You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection-macos.md
+64-41Lines changed: 64 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent macOS connections to bad sites
3
3
description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 08/22/2024
6
+
ms.date: 09/27/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -42,13 +42,13 @@ search.appverid: met150
42
42
43
43
## Overview
44
44
45
-
Microsoft Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host:
45
+
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents people from using any application to access dangerous domains that might host:
46
46
47
47
- phishing scams
48
48
- exploits
49
49
- other malicious content on the Internet
50
50
51
-
Network protection expands the scope of Microsoft Defender XDR [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic are based on the domain or hostname.
51
+
Network protection expands the scope of Microsoft Defender XDR [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP/HTTPS traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP/HTTPS traffic are based on the domain or hostname.
52
52
53
53
## Availability
54
54
@@ -83,7 +83,7 @@ To roll out Network Protection for macOS, we recommend the following actions:
83
83
84
84
### Important notes
85
85
86
-
- We don't recommend controlling network protection from System Preferences by using the Disconnect button. Instead, use the mdatp command-line tool or JAMF / Intune to control network protection for macOS.
86
+
- We don't recommend controlling network protection from System Preferences by using the **Disconnect** button. Instead, use the mdatp command-line tool or JamF/Intune to control network protection for macOS.
87
87
- To evaluate effectiveness of macOS web threat protection, we recommend trying it in browsers other than Microsoft Edge for macOS (for example, Safari). Microsoft Edge for macOS has built-in web threat protection (Microsoft Defender Browser Protection extension which provides Smartscreen capabilities) that is enabled regardless of whether the Mac network protection feature you're evaluating, is turned on or not.
88
88
89
89
## Deployment instructions
@@ -136,26 +136,32 @@ After you create this configuration profile, assign it to the devices where you
136
136
137
137
##### Configure the enforcement level
138
138
139
-
Note: If you've already configured Microsoft Defender XDR for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed below and redeploy it from JAMF.
140
-
141
-
1. In **Computers**\>**Configuration Profiles**, select **Options**\>**Applications & Custom Settings**
142
-
2. Select **Upload File** (PLIST file)
143
-
3. Set preference domain to _com.microsoft.wdav_
144
-
4. Upload the following plist file
145
-
146
-
```xml
147
-
<?xml version="1.0" encoding="UTF-8"?>
148
-
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
149
-
<plistversion="1.0">
150
-
<dict>
151
-
<key>networkProtection</key>
152
-
<dict>
153
-
<key>enforcementLevel</key>
154
-
<string>block</string>
155
-
</dict>
156
-
</dict>
157
-
</plist>
158
-
```
139
+
> [!NOTE]
140
+
> If you've already configured Microsoft Defender XDR for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed in this section, and then redeploy it from JAMF.
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
154
+
<plistversion="1.0">
155
+
<dict>
156
+
<key>networkProtection</key>
157
+
<dict>
158
+
<key>enforcementLevel</key>
159
+
<string>block</string>
160
+
</dict>
161
+
</dict>
162
+
</plist>
163
+
164
+
```
159
165
160
166
#### Intune deployment
161
167
@@ -165,24 +171,32 @@ After you create this configuration profile, assign it to the devices where you
165
171
##### Configure the enforcement level using Intune
166
172
167
173
> [!NOTE]
168
-
> If you've already configured Microsoft Defender for Endpoint on Mac using the previous instructions (with an XML file), then remove the previous Custom configuration policy and replace it with the instructions below.
174
+
> If you've already configured Microsoft Defender for Endpoint on Mac using the previous instructions (with an XML file), then remove the previous Custom configuration policy and replace it with the following instructions:
175
+
176
+
1. Open **Manage** > **Device configuration**. Select **Manage**\>**Profiles**\>**Create Profile**.
169
177
170
-
1. Open **Manage**\>**Device configuration**. Select **Manage**\>**Profiles**\>**Create Profile**.
171
178
2. Change **Platform** to **macOS** and **Profile type** to **Settings catalog**. Select **Create**.
179
+
172
180
3. Specify a name for the profile.
173
-
4. On the **Configuration settings** screen, select **Add settings**. Select **Microsoft Defender**\>**Network protection**, and tick the **Enforcement level** checkbox.
174
-
5. Set the enforcement level to **block**. Select **Next**
175
-
6. Open the configuration profile and upload the com.microsoft.wdav.xml file. (This file was created in step 3.)
181
+
182
+
4. On the **Configuration settings** screen, select **Add settings**. Select **Microsoft Defender** > **Network protection**, and tick the **Enforcement level** checkbox.
183
+
184
+
5. Set the enforcement level to **block**. Select **Next**.
185
+
186
+
6. Open the configuration profile and upload the `com.microsoft.wdav.xml` file. (This file was created in step 3.)
187
+
176
188
7. Select **OK**
189
+
177
190
8. Select **Manage**\>**Assignments**. In the **Include** tab, select the devices for which you want to enable network protection.
178
191
179
192
#### Mobileconfig deployment
180
193
181
-
To deploy the configuration via a .mobileconfig file, which can be used with non-Microsoft MDM solutions or distributed to devices directly:
194
+
To deploy the configuration via a `.mobileconfig` file, which can be used with non-Microsoft MDM solutions or distributed to devices directly, follow these steps:
182
195
183
-
1. Save the following payload as _com.microsoft.wdav.xml.mobileconfig_
196
+
1. Save the following payload as `com.microsoft.wdav.xml.mobileconfig`.
184
197
185
198
```xml
199
+
186
200
<?xml version="1.0" encoding="utf-8"?>
187
201
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
188
202
<plistversion="1">
@@ -235,28 +249,34 @@ To deploy the configuration via a .mobileconfig file, which can be used with non
235
249
</array>
236
250
</dict>
237
251
</plist>
252
+
238
253
```
239
254
240
-
2. Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs OK:
255
+
2. Verify that the file from the previous step was copied correctly. Using Terminal, run the following command and verify that it outputs OK:
241
256
242
257
```bash
258
+
243
259
plutil -lint com.microsoft.wdav.xml
260
+
244
261
```
245
262
246
-
247
263
## How to explore the features
248
264
249
265
1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
250
266
- Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
267
+
251
268
2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
> If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
255
274
> Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
256
275
>
257
276
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
258
277
259
278
4.[Integrate Microsoft Defender for Endpoint with Defender for Cloud Apps](/defender-cloud-apps/mde-integration) and your network protection-enabled macOS devices have endpoint policy enforcement capabilities.
279
+
260
280
> [!NOTE]
261
281
> Discovery and other features are currently not supported on these platforms.
262
282
@@ -312,24 +332,22 @@ Within 10-15 minutes, these domains are listed in Microsoft Defender XDR under I
312
332
313
333
:::image type="content" source="media/network-protection-macos-indicators-urls-domains-warn.png" alt-text="Shows network protection indicators for urls or domains warning.":::
314
334
315
-
When the end user is attempting to access monitored domains, they're warned by Defender for Endpoint.
316
-
317
-
- The user gets a plain block experience accompanied by the following toast message, which is displayed by the operating system including the name of the blocked application (e.g Blogger.com)
335
+
When the end user is attempting to access monitored domains, they're warned by Defender for Endpoint. The user gets a plain block experience accompanied by the following toast message, which is displayed by the operating system including the name of the blocked application (e.g Blogger.com)
If the end user encounters a _block_, the user has two possible resolutions:
339
+
If the end user encounters a _block_, the user has two possible resolutions: bypass and education.
322
340
323
341
#### User bypass
324
342
325
-
-**For toast message experience**: Press the Unblock button. By reloading the webpage, the user is able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user has to unblock once again)
343
+
-**For toast message experience**: Press the **Unblock** button. By reloading the webpage, the user is able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user has to unblock once again.)
326
344
327
345
#### User education
328
346
329
347
-**For toast message experience**: Press the toast message itself. End user is redirected to a custom redirect URL set globally in Microsoft Defender for Cloud Apps (More information at the bottom of this page)
330
348
331
349
> [!NOTE]
332
-
> Tracking bypasses per app** – You can track how many users have bypassed the warning in the _Application_ page in Microsoft Defender for Cloud Apps.
350
+
> Tracking bypasses per app: You can track how many users have bypassed the warning in the **Application** page in Microsoft Defender for Cloud Apps.
@@ -355,10 +373,15 @@ For this page, we recommend that your organization uses a basic SharePoint site.
355
373
### Important things to know
356
374
357
375
1. It can take up to two hours (typically less) for app domains to propagate and to be update in the endpoint devices, after it's marked as _Monitored_.
376
+
358
377
2. By default, action is taken for all apps and domains that were marked as Monitored in Microsoft Defender for Cloud Apps portal for all the onboarded endpoints in the organization.
359
-
3. Full URLs are currently not supported and won't be sent from Microsoft Defender for Cloud Apps to Microsoft Defender XDR for Endpoint, if any full URLs are listed under Microsoft Defender for Cloud Apps monitored apps, hence, user won't get warned on access attempt (for example, google.com/drive isn't supported, while drive.google.com is supported).
360
378
361
-
No End-user notification on third party browsers? Check your toast message settings.
379
+
3. Full URLs are currently not supported and aren't sent from Microsoft Defender for Cloud Apps to Microsoft Defender for Endpoint. If any full URLs are listed under Microsoft Defender for Cloud Apps as monitored apps, users aren't warned when they attempt to access a site. (For example, `google.com/drive` isn't supported, while `drive.google.com` is supported.)
380
+
381
+
4. Network protection doesn't support the use of QUIC on browsers. Administrators need to ensure that QUIC is disabled when testing to ensure sites are blocked correctly.
382
+
383
+
> [!TIP]
384
+
> No end-user notifications are appearing on third party browsers? Check your toast message settings.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-about.md
+10-3Lines changed: 10 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: how-to
10
10
ms.localizationpriority: medium
11
-
ms.date: 09/19/2024
11
+
ms.date: 09/20/2024
12
12
search.appverid:
13
13
- MET150
14
14
ms.collection:
@@ -32,7 +32,7 @@ appliesto:
32
32
33
33
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
34
34
35
-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders.
35
+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
36
36
37
37
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
38
38
@@ -43,6 +43,7 @@ For usage and configuration instructions, see the following articles:
43
43
-**Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
44
44
-**Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
45
45
-**URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46
+
-**IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
46
47
47
48
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
48
49
@@ -70,7 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
70
71
71
72
-**[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
72
73
73
-
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) never expire.
74
+
-**[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
75
+
76
+
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
77
+
78
+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
74
79
75
80
## Allow entries in the Tenant Allow/Block List
76
81
@@ -82,6 +87,8 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
82
87
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
83
88
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
84
89
90
+
-**IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
91
+
85
92
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
86
93
87
94
-**Email attachments** and **URLs**: An allow entry is created and the entry appears on the **Files** or **URLs** tab in the Tenant Allow/Block List respectively.
0 commit comments