You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -85,9 +85,9 @@ Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid
85
85
|`com.microsoft.wdav.epsext`|`UBF8T346G9`|
86
86
|`com.microsoft.wdav.netext`|`UBF8T346G9`|
87
87
88
-
:::image type="content" alt-text="Screenshot showing allowed system extensions" source="media/mac-install-with-intune/image003.png" lightbox="media/mac-install-with-intune/image003.png":::
89
-
90
-
1. On the **Scopes** tab, (optional) select scope tags, then select **Next.**
88
+
```
89
+
:::image type="content" alt-text="Screenshot showing allowed system extensions" source="media/mac-install-with-intune/image003.png" lightbox="media/mac-install-with-intune/image003.png":::
90
+
```1. On the **Scopes** tab, (optional) select scope tags, then select **Next.**
91
91
92
92
1. On the **Assignments** tab, assign the profile to a group where the macOS devices or users are located, then select **Next**.
93
93
@@ -420,14 +420,10 @@ For more information about managing security settings, see:
420
420
> The Device Control setting is included in the MacOS Full disk access template created in step 3.
421
421
> For more information about Device Control for Microsoft Defender for Endpoint on macOS see [Device Control for MacOS](/defender-endpoint/mac-device-control-overview)
422
422
423
-
### Step 12: Microsoft Purview Data Loss Prevention (DLP) for Endpoint on MacOS (optional)
424
-
425
-
> [!NOTE]
426
-
> To deploy Microsoft Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Purview solutions using Intune for Microsoft Defender for Endpoint customers](/purview/device-onboarding-offboarding-macos-intune-mde)
427
-
428
-
To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
423
+
### Step 12: Publish the Microsoft Defender application
429
424
430
-
### Step 13: Publish application
425
+
> [!IMPORTANT]
426
+
> The Microsoft Defender app for macOS splits features for both Microsoft Defender for Endpoint and Microsoft Purview Endpoint Data Loss Prevention, if you are also planning to onboard MacOS devices to Purview (Step 18), ensure Device Monitoring is turned on **at this stage**. To enable Purview Device Monitoring on the [Microsoft Purview Portal](https://purview.microsoft.com) go to **Settings > Devices.**
431
427
432
428
This step enables deploying Microsoft Defender for Endpoint to enrolled machines.
433
429
@@ -456,180 +452,147 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
456
452
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
457
453
458
454
> [!IMPORTANT]
459
-
> You should create and deploy the configuration profiles in the order specified (steps 1-13) for a successful system configuration.
460
-
461
-
### Step 14: Check Device and Configuration status
462
-
463
-
> [!NOTE]
464
-
> After completing the profile configuration, once the Intune changes are propagated to the enrolled devices, you'll be able to review the status of the policies.
465
-
466
-
#### Step 14a. View Status
467
-
468
-
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
469
-
470
-
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
455
+
> You should create and deploy the configuration profiles in the order specified (steps 1-12) for a successful system configuration.
471
456
472
-
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
473
-
474
-
#### Step 13b. Client device setup
457
+
### Step 13: Download the Microsoft Defender for Endpoint onboarding package
475
458
459
+
To download the onboarding package from the Microsoft Defender portal:
476
460
461
+
1. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage), select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
477
462
478
-
1.Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
463
+
1. On the **Select operating system to start the onboarding process** drop-down, select **macOS.**
479
464
480
-
1.Confirm device management.
465
+
1. On the **Deployment method** drop-down, select **Mobile Device Management / Microsoft Intune**.
481
466
482
-

483
-
484
-
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
467
+
:::image type="content" source="../defender-endpoint/media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="../defender-endpoint/media/macos-install-with-intune.png":::
485
468
486
-

487
-
488
-
1. Select **Continue** and complete the enrollment.
469
+
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
489
470
490
-
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
471
+
1. Extract the contents of the .zip file:
491
472
492
-
3. In Intune, open **Manage**\>**Devices**\>**All devices**. Here you can see your device among the listed:
473
+
```bash
474
+
unzip WindowsDefenderATPOnboardingPackage.zip
475
+
```
493
476
494
-
:::image type="content" source="../defender-endpoint/media/mdatp-5-alldevices.png" alt-text="Screenshot that shows the All Devices page." lightbox="../defender-endpoint/media/mdatp-5-alldevices.png":::
477
+
```console
478
+
Archive: WindowsDefenderATPOnboardingPackage.zip
479
+
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
:::image type="content" source="../defender-endpoint/media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="../defender-endpoint/media/deploy-onboarding-package.png":::
497
486
498
-
1. After the configuration profiles are deployed to your devices, open System Settings > General __**General** > Device Management __on your Mac device.
487
+
### Step 14: Deploy the Microsoft Defender for Endpoint onboarding package for MacOS
499
488
500
-
1. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile and all the configuration profiles that were created above.
489
+
This profile contains license information for Microsoft Defender for Endpoint.
501
490
502
-
1.You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
491
+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
503
492
504
-

493
+
1. On the **Policies** tab, select **Create** > **New Policy**.
505
494
506
-
Step 13: Check Device and Configuration status
495
+
1. Under **Platform**, select **macOS**.
507
496
508
-
Note
497
+
1. Under **Profile type**, select **Templates**.
509
498
510
-
After completing the profile configuration, once the Intune changes are propagated to the enrolled devices, you'll be able to review the status of the policies.
499
+
1. Under **Template name**, select **Custom**.
511
500
512
-
Step 13a. View Status
501
+
1. Select **Create**.
513
502
514
-
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
503
+
1. On the **Basics** tab, **Name** the profile, (for example: MDE onboarding for macOS), and enter a **Description**, then select **Next**.
515
504
516
-
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
517
-
518
-
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
519
-
520
-
Step 13b. Client device setup
505
+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** **name.**
521
506
522
-
Note
507
+
1. Choose a **Deployment channel** and select **Next**.
523
508
524
-
While there are multiple ways to enroll MacOS devices to **Microsoft Intune**, a standard [Company Portal installation](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp) is sufficient for a Mac device. To install the Company Portal app [Download the Company Portal App](https://go.microsoft.com/fwlink/?linkid=853070). For more information see [Enrollment guide: Enroll macOS devices in Microsoft Intune](/intune/intune-service/fundamentals/deployment-guide-enrollment-macos)
509
+
1. Select the *WindowsDefenderATPOnboarding.xml* Configuration profile file created earlier, then select **Next.**
525
510
526
-
1. Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
527
-
528
-
1. Confirm device management.
529
-
530
-

531
-
532
-
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
533
-
534
-

535
-
536
-
1. Select **Continue** and complete the enrollment.
537
-
538
-
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
539
-
540
-
1. In Intune, open **Manage** > **Devices** > **All devices**. Here you can see your device among the listed:
541
-
542
-

543
-
544
-
Step 13c. Verify client device state
545
-
546
-
1. After the configuration profiles are deployed to your devices, open **System Settings** > **General > Device Management** on your Mac device.
547
-
548
-
1. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile and all the configuration profiles that were created above.
549
-
550
-
1. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
551
-
552
-

553
-
554
-
### Step 15: Download the onboarding package
511
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
555
512
556
-
To download the onboarding packages from Microsoft 365 Defender portal:
513
+
1. Review the configuration profile, then select **Create**.
557
514
558
-
1. In the Microsoft 365 Defender portal, go to **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
515
+
### Step 15: Check Device and Configuration status
559
516
560
-
2. Set the operating system to **macOS** and the deployment method to **Mobile Device Management / Microsoft Intune**.
561
517
562
-
:::image type="content" source="../defender-endpoint/media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="../defender-endpoint/media/macos-install-with-intune.png":::
563
518
564
-
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
519
+
#### Step 15a. View Status
565
520
566
-
4. Extract the contents of the .zip file:
521
+
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
567
522
568
-
```bash
569
-
unzip WindowsDefenderATPOnboardingPackage.zip
570
-
```
523
+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
571
524
572
-
```console
573
-
Archive: WindowsDefenderATPOnboardingPackage.zip
574
-
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
579
526
580
-
:::image type="content" source="../defender-endpoint/media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="../defender-endpoint/media/deploy-onboarding-package.png":::
527
+
#### Step 15b. Client device setup
581
528
582
-
### Step 16: Deploy the onboarding package
583
529
584
-
This profile contains license information for Microsoft Defender for Endpoint.
585
530
586
-
To deploy the onboarding package:
531
+
1. Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)

591
536
592
-
1. Under **Profile type**, select **Templates**.
537
+
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
593
538
594
-
1. Under **Template name**, select **Custom**.
539
+

595
540
596
-
1. Select **Create**.
541
+
1. Select **Continue** and complete the enrollment.
597
542
598
-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png" alt-text="Screenshot that shows the deployed onboarding package." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png":::
543
+
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
599
544
600
-
1.On the **Basics**tab,**Name** the profile. For example, `Onboarding-prod-macOS-Default-MDE`. Select **Next**.
545
+
1. In Intune, select **Devices** > **All devices**. Here you can see your device among the listed:
601
546
602
-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png" alt-text="Screenshot that shows the Custom page." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png":::
547
+

603
548
604
-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `WindowsDefenderATPOnboarding`.
549
+
#### Step 15c. Verify client device state
605
550
606
-
1.Choose a **Deployment channel** and select **Next**.
551
+
1. After the configuration profiles are deployed to your devices, open **System Settings > General > Device Management** on your MacOS device.
607
552
608
-
1.Select a **Configuration profile file**.
553
+
1. Verify that all the configuration profiles are present and installed:
609
554
610
-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png" alt-text="Screenshot that shows the configuration settings." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png":::
555
+
1. accessibility.mobileconfig
556
+
557
+
1. background_services.mobileconfig
558
+
559
+
1. bluetooth.mobileconfig
560
+
561
+
1. com.microsoft.autoupdate2.mobileconfig
562
+
563
+
1. fulldisk.mobileconfig
564
+
565
+
1. Management Profile (this is the Intune system profile)
566
+
567
+
1. WindowsDefenderATPOnboarding.xml (this is the MDE onboarding package for macOS)
568
+
569
+
1. netfilter.mobileconfig
570
+
571
+
1. notif.mobileconfig
572
+
573
+
1. You should also see the **Microsoft Defender** icon in the top-right corner.
611
574
612
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
575
+

613
576
614
-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png" alt-text="Screenshot that shows the Assignments tab." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png":::
577
+
### Step 16: Verify anti-malware detection
615
578
616
-
1. Review the configuration profile. Select **Create**.
579
+
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
617
580
618
-
1. Open **Devices** > **Configuration profiles** to see the created profile.
581
+
### Step 17: Verifying EDR detection
619
582
620
-
### Step 17: Verify anti-malware detection
583
+
See the following article to test for an EDR detection review: [EDR detection test for verifying device onboarding and reporting services](edr-detection.md)
621
584
622
-
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
585
+
### Step 18: Microsoft Purview Data Loss Prevention (DLP) for Endpoint on MacOS (strongly recommended)
623
586
624
-
### Step 18: Verifying EDR detection
625
587
626
-
See the following article to test for an EDR detection review: [EDR detection test for verifying device onboarding and reporting services](edr-detection.md)
627
588
628
589
## Troubleshooting
629
590
630
591
Issue: No license found.
631
592
632
-
Solution: Follow the steps in this article to create a device profile using WindowsDefenderATPOnboarding.xml.
593
+
Cause: Onboarding has not completed.
594
+
595
+
Resolution: Ensure you have completed steps 13 and 14 above.
0 commit comments