Skip to content

Commit 80bd54f

Browse files
authored
Merge branch 'main' into docs-editor/deployment-vdi-microsoft-defen-1727402291
2 parents db0a0b1 + ed9dfb3 commit 80bd54f

7 files changed

+388
-44
lines changed

defender-endpoint/network-protection-macos.md

Lines changed: 64 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent macOS connections to bad sites
33
description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 08/22/2024
6+
ms.date: 09/27/2024
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -42,13 +42,13 @@ search.appverid: met150
4242
4343
## Overview
4444

45-
Microsoft Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host:
45+
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents people from using any application to access dangerous domains that might host:
4646

4747
- phishing scams
4848
- exploits
4949
- other malicious content on the Internet
5050

51-
Network protection expands the scope of Microsoft Defender XDR [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic are based on the domain or hostname.
51+
Network protection expands the scope of Microsoft Defender XDR [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP/HTTPS traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP/HTTPS traffic are based on the domain or hostname.
5252

5353
## Availability
5454

@@ -83,7 +83,7 @@ To roll out Network Protection for macOS, we recommend the following actions:
8383

8484
### Important notes
8585

86-
- We don't recommend controlling network protection from System Preferences by using the Disconnect button. Instead, use the mdatp command-line tool or JAMF / Intune to control network protection for macOS.
86+
- We don't recommend controlling network protection from System Preferences by using the **Disconnect** button. Instead, use the mdatp command-line tool or JamF/Intune to control network protection for macOS.
8787
- To evaluate effectiveness of macOS web threat protection, we recommend trying it in browsers other than Microsoft Edge for macOS (for example, Safari). Microsoft Edge for macOS has built-in web threat protection (Microsoft Defender Browser Protection extension which provides Smartscreen capabilities) that is enabled regardless of whether the Mac network protection feature you're evaluating, is turned on or not.
8888

8989
## Deployment instructions
@@ -136,26 +136,32 @@ After you create this configuration profile, assign it to the devices where you
136136

137137
##### Configure the enforcement level
138138

139-
Note: If you've already configured Microsoft Defender XDR for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed below and redeploy it from JAMF.
140-
141-
1. In **Computers** \> **Configuration Profiles**, select **Options** \> **Applications & Custom Settings**
142-
2. Select **Upload File** (PLIST file)
143-
3. Set preference domain to _com.microsoft.wdav_
144-
4. Upload the following plist file
145-
146-
```xml
147-
<?xml version="1.0" encoding="UTF-8"?>
148-
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
149-
<plist version="1.0">
150-
<dict>
151-
<key>networkProtection</key>
152-
<dict>
153-
<key>enforcementLevel</key>
154-
<string>block</string>
155-
</dict>
156-
</dict>
157-
</plist>
158-
```
139+
> [!NOTE]
140+
> If you've already configured Microsoft Defender XDR for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed in this section, and then redeploy it from JAMF.
141+
142+
1. In **Computers** > **Configuration Profiles**, select **Options** > **Applications & Custom Settings**.
143+
144+
2. Select **Upload File** (PLIST file).
145+
146+
3. Set preference domain to `com.microsoft.wdav`.
147+
148+
4. Upload the following plist file.
149+
150+
```xml
151+
152+
<?xml version="1.0" encoding="UTF-8"?>
153+
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
154+
<plist version="1.0">
155+
<dict>
156+
<key>networkProtection</key>
157+
<dict>
158+
<key>enforcementLevel</key>
159+
<string>block</string>
160+
</dict>
161+
</dict>
162+
</plist>
163+
164+
```
159165

160166
#### Intune deployment
161167

@@ -165,24 +171,32 @@ After you create this configuration profile, assign it to the devices where you
165171
##### Configure the enforcement level using Intune
166172

167173
> [!NOTE]
168-
> If you've already configured Microsoft Defender for Endpoint on Mac using the previous instructions (with an XML file), then remove the previous Custom configuration policy and replace it with the instructions below.
174+
> If you've already configured Microsoft Defender for Endpoint on Mac using the previous instructions (with an XML file), then remove the previous Custom configuration policy and replace it with the following instructions:
175+
176+
1. Open **Manage** > **Device configuration**. Select **Manage** \> **Profiles** \> **Create Profile**.
169177

170-
1. Open **Manage** \> **Device configuration**. Select **Manage** \> **Profiles** \> **Create Profile**.
171178
2. Change **Platform** to **macOS** and **Profile type** to **Settings catalog**. Select **Create**.
179+
172180
3. Specify a name for the profile.
173-
4. On the **Configuration settings** screen, select **Add settings**. Select **Microsoft Defender** \> **Network protection**, and tick the **Enforcement level** checkbox.
174-
5. Set the enforcement level to **block**. Select **Next**
175-
6. Open the configuration profile and upload the com.microsoft.wdav.xml file. (This file was created in step 3.)
181+
182+
4. On the **Configuration settings** screen, select **Add settings**. Select **Microsoft Defender** > **Network protection**, and tick the **Enforcement level** checkbox.
183+
184+
5. Set the enforcement level to **block**. Select **Next**.
185+
186+
6. Open the configuration profile and upload the `com.microsoft.wdav.xml` file. (This file was created in step 3.)
187+
176188
7. Select **OK**
189+
177190
8. Select **Manage** \> **Assignments**. In the **Include** tab, select the devices for which you want to enable network protection.
178191

179192
#### Mobileconfig deployment
180193

181-
To deploy the configuration via a .mobileconfig file, which can be used with non-Microsoft MDM solutions or distributed to devices directly:
194+
To deploy the configuration via a `.mobileconfig` file, which can be used with non-Microsoft MDM solutions or distributed to devices directly, follow these steps:
182195

183-
1. Save the following payload as _com.microsoft.wdav.xml.mobileconfig_
196+
1. Save the following payload as `com.microsoft.wdav.xml.mobileconfig`.
184197

185198
```xml
199+
186200
<?xml version="1.0" encoding="utf-8"?>
187201
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
188202
<plist version="1">
@@ -235,28 +249,34 @@ To deploy the configuration via a .mobileconfig file, which can be used with non
235249
</array>
236250
</dict>
237251
</plist>
252+
238253
```
239254

240-
2. Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs OK:
255+
2. Verify that the file from the previous step was copied correctly. Using Terminal, run the following command and verify that it outputs OK:
241256

242257
```bash
258+
243259
plutil -lint com.microsoft.wdav.xml
260+
244261
```
245262

246-
247263
## How to explore the features
248264

249265
1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
250266
- Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
267+
251268
2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
269+
252270
3. Explore [Web content filtering](web-content-filtering.md).
271+
253272
> [!NOTE]
254273
> If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
255274
> Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
256275
>
257276
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
258277
259278
4. [Integrate Microsoft Defender for Endpoint with Defender for Cloud Apps](/defender-cloud-apps/mde-integration) and your network protection-enabled macOS devices have endpoint policy enforcement capabilities.
279+
260280
> [!NOTE]
261281
> Discovery and other features are currently not supported on these platforms.
262282
@@ -312,24 +332,22 @@ Within 10-15 minutes, these domains are listed in Microsoft Defender XDR under I
312332

313333
:::image type="content" source="media/network-protection-macos-indicators-urls-domains-warn.png" alt-text="Shows network protection indicators for urls or domains warning.":::
314334

315-
When the end user is attempting to access monitored domains, they're warned by Defender for Endpoint.
316-
317-
- The user gets a plain block experience accompanied by the following toast message, which is displayed by the operating system including the name of the blocked application (e.g Blogger.com)
335+
When the end user is attempting to access monitored domains, they're warned by Defender for Endpoint. The user gets a plain block experience accompanied by the following toast message, which is displayed by the operating system including the name of the blocked application (e.g Blogger.com)
318336

319337
:::image type="content" source="media/network-protection-macos-content-blocked.png" alt-text="Shows end-user network protection content blocked toast notification.":::
320338

321-
If the end user encounters a _block_, the user has two possible resolutions:
339+
If the end user encounters a _block_, the user has two possible resolutions: bypass and education.
322340

323341
#### User bypass
324342

325-
- **For toast message experience**: Press the Unblock button. By reloading the webpage, the user is able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user has to unblock once again)
343+
- **For toast message experience**: Press the **Unblock** button. By reloading the webpage, the user is able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user has to unblock once again.)
326344

327345
#### User education
328346

329347
- **For toast message experience**: Press the toast message itself. End user is redirected to a custom redirect URL set globally in Microsoft Defender for Cloud Apps (More information at the bottom of this page)
330348

331349
> [!NOTE]
332-
> Tracking bypasses per app**You can track how many users have bypassed the warning in the _Application_ page in Microsoft Defender for Cloud Apps.
350+
> Tracking bypasses per app: You can track how many users have bypassed the warning in the **Application** page in Microsoft Defender for Cloud Apps.
333351
334352
:::image type="content" source="media/network-protection-macos-mcas-cloud-app-security.png" alt-text="Shows network protection cloud app security overview.":::
335353

@@ -355,10 +373,15 @@ For this page, we recommend that your organization uses a basic SharePoint site.
355373
### Important things to know
356374

357375
1. It can take up to two hours (typically less) for app domains to propagate and to be update in the endpoint devices, after it's marked as _Monitored_.
376+
358377
2. By default, action is taken for all apps and domains that were marked as Monitored in Microsoft Defender for Cloud Apps portal for all the onboarded endpoints in the organization.
359-
3. Full URLs are currently not supported and won't be sent from Microsoft Defender for Cloud Apps to Microsoft Defender XDR for Endpoint, if any full URLs are listed under Microsoft Defender for Cloud Apps monitored apps, hence, user won't get warned on access attempt (for example, google.com/drive isn't supported, while drive.google.com is supported).
360378

361-
No End-user notification on third party browsers? Check your toast message settings.
379+
3. Full URLs are currently not supported and aren't sent from Microsoft Defender for Cloud Apps to Microsoft Defender for Endpoint. If any full URLs are listed under Microsoft Defender for Cloud Apps as monitored apps, users aren't warned when they attempt to access a site. (For example, `google.com/drive` isn't supported, while `drive.google.com` is supported.)
380+
381+
4. Network protection doesn't support the use of QUIC on browsers. Administrators need to ensure that QUIC is disabled when testing to ensure sites are blocked correctly.
382+
383+
> [!TIP]
384+
> No end-user notifications are appearing on third party browsers? Check your toast message settings.
362385
363386
## See also
364387

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,8 @@
240240
href: tenant-allow-block-list-files-configure.md
241241
- name: Allow or block URLs using the Tenant Allow/Block List
242242
href: tenant-allow-block-list-urls-configure.md
243+
- name: Allow or block IP addresses using the Tenant Allow/Block List
244+
href: tenant-allow-block-list-ip-addresses-configure.md
243245
- name: Admin submissions
244246
href: submissions-admin.md
245247
- name: Create block sender lists

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 09/19/2024
11+
ms.date: 09/20/2024
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -32,7 +32,7 @@ appliesto:
3232
3333
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
3434

35-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders.
35+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
3636

3737
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

@@ -43,6 +43,7 @@ For usage and configuration instructions, see the following articles:
4343
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46+
- **IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
4647

4748
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
4849

@@ -70,7 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7071

7172
- **[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
7273

73-
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) never expire.
74+
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
75+
76+
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
77+
78+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
7479

7580
## Allow entries in the Tenant Allow/Block List
7681

@@ -82,6 +87,8 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
8287
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
8388
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
8489

90+
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
91+
8592
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
8693

8794
- **Email attachments** and **URLs**: An allow entry is created and the entry appears on the **Files** or **URLs** tab in the Tenant Allow/Block List respectively.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -543,3 +543,4 @@ For submission instructions for impersonation false positives, see [Report good
543543
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
544544
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
545545
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
546+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -283,3 +283,4 @@ For detailed syntax and parameter information, see [Remove-TenantAllowBlockListI
283283
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
284284
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
285285
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
286+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

0 commit comments

Comments
 (0)