Skip to content

Commit 8127699

Browse files
authored
Merge branch 'main' into mde-linux
2 parents c14d6bd + cd1beb2 commit 8127699

File tree

2 files changed

+81
-97
lines changed

2 files changed

+81
-97
lines changed

defender-endpoint/defender-endpoint-demonstration-controlled-folder-access.md

Lines changed: 50 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 02/16/2024
17+
ms.date: 10/11/2024
1818
---
1919

2020
# Controlled folder access (CFA) demonstrations (block ransomware)
@@ -44,10 +44,10 @@ Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
4444
## Rule states
4545

4646
|State | Mode| Numeric value |
47-
|:---|:---|:---|
48-
| Disabled | = Off | 0 |
49-
| Enabled | = Block mode | 1 |
50-
| Audit | = Audit mode | 2 |
47+
|---|---|---|
48+
| Disabled | Off | 0 |
49+
| Enabled | Block mode | 1 |
50+
| Audit | Audit mode | 2 |
5151

5252
## Verify configuration
5353

@@ -63,65 +63,86 @@ Get-MpPreference
6363

6464
### Setup
6565

66-
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
66+
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:
6767

6868
```powershell
6969
Set-ExecutionPolicy Unrestricted
7070
```
7171

72-
You can perform these manual steps instead:
72+
Or, you can perform these manual steps instead:
7373

74-
1. Create a folder under c: named demo, "c:\demo".
74+
1. Create a folder under `c:` named `demo`, as in `c:\demo`.
7575

76-
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
76+
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).
7777

78-
3. Execute PowerShell commands listed earlier in this article.
78+
3. Run the PowerShell commands listed earlier in this article.
79+
80+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
7981

80-
### Scenario 1: CFA blocks ransomware test file
8182

82-
1. Turn on CFA using PowerShell command:
83-
8483
```powershell
85-
Set-MpPreference -EnableControlledFolderAccess Enabled
84+
$idx = $(Get-MpPreference).AttackSurfaceReductionRules_Ids.IndexOf("C1DB55AB-C21A-4637-BB3F-A12568109D35")
85+
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
8686
```
8787

88-
2. Add the demo folder to protected folders list using PowerShell command:
88+
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:
8989

9090
```powershell
91-
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
91+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
9292
```
9393

94-
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
95-
4. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo
94+
### Scenario 1: CFA blocks ransomware test file
95+
96+
1. Turn on CFA using PowerShell command:
97+
98+
```powershell
99+
Set-MpPreference -EnableControlledFolderAccess Enabled
100+
```
101+
102+
2. Add the demo folder to protected folders list using PowerShell command:
103+
104+
```powershell
105+
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
106+
```
107+
108+
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
109+
110+
4. Execute the ransomware test file. Note that it isn't ransomware; it simply tries to encrypt `c:\demo`.
96111

97112
#### Scenario 1 expected results
98113

99-
5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.
114+
About five seconds after executing the ransomware test file, you should see a notification that CFA blocked the encryption attempt.
100115

101116
### Scenario 2: What would happen without CFA
102117

103118
1. Turn off CFA using this PowerShell command:
104119

105-
```powershell
106-
Set-MpPreference -EnableControlledFolderAccess Disabled
107-
```
120+
```powershell
121+
Set-MpPreference -EnableControlledFolderAccess Disabled
122+
```
108123

109-
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
124+
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
110125

111126
#### Scenario 2 expected results
112127

113-
- The files in c:\demo are encrypted and you should get a warning message
128+
- The files in `c:\demo` are encrypted and you should get a warning message
114129
- Execute the ransomware test file again to decrypt the files
115130

116131
## Clean-up
117132

118-
Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
133+
1. Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
119134

120-
```powershell
121-
Set-MpPreference -EnableControlledFolderAccess Disabled
122-
```
135+
```powershell
136+
Set-MpPreference -EnableControlledFolderAccess Disabled
137+
```
138+
139+
2. Clean up `c:\demo` encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
140+
141+
3. If the *Aggressive Ransomware Prevention* ASR rule was enabled and you disabled it at the beginning of this test, enable it again:
123142

124-
Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
143+
```powershell
144+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
145+
```
125146

126147
## See also
127148

defender-endpoint/mac-install-with-intune.md

Lines changed: 31 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Intune-based deployment for Microsoft Defender for Endpoint on Mac
33
description: Install Microsoft Defender for Endpoint on Mac, using Microsoft Intune.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: denisebmsft
6+
ms.author: deniseb
77
manager: deniseb
8+
ms.reviewer: yongrhee
89
ms.localizationpriority: medium
910
audience: ITPro
1011
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
1415
ms.topic: conceptual
1516
ms.subservice: macos
1617
search.appverid: met150
17-
ms.date: 09/12/2024
18+
ms.date: 10/11/2024
1819
---
1920

2021
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -71,11 +72,9 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
7172

7273
1. Select **Create**.
7374

74-
1. On the **Basics** tab, **Name** the profile and enter a **Description.**
75+
1. On the **Basics** tab, **Name** the profile and enter a **Description.** Then select **Next**.
7576

76-
1. Select **Next**.
77-
78-
1. On the **Configuration settings tab,** select **+Add settings.**
77+
1. On the **Configuration settings tab,** select **+ Add settings.**
7978

8079
1. Under **Template name**, select **Extensions**.
8180

@@ -85,7 +84,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
8584

8685
1. Close the Settings picker, and then select **+ Edit instance**.
8786

88-
1. Configure the following entries in the **Allowed system extensions** section:
87+
1. Configure the following entries in the **Allowed system extensions** section, and then select **Next**.
8988

9089
|Allowed System Extensions|Team Identifier|
9190
|---|---|
@@ -94,8 +93,6 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
9493

9594
![Screenshot showing allowed system extensions](media/mac-install-with-intune/image003.png)
9695

97-
1. Select **Next**.
98-
9996
1. On the **Assignments** tab, assign the profile to a group where the macOS devices or users are located.
10097

10198
1. Review the configuration profile. Select **Create**.
@@ -113,27 +110,25 @@ To configure your network filter:
113110

114111
1. Under **Configuration profiles**, select **Create Profile**.
115112

116-
2. Under **Platform**, select **macOS**.
117-
118-
3. Under **Profile type**, select **Templates**.
113+
1. Under **Platform**, select **macOS**.
119114

120-
4. Under **Template name**, select **Custom**.
115+
1. Under **Profile type**, select **Templates**.
121116

122-
5. Select **Create**.
117+
1. Under **Template name**, select **Custom**.
123118

124-
6. On the **Basics** tab, **Name** the profile. For example, `NetFilter-prod-macOS-Default-MDE`.
119+
1. Select **Create**.
125120

126-
7. Select **Next**.
121+
1. On the **Basics** tab, **Name** the profile. For example, `NetFilter-prod-macOS-Default-MDE`. Then, select **Next**.
127122

128-
8. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
123+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
129124

130-
9. Choose a Deployment channel and select **Next**.
125+
1. Choose a **Deployment channel** and select **Next**.
131126

132-
10. Select **Next**.
127+
1. Select a **Configuration profile file**, and then select **Next**.
133128

134-
11. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
129+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
135130

136-
12. Review the configuration profile. Select **Create**.
131+
1. Review the configuration profile. Select **Create**.
137132

138133
### Step 3: Full Disk Access
139134

@@ -154,9 +149,7 @@ To configure Full Disk Access:
154149

155150
1. Under **Template name**, select **Custom**, and then select **Create**.
156151

157-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
158-
159-
1. Select **Next**.
152+
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`. Then select **Next**.
160153

161154
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
162155

@@ -190,15 +183,11 @@ To configure background services:
190183

191184
1. Select **Create**.
192185

193-
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
194-
195-
1. Select **Next**.
186+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`. Then select **Next**.
196187

197188
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `backgroundServices-prod-macOS-Default-MDE`.
198189

199-
1. Choose a **Deployment channel**.
200-
201-
1. Select **Next**.
190+
1. Choose a **Deployment channel** and select **Next**.
202191

203192
1. Select a **Configuration profile file**.
204193

@@ -228,9 +217,7 @@ To configure notifications:
228217

229218
1. Select **Create**.
230219

231-
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
232-
233-
1. Select **Next**.
220+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`. Then select **Next**.
234221

235222
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notif.mobileconfig`.
236223

@@ -258,15 +245,11 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
258245

259246
1. Select **Create**.
260247

261-
1. On the **Basics** tab, **Name** the profile. For example, `Accessibility-prod-macOS-Default-MDE`.
262-
263-
1. Select **Next**.
248+
1. On the **Basics** tab, **Name** the profile. For example, `Accessibility-prod-macOS-Default-MDE`. Then select **Next**.
264249

265250
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Accessibility.mobileconfig`.
266251

267-
1. Choose a **Deployment channel**.
268-
269-
1. Select **Next**.
252+
1. Choose a **Deployment channel** and select **Next**.
270253

271254
1. Select a **Configuration profile file**.
272255

@@ -309,15 +292,11 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
309292

310293
1. Select **Create**.
311294

312-
1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`.
313-
314-
1. Select **Next**.
295+
1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`. Then select **Next**.
315296

316297
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Autoupdate.mobileconfig`.
317298

318-
1. Choose a **Deployment channel**.
319-
320-
1. Select **Next**.
299+
1. Choose a **Deployment channel** and select **Next**.
321300

322301
1. Select a **Configuration profile file**.
323302

@@ -349,12 +328,10 @@ For more information about managing security settings, see:
349328

350329
- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)
351330
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
331+
352332
> [!NOTE]
353-
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
333+
> If the device is managed via Intune, the device won't register via Defender for Endpoint Security Settings Management in the [Microsoft Defender portal](https://security.microsoft.com). Only the policies set via Intune take effect.
354334
355-
> [!IMPORTANT]
356-
> Important
357-
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
358335
#### **Set policies using Microsoft Intune**
359336

360337
You can manage the security settings for Microsoft Defender for Endpoint on macOS under **Setting Preferences** in Microsoft Intune.
@@ -482,7 +459,7 @@ For more information, see [Add Microsoft Defender for Endpoint to macOS devices
482459

483460
To download the onboarding packages from Microsoft 365 Defender portal:
484461

485-
1. In the Microsoft 365 Defender portal, go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
462+
1. In the Microsoft 365 Defender portal, go to **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
486463

487464
2. Set the operating system to **macOS** and the deployment method to **Mobile Device Management / Microsoft Intune**.
488465

@@ -524,15 +501,13 @@ To deploy the onboarding package:
524501

525502
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png" alt-text="Screenshot that shows the deploy onboarding package." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png":::
526503

527-
1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`. Select **Next**.
504+
1. On the **Basics** tab, **Name** the profile. For example, `Onboarding-prod-macOS-Default-MDE`. Select **Next**.
528505

529506
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png" alt-text="Screenshot that shows the Custom page." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png":::
530507

531-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Autoupdate.mobileconfig`.
532-
533-
1. Choose a **Deployment channel**.
508+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `WindowsDefenderATPOnboarding`.
534509

535-
1. Select **Next**.
510+
1. Choose a **Deployment channel** and select **Next**.
536511

537512
1. Select a **Configuration profile file**.
538513

@@ -576,15 +551,3 @@ For information on troubleshooting procedures, see:
576551

577552
See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove Microsoft Defender for Endpoint on macOS from client devices.
578553

579-
## Recommended content
580-
581-
|Article | Description |
582-
|---|---|
583-
| [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos?source=recommendations) | Learn about adding Microsoft Defender for Endpoint to macOS devices using Microsoft Intune |
584-
| [Examples of device control policies for Intune](mac-device-control-intune.md) | Learn how to use device control policies using examples that can be used with Intune |
585-
| [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md) | Describes how to deploy Microsoft Defender for Endpoint on iOS features |
586-
| [Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune](ios-install.md) | Describes how to deploy Microsoft Defender for Endpoint on iOS using an app |
587-
| [Configure Microsoft Defender for Endpoint in Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure?source=recommendations) | Describes connecting to Defender for Endpoint, onboarding devices, assigning compliance for risk levels, and conditional access policies |
588-
| [Troubleshoot issues and find answers on FAQs related to Microsoft Defender for Endpoint on iOS](ios-troubleshoot.md) | Troubleshooting and FAQ - Microsoft Defender for Endpoint on iOS |
589-
| [Configure Microsoft Defender for Endpoint on Android features](android-configure.md) | Describes how to configure Microsoft Defender for Endpoint on Android |
590-
| [Manage Defender for Endpoint on Android devices in Intune - Azure](/mem/intune/protect/advanced-threat-protection-manage-android?source=recommendations) | Configure Microsoft Defender for Endpoint web protection on Android devices managed by Microsoft Intune |

0 commit comments

Comments
 (0)