Skip to content

Commit b327326

Browse files
Learn Editor: Update mac-install-with-intune.md
1 parent f212d8d commit b327326

File tree

1 file changed

+86
-123
lines changed

1 file changed

+86
-123
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 86 additions & 123 deletions
Original file line numberDiff line numberDiff line change
@@ -85,9 +85,9 @@ Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid
8585
|`com.microsoft.wdav.epsext`|`UBF8T346G9`|
8686
|`com.microsoft.wdav.netext`|`UBF8T346G9`|
8787

88-
:::image type="content" alt-text="Screenshot showing allowed system extensions" source="media/mac-install-with-intune/image003.png" lightbox="media/mac-install-with-intune/image003.png":::
89-
90-
1. On the **Scopes** tab, (optional) select scope tags, then select **Next.**
88+
```
89+
:::image type="content" alt-text="Screenshot showing allowed system extensions" source="media/mac-install-with-intune/image003.png" lightbox="media/mac-install-with-intune/image003.png":::
90+
```1. On the **Scopes** tab, (optional) select scope tags, then select **Next.**
9191
9292
1. On the **Assignments** tab, assign the profile to a group where the macOS devices or users are located, then select **Next**.
9393
@@ -420,14 +420,10 @@ For more information about managing security settings, see:
420420
> The Device Control setting is included in the MacOS Full disk access template created in step 3.
421421
> For more information about Device Control for Microsoft Defender for Endpoint on macOS see [Device Control for MacOS](/defender-endpoint/mac-device-control-overview)
422422
423-
### Step 12: Microsoft Purview Data Loss Prevention (DLP) for Endpoint on MacOS (optional)
424-
425-
> [!NOTE]
426-
> To deploy Microsoft Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Purview solutions using Intune for Microsoft Defender for Endpoint customers](/purview/device-onboarding-offboarding-macos-intune-mde)
427-
428-
To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
423+
### Step 12: Publish the Microsoft Defender application
429424
430-
### Step 13: Publish application
425+
> [!IMPORTANT]
426+
> The Microsoft Defender app for macOS splits features for both Microsoft Defender for Endpoint and Microsoft Purview Endpoint Data Loss Prevention, if you are also planning to onboard MacOS devices to Purview (Step 18), ensure Device Monitoring is turned on **at this stage**. To enable Purview Device Monitoring on the [Microsoft Purview Portal](https://purview.microsoft.com) go to **Settings > Devices.**
431427
432428
This step enables deploying Microsoft Defender for Endpoint to enrolled machines.
433429
@@ -456,180 +452,147 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
456452
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
457453
458454
> [!IMPORTANT]
459-
> You should create and deploy the configuration profiles in the order specified (steps 1-13) for a successful system configuration.
460-
461-
### Step 14: Check Device and Configuration status
462-
463-
> [!NOTE]
464-
> After completing the profile configuration, once the Intune changes are propagated to the enrolled devices, you'll be able to review the status of the policies.
465-
466-
#### Step 14a. View Status
467-
468-
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
469-
470-
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
455+
> You should create and deploy the configuration profiles in the order specified (steps 1-12) for a successful system configuration.
471456
472-
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
473-
474-
#### Step 13b. Client device setup
457+
### Step 13: Download the Microsoft Defender for Endpoint onboarding package
475458
459+
To download the onboarding package from the Microsoft Defender portal:
476460
461+
1. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage), select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
477462
478-
1. Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
463+
1. On the **Select operating system to start the onboarding process** drop-down, select **macOS.**
479464
480-
1. Confirm device management.
465+
1. On the **Deployment method** drop-down, select **Mobile Device Management / Microsoft Intune**.
481466
482-
![Screenshot that shows the Confirmed device management page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-3-confirmdevicemgmt.png)
483-
484-
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
467+
:::image type="content" source="../defender-endpoint/media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="../defender-endpoint/media/macos-install-with-intune.png":::
485468
486-
![Screenshot that shows the Management profile page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-4-managementprofile.png)
487-
488-
1. Select **Continue** and complete the enrollment.
469+
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
489470
490-
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
471+
1. Extract the contents of the .zip file:
491472
492-
3. In Intune, open **Manage** \> **Devices** \> **All devices**. Here you can see your device among the listed:
473+
```bash
474+
unzip WindowsDefenderATPOnboardingPackage.zip
475+
```
493476

494-
:::image type="content" source="../defender-endpoint/media/mdatp-5-alldevices.png" alt-text="Screenshot that shows the All Devices page." lightbox="../defender-endpoint/media/mdatp-5-alldevices.png":::
477+
```console
478+
Archive: WindowsDefenderATPOnboardingPackage.zip
479+
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
480+
inflating: intune/kext.xml
481+
inflating: intune/WindowsDefenderATPOnboarding.xml
482+
inflating: jamf/WindowsDefenderATPOnboarding.plist
483+
```
495484
496-
#### Step 13c. Verify client device state
485+
:::image type="content" source="../defender-endpoint/media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="../defender-endpoint/media/deploy-onboarding-package.png":::
497486
498-
1. After the configuration profiles are deployed to your devices, open System Settings > General __**General** > Device Management __on your Mac device.
487+
### Step 14: Deploy the Microsoft Defender for Endpoint onboarding package for MacOS
499488
500-
1. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile and all the configuration profiles that were created above.
489+
This profile contains license information for Microsoft Defender for Endpoint.
501490
502-
1. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
491+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
503492
504-
![Screenshot that shows the icon for Microsoft Defender for Endpoint in the status bar.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-icon-bar.png)
493+
1. On the **Policies** tab, select **Create** > **New Policy**.
505494
506-
Step 13: Check Device and Configuration status
495+
1. Under **Platform**, select **macOS**.
507496
508-
Note
497+
1. Under **Profile type**, select **Templates**.
509498
510-
After completing the profile configuration, once the Intune changes are propagated to the enrolled devices, you'll be able to review the status of the policies.
499+
1. Under **Template name**, select **Custom**.
511500
512-
Step 13a. View Status
501+
1. Select **Create**.
513502
514-
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
503+
1. On the **Basics** tab, **Name** the profile, (for example: MDE onboarding for macOS), and enter a **Description**, then select **Next**.
515504
516-
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
517-
518-
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
519-
520-
Step 13b. Client device setup
505+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** **name.**
521506
522-
Note
507+
1. Choose a **Deployment channel** and select **Next**.
523508
524-
While there are multiple ways to enroll MacOS devices to **Microsoft Intune**, a standard [Company Portal installation](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp) is sufficient for a Mac device. To install the Company Portal app [Download the Company Portal App](https://go.microsoft.com/fwlink/?linkid=853070). For more information see [Enrollment guide: Enroll macOS devices in Microsoft Intune](/intune/intune-service/fundamentals/deployment-guide-enrollment-macos)
509+
1. Select the *WindowsDefenderATPOnboarding.xml* Configuration profile file created earlier, then select **Next.**
525510
526-
1. Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
527-
528-
1. Confirm device management.
529-
530-
![Screenshot that shows the Confirmed device management page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-3-confirmdevicemgmt.png)
531-
532-
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
533-
534-
![Screenshot that shows the Management profile page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-4-managementprofile.png)
535-
536-
1. Select **Continue** and complete the enrollment.
537-
538-
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
539-
540-
1. In Intune, open **Manage** > **Devices** > **All devices**. Here you can see your device among the listed:
541-
542-
![Screenshot that shows the All Devices page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-5-alldevices.png)
543-
544-
Step 13c. Verify client device state
545-
546-
1. After the configuration profiles are deployed to your devices, open **System Settings** > **General > Device Management** on your Mac device.
547-
548-
1. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile and all the configuration profiles that were created above.
549-
550-
1. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
551-
552-
![Screenshot that shows the icon for Microsoft Defender for Endpoint in the status bar.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-icon-bar.png)
553-
554-
### Step 15: Download the onboarding package
511+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, then select **Next**.
555512
556-
To download the onboarding packages from Microsoft 365 Defender portal:
513+
1. Review the configuration profile, then select **Create**.
557514
558-
1. In the Microsoft 365 Defender portal, go to **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
515+
### Step 15: Check Device and Configuration status
559516
560-
2. Set the operating system to **macOS** and the deployment method to **Mobile Device Management / Microsoft Intune**.
561517
562-
:::image type="content" source="../defender-endpoint/media/macos-install-with-intune.png" alt-text="Screenshot that shows the Onboarding settings page." lightbox="../defender-endpoint/media/macos-install-with-intune.png":::
563518
564-
3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
519+
#### Step 15a. View Status
565520
566-
4. Extract the contents of the .zip file:
521+
There are multiple ways to look at this information in the [Microsoft Intune admin center](https://intune.microsoft.com/#home), including monitoring and reports per device, user, configuration policies and more. Here's an example:
567522
568-
```bash
569-
unzip WindowsDefenderATPOnboardingPackage.zip
570-
```
523+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
571524
572-
```console
573-
Archive: WindowsDefenderATPOnboardingPackage.zip
574-
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
575-
inflating: intune/kext.xml
576-
inflating: intune/WindowsDefenderATPOnboarding.xml
577-
inflating: jamf/WindowsDefenderATPOnboarding.plist
578-
```
525+
1. On the **Policies** tab select a policy, then on the **Device and user check-in status** select **View Report**.
579526
580-
:::image type="content" source="../defender-endpoint/media/deploy-onboarding-package.png" alt-text="Screenshot that shows the sample description." lightbox="../defender-endpoint/media/deploy-onboarding-package.png":::
527+
#### Step 15b. Client device setup
581528
582-
### Step 16: Deploy the onboarding package
583529
584-
This profile contains license information for Microsoft Defender for Endpoint.
585530
586-
To deploy the onboarding package:
531+
1. Follow the steps outlined in [Enroll your macOS device using the Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp)
587532
588-
1. Under **Configuration profiles**, select **Create Profile**.
533+
1. Confirm device management.
589534
590-
1. Under **Platform**, select **macOS**.
535+
![Screenshot that shows the Confirmed device management page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-3-confirmdevicemgmt.png)
591536
592-
1. Under **Profile type**, select **Templates**.
537+
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
593538
594-
1. Under **Template name**, select **Custom**.
539+
![Screenshot that shows the Management profile page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-4-managementprofile.png)
595540
596-
1. Select **Create**.
541+
1. Select **Continue** and complete the enrollment.
597542
598-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png" alt-text="Screenshot that shows the deployed onboarding package." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-1.png":::
543+
You might now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
599544
600-
1. On the **Basics** tab, **Name** the profile. For example, `Onboarding-prod-macOS-Default-MDE`. Select **Next**.
545+
1. In Intune, select **Devices** > **All devices**. Here you can see your device among the listed:
601546
602-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png" alt-text="Screenshot that shows the Custom page." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-2.png":::
547+
![Screenshot that shows the All Devices page.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/pr/defender-endpoint/media/mdatp-5-alldevices.png)
603548
604-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `WindowsDefenderATPOnboarding`.
549+
#### Step 15c. Verify client device state
605550
606-
1. Choose a **Deployment channel** and select **Next**.
551+
1. After the configuration profiles are deployed to your devices, open **System Settings > General > Device Management** on your MacOS device.
607552
608-
1. Select a **Configuration profile file**.
553+
1. Verify that all the configuration profiles are present and installed:
609554
610-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png" alt-text="Screenshot that shows the configuration settings." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png":::
555+
1. accessibility.mobileconfig
556+
557+
1. background_services.mobileconfig
558+
559+
1. bluetooth.mobileconfig
560+
561+
1. com.microsoft.autoupdate2.mobileconfig
562+
563+
1. fulldisk.mobileconfig
564+
565+
1. Management Profile (this is the Intune system profile)
566+
567+
1. WindowsDefenderATPOnboarding.xml (this is the MDE onboarding package for macOS)
568+
569+
1. netfilter.mobileconfig
570+
571+
1. notif.mobileconfig
572+
573+
1. You should also see the **Microsoft Defender** icon in the top-right corner.
611574
612-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
575+
![Screenshot that shows the icon for Microsoft Defender for Endpoint in the status bar.](https://review.learn.microsoft.com/en-us/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmac-install-with-intune.md/main/defender-endpoint/media/mdatp-icon-bar.png)
613576
614-
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png" alt-text="Screenshot that shows the Assignments tab." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png":::
577+
### Step 16: Verify anti-malware detection
615578
616-
1. Review the configuration profile. Select **Create**.
579+
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
617580
618-
1. Open **Devices** > **Configuration profiles** to see the created profile.
581+
### Step 17: Verifying EDR detection
619582
620-
### Step 17: Verify anti-malware detection
583+
See the following article to test for an EDR detection review: [EDR detection test for verifying device onboarding and reporting services](edr-detection.md)
621584
622-
See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
585+
### Step 18: Microsoft Purview Data Loss Prevention (DLP) for Endpoint on MacOS (strongly recommended)
623586
624-
### Step 18: Verifying EDR detection
625587
626-
See the following article to test for an EDR detection review: [EDR detection test for verifying device onboarding and reporting services](edr-detection.md)
627588
628589
## Troubleshooting
629590
630591
Issue: No license found.
631592
632-
Solution: Follow the steps in this article to create a device profile using WindowsDefenderATPOnboarding.xml.
593+
Cause: Onboarding has not completed.
594+
595+
Resolution: Ensure you have completed steps 13 and 14 above.
633596
634597
## Logging installation issues
635598

0 commit comments

Comments
 (0)