (also known as **Platform update**).
48+
- Real-time protection (RTP) must be enabled.
49+
- [Cloud-delivered protection](/defender-endpoint/mac-preferences) must be enabled.
50+
- The device must be explicitly enrolled in the preview program.
5151

52-
## Deployment instructions
52+
## Deployment instructions for behavior monitoring
5353

5454
To deploy behavior monitoring in Microsoft Defender for Endpoint on macOS, you must change the behavior monitoring policy using one of the following methods:
5555

5656
- [Intune](#intune-deployment)
57-
- [JamF or other 3<sup>rd</sup> party MDM](#via-jamf-deployment)
57+
- [JamF or other non-Microsoft MDM](#jamf-deployment)
5858
- [Manually](#manual-deployment)
5959

6060
The following sections describe each of these methods in detail.
@@ -148,7 +148,7 @@ The following sections describe each of these methods in detail.
148148

149149
8. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices or to a Device Group or User Group.**
150150

151-
#### Via JamF deployment
151+
#### JamF deployment
152152

153153
1. Copy the following XML to create a _.plist_ file and save it as **Save as BehaviorMonitoring_for_MDE_on_macOS.plist**
154154

@@ -209,19 +209,78 @@ For more information, see: [Resources for Microsoft Defender for Endpoint on mac
209209

210210
See [Behavior Monitoring demonstration](demonstration-behavior-monitoring.md).
211211

212-
### Verifying Behavior Monitoring detection
212+
### Verifying behavior monitoring detections
213213

214214
The existing Microsoft Defender for Endpoint on macOS command line interface can be used to review behavior monitoring details and artifacts.
215215

216216
```bash
217+
217218
sudo mdatp threat list
219+
218220
```
219221

220222
### Frequently Asked Questions (FAQ)
221223

222224
#### What if I see an increase in cpu utilization or memory utilization?
223225

224-
Disable Behavior Monitoring and see if the issue goes away.
226+
Disable behavior monitoring and see if the issue goes away.
227+
228+
- If the issue doesn't go away, it isn't related to behavior monitoring.
229+
- If the issue goes away, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
230+
231+
## Network real-time inspection for macOS
232+
233+
> [!IMPORTANT]
234+
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
235+
236+
The network real-time inspection (NRI) for macOS feature enhances real-time protection (RTP) by using [behavior monitoring](behavior-monitor-macos.md) in concert with file, process, and other events to detect suspicious activity. Behavior monitoring triggers both telemetry and sample submissions on suspicious files for Microsoft to analyze from the cloud protection backend, and is delivered to the client device, resulting in a removal of the threat.
237+
238+
### Is there an impact on performance?
239+
240+
NRI should have a low impact on network performance. Instead of holding the connection and blocking, NRI makes a copy of the packet as it crosses the network, and NRI performs an asynchronous inspection.
241+
242+
> [!NOTE]
243+
> When network real-time inspection (NRI) for macOS is enabled, you might see a slight increase in memory utilization.
244+
245+
### Requirements for NRI for macOS
246+
247+
- The device must be onboarded to Microsoft Defender for Endpoint.
248+
- Preview features must be turned on in the [Microsoft Defender portal](https://security.microsoft.com).
249+
- The device must be in the Beta channel (formerly `InsiderFast`).
250+
- The minimum version number for Defender for Endpoint version number must be Beta (Insiders-Fast): [101.24092.0004](/defender-endpoint/mac-whatsnew#oct-2024-build-101240920004---release-version-2012409240) or newer. The version number refers to the `app version` (also known as Platform update).
251+
- Real-time protection must be enabled.
252+
- Behavior monitoring must be enabled.
253+
- Cloud-delivered protection must be enabled.
254+
- The device must be explicitly enrolled into the preview.
255+
256+
### Deployment instructions for NRI for macOS
257+
258+
1. E-mail us at `[email protected]` with information about your Microsoft Defender for Endpoint OrgID where you would like to have network real-time inspection (NRI) for macOS enabled.
259+
260+
> [!IMPORTANT]
261+
> In order to evaluate NRI for macOS, send email to `[email protected]`. Include your Defender for Endpoint Org ID. We're enabling this feature on a per-request basis for each tenant.
262+
263+
2. Enable behavior monitoring if it's not already enabled:
264+
265+
```Bash
266+
267+
sudo mdatp config behavior-monitoring --value enabled
268+
269+
```
270+
271+
3. Enable network protection in block mode:
272+
273+
```Bash
274+
275+
sudo mdatp config network-protection enforcement-level --value block
276+
277+
```
278+
279+
4. Enable network real-time inspection (NRI):
280+
281+
```Bash
282+
283+
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
284+
285+
```
225286

226-
- If the issue doesn't go away, it is not related to Behavior Monitoring.
227-
- If the issue goes away, take an aka.ms/xMDEClientAnalyzer and contact Microsoft support.

defender-endpoint/demonstration-behavior-monitoring.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Details: This program is dangerous and executes command from an attacker.
9898
Affected items:
9999
behavior: process: C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe, pid:6132:118419370780344
100100
process: pid:6132,ProcessStart:133621698624737241
101-
Learn more Actions
101+
Learn more Actions
102102
```
103103

104104
In the [Microsoft Defender portal](https://security.microsoft.com), you should see information like this:
@@ -123,7 +123,7 @@ When RTP is enabled, the result shows a value of 1.
123123

124124
### Enable Behavior Monitoring for Microsoft Defender for Endpoint
125125

126-
For more information on how to enable behavior monitoring for Defender for Endpoint, see [Deployment instructions](behavior-monitor-macos.md#deployment-instructions).
126+
For more information on how to enable behavior monitoring for Defender for Endpoint, see [Deployment instructions for behavior monitoring](behavior-monitor-macos.md#deployment-instructions-for-behavior-monitoring).
127127

128128
### Demonstration of how Behavior Monitoring works
129129

@@ -156,7 +156,7 @@ To demonstrate how Behavior Monitoring blocks a payload:
156156

157157
`zsh: killed sudo bash BM_test.sh`
158158

159-
The file was quarantined by Defender for Endpoint on macOS. Use the following command to list all the detected threats:
159+
The file is quarantined by Defender for Endpoint on macOS. Use the following command to list all the detected threats:
160160

161161
```bash
162162
mdatp threat list

defender-endpoint/mac-whatsnew.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: deniseb
66
ms.author: deniseb
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 11/18/2024
9+
ms.date: 12/11/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -43,6 +43,12 @@ For more information on Microsoft Defender for Endpoint on other operating syste
4343

4444
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.1 or newer.
4545

46+
- On macOS Sequoia (Version 15.0 - 15.1.1), users may encounter prompts about incoming network connections from applications when the native firewall is active.
47+
48+
![Screenshot showing prompts about incoming network connections](media/mac-whatsnew/image.png)
49+
50+
If an end user encounters a prompt for Defender for Endpoint on macOS processes such as `wdavdaemon_enterprise` or `Microsoft Defender Helper`, the end user can safely choose the **Deny** option. This selection doesn't impact Defender for Endpoint's functionality. Enterprises can also add *Microsoft Defender* to allow [incoming connections](https://support.apple.com/en-ca/guide/deployment/dep8d306275f/web). This issue is fixed in macOS Sequoia 15.2.
51+
4652
## Sequoia support
4753

4854
- Microsoft Defender for Endpoint supports version 15.0.1 or newer.
99.8 KB
Loading

0 commit comments

Comments
 (0)