You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+8-11Lines changed: 8 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
manager: deniseb
7
7
ms.service: defender-endpoint
8
8
ms.topic: overview
9
-
ms.date: 06/06/2025
9
+
ms.date: 06/27/2025
10
10
ms.subservice: ngp
11
11
audience: ITPro
12
12
ms.collection:
@@ -32,25 +32,22 @@ f1.keywords: NOCSH
32
32
- Microsoft Defender Antivirus
33
33
- Supported [versions of macOS](/defender-endpoint/microsoft-defender-endpoint-mac)
34
34
35
-
> [!IMPORTANT]
36
-
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
37
-
38
35
## Overview of behavior monitoring
39
36
40
37
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them.
41
38
42
39
## Prerequisites
43
40
44
41
- The device must be onboarded to Microsoft Defender for Endpoint.
45
-
-[Preview features](/defender-endpoint/preview) must be enabled in the [Microsoft Defender portal](https://security.microsoft.com).
46
-
- The device must be in the [Beta channel](/defender-endpoint/mac-updates) (formerly `InsiderFast`).
47
-
- The minimum Microsoft Defender for Endpoint version number must be Beta (Insiders-Fast): [101.24042.0002](/defender-endpoint/mac-whatsnew#may-2024-build-101240420008---release-version-2012404280) or newer. The version number refers to the `app_version` (also known as **Platform update**).
42
+
- For the best experience, Microsoft Defender should be up-to-date with the latest version.
43
+
- The minimum Microsoft Defender for Endpoint version number must be [101.25032.0006](/defender-endpoint/mac-whatsnew#apr-2025-build-101250320006---release-version-2012503260) or newer. The version number refers to the `app_version` (also known as **Platform update**).
48
44
- Real-time protection (RTP) must be enabled.
49
45
-[Cloud-delivered protection](/defender-endpoint/mac-preferences) must be enabled.
50
-
- The device must be explicitly enrolled in the preview program.
51
46
52
47
## Deployment instructions for behavior monitoring
53
48
49
+
Behavior Monitoring will soon be on by default. You can confirm your device’s enrollment status by checking the output of ***mdatp health --details features*** in your terminal. If not already enabled, you must configure it.
50
+
54
51
To deploy behavior monitoring in Microsoft Defender for Endpoint on macOS, you must change the behavior monitoring policy using one of the following methods:
55
52
56
53
-[Intune](#intune-deployment)
@@ -243,7 +240,7 @@ Once done, disable behavior monitoring statistics:
If the issue persists, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
243
+
If the issue persists, especially after a reboot, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
247
244
248
245
## Network real-time inspection for macOS
249
246
@@ -283,12 +280,12 @@ NRI should have a low impact on network performance. Instead of holding the conn
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.reviewer: pahuijbr
15
15
search.appverid: MET150
16
16
audience: ITPro
17
-
ms.date: 06/11/2025
17
+
ms.date: 06/27/2025
18
18
---
19
19
20
20
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -162,11 +162,11 @@ The following table lists the current static IP ranges covered by the MicrosoftD
162
162
163
163
Configure devices to communicate through your connectivity infrastructure. Ensure devices meet prerequisites and have updated sensor and Microsoft Defender Antivirus versions. For more information, see [Configure device proxy and Internet connection settings ](configure-proxy-internet.md).
For more information, see [Verify client connectivity](verify-connectivity.md).
168
168
169
-
The following preonboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
169
+
The following pre-onboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
170
170
171
171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+17-5Lines changed: 17 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: emmwalshh
6
6
ms.author: ewalsh
7
7
manager: deniseb
8
8
ms.localizationpriority: medium
9
-
ms.date: 06/13/2025
9
+
ms.date: 06/27/2025
10
10
audience: ITPro
11
11
ms.collection:
12
12
- m365-security
@@ -62,14 +62,25 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
62
62
63
63
## macOS Deprecation
64
64
65
-
- Microsoft Defender for Endpoint no longer supports Big Sur (11).
66
-
- macOS 12 (Monterey) won't be supported starting December 2024.
65
+
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur) and 12 (Monterey).
67
66
68
67
## Releases for Defender for Endpoint on macOS
69
68
70
-
### Behavior Monitoring for macOS is now in public preview
69
+
### Behavior Monitoring for macOS is now generally available
71
70
72
-
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
71
+
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
@@ -96,6 +107,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
96
107
97
108
- Hardware UUID is now displayed in the Security Portal
98
109
- Bug and performance fixes
110
+
-**(GA) Behavior Monitoring for macOS**: For information on Behavior Monitoring for Microsoft Defender for Endpoint on macOS, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: install-set-up-deploy
15
15
ms.subservice: onboard
16
16
search.appverid: met150
17
-
ms.date: 04/02/2025
17
+
ms.date: 06/27/2025
18
18
---
19
19
20
20
# Onboard servers through Microsoft Defender for Endpoint's onboarding experience
@@ -172,7 +172,7 @@ The following points apply to Windows Server 2016 and Windows Server 2012 R2:
172
172
173
173
- Not all attack surface reduction rules are applicable to all operating systems. See [Attack surface reduction rules](attack-surface-reduction-rules-reference.md).
174
174
175
-
- Operating system upgrades aren't supported. Offboard then uninstall before upgrading. The installer package can only be used to upgrade installations that haven't yet been updated with new anti-malware platform or EDR sensor update packages.
175
+
- Operating system upgrades are supported on Windows 10 and 11, and Windows Server 2019 or later. These versions include the necessary Defender for Endpoint components. For Windows Server 2016 and earlier, you must offboard from Defender for Endpoint and uninstall Defender for Endpoint before upgrading the OS.
176
176
177
177
- To automatically deploy and onboard the new solution using Microsoft Endpoint Configuration Manager (MECM) you need to be on [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016). You can still configure and deploy using version 2107 with the hotfix rollup, but this requires extra deployment steps. See [Microsoft Endpoint Configuration Manager migration scenarios](server-migration.md#microsoft-endpoint-configuration-manager-migration-scenarios) for more information.
[](media/analyzer-commands.png#lightbox)
67
67
68
-
68
+
69
69
### Additional information
70
70
71
71
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
@@ -108,24 +108,24 @@ The following script performs the first six steps of the [Running the Binary ver
echo"MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
126
-
126
+
127
127
```
128
-
128
+
129
129
#### Python Client Analyzer Install Script
130
130
131
131
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](/defender-endpoint/overview-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
0 commit comments