You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-ip-domain.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice:
17
17
search.appverid: met150
18
-
ms.date: 10/18/2024
18
+
ms.date: 10/23/2024
19
19
---
20
20
21
21
# Create indicators for IPs and URLs/domains
@@ -103,6 +103,9 @@ For processes other than Microsoft Edge and Internet Explorer, web protection sc
103
103
- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.
104
104
- In the case of URL indicator policy conflicts, the longer path may not be applied due to redirection. In such cases, register a non-redirected URL.
105
105
106
+
> [!NOTE]
107
+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
108
+
106
109
## Network protection and the TCP three-way handshake
107
110
108
111
With network protection, the determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip). Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under `NetworkConnectionEvents` in the Microsoft Defender portal, even though the site was blocked. `NetworkConnectionEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
@@ -142,15 +145,15 @@ In the case where multiple different action types are set on the same indicator
142
145
2. Warn
143
146
3. Block
144
147
145
-
_Allow_ overrides _warn_ which overrides _block_: Allow > Warn > Block. Therefore, in the above example, `Microsoft.com` would be allowed.
148
+
"Allow" overrides "warn," which overrides "block", as follows: `Allow` > `Warn` > `Block`. Therefore, in the previous example, `Microsoft.com` would be allowed.
146
149
147
150
### Defender for Cloud Apps Indicators
148
151
149
152
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators will be created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) will be created for the URLs associated with the application. Allow indicators cannot be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
150
153
151
154
## Policy precedence
152
155
153
-
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to **Allow**, but Microsoft Defender Antivirus is set to **Block**, the policy will default to **Allow**.
156
+
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to `Allow`, but Microsoft Defender Antivirus is set to `Block`, the policy defaults to `Allow`.
title: How to schedule scans with Microsoft Defender for Endpoint on macOS
3
3
description: Learn how to schedule an automatic scanning time for Microsoft Defender for Endpoint in macOS to better protect your organization's assets.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: denisebmsft
6
+
ms.author: deniseb
7
7
manager: deniseb
8
+
ms.reviewer: yonghree
8
9
ms.localizationpriority: medium
9
-
ms.date: 05/06/2024
10
+
ms.date: 10/23/2024
10
11
audience: ITPro
11
12
ms.collection:
12
13
- m365-security
@@ -28,21 +29,21 @@ search.appverid: met150
28
29
29
30
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
30
31
31
-
## Schedule a scan *built-in to* Microsoft Defender for Endpoint on macOS
32
+
## Schedule a scan built into Microsoft Defender for Endpoint on macOS
32
33
33
34
While you can start a threat scan at any time with Microsoft Defender for Endpoint, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week.
34
35
35
-
There are three types of scheduled scans that are configurable: hourly, daily, and weekly scans. Hourly and daily scheduled scans are always run as quick scans, weekly scans can be configured to be either quick or full scans. It is possible to have all three types of scheduled scans at the same time. See the samples below.
36
+
There are three types of scheduled scans that are configurable: hourly, daily, and weekly scans. Hourly and daily scheduled scans are always run as quick scans, weekly scans can be configured to be either quick or full scans. It's possible to have all three types of scheduled scans at the same time. See the samples in this article.
36
37
37
38
**Prerequisites**:
38
39
39
40
- Platform Update version: [101.23122.0005](mac-whatsnew.md#jan-2024-build-101231220005---release-version-2012312250) or newer
40
41
41
-
## Schedule a scan with *Microsoft Defender for Endpoint on macOS*
42
+
## Schedule a scan with Microsoft Defender for Endpoint on macOS
42
43
43
44
You can create a scheduled scan for your macOS, which is built in to *Microsoft Defender for Endpoint on macOS*.
44
45
45
-
For more information on the _.plist_ file format used here, see [About Information Property List Files](https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/AboutInformationPropertyListFiles.html) at the official Apple developer website.
46
+
For more information on the `.plist` file format used here, see [About Information Property List Files](https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/AboutInformationPropertyListFiles.html) at the official Apple developer website.
46
47
47
48
The following sample shows the daily and/or weekly configuration for the scheduled scan on macOS.
48
49
@@ -51,106 +52,107 @@ The following sample shows the daily and/or weekly configuration for the schedul
51
52
52
53
| Parameter | The acceptable values for this parameter are: |
53
54
| --- | --- |
54
-
| scheduledScan | enabled or disabled |
55
-
| scanType | quick or full |
56
-
| ignoreExclusions | true or false |
57
-
| lowPriorityScheduledScan | true or false |
58
-
| dayOfWeek | The range is between 0 and 8. <br>- 0: Everyday <br>- 1: Sunday <br>- 2: Monday <br>- 3: Tuesday <br>- 4: Wednesday <br>- 5: Thursday <br>- 6: Friday <br>- 7: Saturday <br>- 8: Never |
59
-
| timeOfDay | Specifies the time of day, as the number of _minutes after midnight_, to perform a scheduled scan. The time refers to the local time on the computer. If you don't specify a value for this parameter, a scheduled scan runs at a default time of two hours after midnight. |
60
-
| interval |0 (never), every 1 (hour) to 24 (hours, 1 scan per day) |
61
-
| randomizeScanStartTime | Only applicable for daily quick scans or weekly quick/full scans. Randomize the start time of the scan by up to specified number of hours. <br> For example, if a scan is scheduled for 2 p.m and randomizeScanStartTime is set to 2, the scan commences at a random time between 2 p.m and 4 p.m. |
55
+
|`scheduledScan`|`enabled` or `disabled`|
56
+
|`scanType`|`quick` or `full`|
57
+
|`ignoreExclusions`|`true` or `false`|
58
+
| lowPriorityScheduledScan |`true` or `false`|
59
+
|`dayOfWeek`| The range is between `0` and `8`. <br>- `0`: Everyday <br>- `1`: Sunday <br>- `2`: Monday <br>- `3`: Tuesday <br>- `4`: Wednesday <br>- `5`: Thursday <br>- `6`: Friday <br>- `7`: Saturday <br>- `8`: Never |
60
+
|`timeOfDay`| Specifies the time of day, as the number of `minutes after midnight`, to perform a scheduled scan. The time refers to the local time on the computer. If you don't specify a value for this parameter, a scheduled scan runs at a default time of two hours after midnight. |
61
+
|`interval`|`0` (never), `every 1` (hour) to `every 24` (hours, one scan per day) |
62
+
|`randomizeScanStartTime`| Only applicable for daily quick scans or weekly quick/full scans. Randomize the start time of the scan by up to specified number of hours. <br> For example, if a scan is scheduled for 2 p.m and `randomizeScanStartTime` is set to 2, the scan commences at a random time between 2 p.m and 4 p.m. |
62
63
63
-
Your scheduled scan runs at the date, time, and frequency you defined in your _plist_.
64
+
Your scheduled scan runs at the date, time, and frequency you defined in your `plist`.
64
65
65
-
### Example 1: Schedule a daily quick scan and weekly full scan using a _plist_
66
+
### Example 1: Schedule a daily quick scan and weekly full scan using a plist
66
67
67
-
In the following example, the daily quick scan configuration is set to run at 885 minutes after midnight (2:45 p.m.).<br>
68
-
The weekly configuration is set to run a full scan on Wednesday at 880 minutes after midnight (2:40 p.m.).
69
-
And it's set to ignore exclusions and run a low priority scan.
68
+
In the following example, the daily quick scan configuration is set to run at 885 minutes after midnight (2:45 p.m.). The weekly configuration is set to run a full scan on Wednesday at 880 minutes after midnight (2:40 p.m.). And it's set to ignore exclusions and run a low-priority scan.
70
69
71
-
The following code shows the schema you need to use to schedule scans according to the requirements above.
70
+
The following code shows the schema you need to use to schedule scans according to the requirements mentioned earlier.
72
71
73
72
1. Open a text editor and use this example as a guide for your own scheduled scan file.
74
73
75
-
#### For Intune:
74
+
#### For Intune
76
75
77
76
```XML
78
77
<?xml version="1.0" encoding="UTF-8"?>
79
78
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<string>Microsoft Defender for Endpoint configuration settings</string>
114
+
<key>PayloadDescription</key>
115
+
<string/>
116
+
<key>PayloadVersion</key>
117
+
<integer>1</integer>
118
+
<key>PayloadEnabled</key>
119
+
<true/>
120
+
<key>features</key>
121
+
<dict>
122
+
<key>scheduledScan</key>
123
+
<string>enabled</string>
124
+
</dict>
125
+
<key>scheduledScan</key>
126
+
<dict>
127
+
<key>ignoreExclusions</key>
128
+
<true/>
129
+
<key>lowPriorityScheduledScan</key>
130
+
<true/>
131
+
<key>dailyConfiguration</key>
132
+
<dict>
133
+
<key>timeOfDay</key>
134
+
<integer>880</integer>
135
+
</dict>
136
+
<key>weeklyConfiguration</key>
137
+
<dict>
138
+
<key>dayOfWeek</key>
139
+
<integer>4</integer>
140
+
<key>timeOfDay</key>
141
+
<integer>885</integer>
142
+
<key>scanType</key>
143
+
<string>full</string>
144
+
</dict>
145
+
</dict>
146
+
</dict>
147
+
</array>
147
148
</dict>
148
-
</plist>
149
+
</plist>
149
150
```
150
151
151
-
2. Save the file as _com.microsoft.wdav.mobileconfig_.
152
+
2. Save the file as `com.microsoft.wdav.mobileconfig`.
153
+
154
+
#### For JamF and other 3rd-party MDMs
152
155
153
-
#### For JamF and other 3rd-party MDMs:
154
156
```XML
155
157
<?xml version="1.0" encoding="UTF-8"?>
156
158
<!DOCTYPEplist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
@@ -186,7 +188,8 @@ The following code shows the schema you need to use to schedule scans according
186
188
</plist>
187
189
```
188
190
189
-
2. Save the file as _com.microsoft.wdav.plist_.
191
+
2. Save the file as `com.microsoft.wdav.plist`.
192
+
190
193
3. Check that the scheduled scan is configured via a "Set Preference"
191
194
192
195
```
@@ -195,7 +198,7 @@ The following code shows the schema you need to use to schedule scans according
195
198
196
199
In the results, you should be able to see [managed].
197
200
198
-
### Example 2: Schedule an hourly quick scan, a daily quick scan, and weekly full scan using a _plist_
201
+
### Example 2: Schedule an hourly quick scan, a daily quick scan, and weekly full scan using a plist
199
202
200
203
In the following example, an hourly quick scan will run every 6 hours, a daily quick scan configuration is set to run at 885 minutes after midnight (2:45 p.m.), and a weekly full scan will run on Wednesdays at 880 minutes after midnight (2:40 p.m).
201
204
@@ -277,9 +280,11 @@ In the following example, an hourly quick scan will run every 6 hours, a daily q
277
280
</dict>
278
281
</plist>
279
282
```
280
-
2. Save the file as _com.microsoft.wdav.mobileconfig_.
281
283
282
-
#### For JamF and other 3rd-party MDMs:
284
+
2. Save the file as `com.microsoft.wdav.mobileconfig`.
285
+
286
+
#### For JamF and other 3rd-party MDMs
287
+
283
288
1. Open a text editor and use this example.
284
289
285
290
```XML
@@ -319,7 +324,7 @@ In the following example, an hourly quick scan will run every 6 hours, a daily q
319
324
</plist>
320
325
```
321
326
322
-
2. Save the file as _com.microsoft.wdav.plist_.
327
+
2. Save the file as `com.microsoft.wdav.plist`.
323
328
324
329
3. Check that the scheduled scan is configured via a "Set Preference"
325
330
@@ -335,29 +340,29 @@ To enable scheduled scan feature:
335
340
336
341
|Version|Command|
337
342
|---|---|
338
-
| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan settings feature --value enabled` |
343
+
| Version 101.23122.x or later | `sudo mdatp config scheduled-scan settings feature --value enabled` |
339
344
340
345
To schedule hourly quick scans:
341
346
342
347
|Version|Command|
343
348
|---|---|
344
-
| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan quick-scan hourly-interval --value \<arg\>` |
349
+
| Version 101.23122.x or later | `sudo mdatp config scheduled-scan quick-scan hourly-interval --value \<arg\>` |
345
350
346
351
:::image type="content" source="media/schedule-scans-mac/schedule-scan-pic1.png" alt-text="Screenshot of schedule hourly scan.":::
347
352
348
353
To schedule daily quick scans:
349
354
350
355
|Version|Command|
351
356
|---|---|
352
-
| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan quick-scan time-of-day --value \<arg\>` |
357
+
| Version 101.23122.x or later | `sudo mdatp config scheduled-scan quick-scan time-of-day --value \<arg\>` |
353
358
354
359
:::image type="content" source="media/schedule-scans-mac/schedule-scan-pic2.png" alt-text="Screenshot of schedule daily quick scan.":::
355
360
356
361
To schedule weekly scans:
357
362
358
363
|Version|Command|
359
364
|---|---|
360
-
| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan weekly-scan --day-of-week \<arg\> --time-of-day \<arg\>--scan-type \<arg\>` |
365
+
| Version 101.23122.x or later | `sudo mdatp config scheduled-scan weekly-scan --day-of-week \<arg\> --time-of-day \<arg\>--scan-type \<arg\>` |
361
366
362
367
:::image type="content" source="media/schedule-scans-mac/schedule-scan-pic3.png" alt-text="Screenshot of schedule weekly scan.":::
0 commit comments