You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/tamperprotection-macos.md
+16-18Lines changed: 16 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,9 +34,9 @@ Tamper protection in macOS helps prevent unwanted changes to security settings f
34
34
> [!IMPORTANT]
35
35
> Starting March of 2023, Microsoft Defender for Endpoint on macOS respects the selection for tamper protection applied via the global tamper protection switch under advanced settings in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). You can choose to enforce (block/audit/disable) your own macOS tamper protection settings by using a Mobile Device Management (MDM) solution such as Intune or JAMF (recommended). If the tamper protection setting was not enforced via MDM, a local administrator can continue to manually change the setting with the following command: `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.
36
36
37
-
You can set Tamper Protection in the following modes:
37
+
You can set tamper protection in the following modes:
38
38
39
-
|Topic|Description|
39
+
|Article|Description|
40
40
|---|---|
41
41
|Disabled|Tamper protection is completely off.|
42
42
|Audit|Tampering operations are logged, but not blocked. This mode is the default after installation.|
@@ -74,8 +74,8 @@ You can configure the tamper protection mode by providing the mode name as enfor
74
74
75
75
## Before you begin
76
76
77
-
- Supported macOS versions: Big Sur (11), or later.
78
-
- Minimum required version for Defender for Endpoint: 101.70.19.
77
+
- Supported macOS versions: Big Sur (11), or later
78
+
- Minimum required version for Defender for Endpoint: `101.70.19`
79
79
80
80
> [!IMPORTANT]
81
81
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
@@ -89,22 +89,22 @@ You can configure the tamper protection mode by providing the mode name as enfor
89
89
> [!NOTE]
90
90
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
91
91
92
-
## Configure Tamper Protection on macOS devices
92
+
## Configure tamper protection on macOS devices
93
93
94
-
Microsoft Defender evaluates these settings in the following order.
95
-
If a higher priority setting is configured, the rest are ignored:
94
+
Microsoft Defender evaluates these settings in the following order. If a higher priority setting is configured, the rest are ignored:
3. If Tamper Protection flag in Security Portal is set, the "block" mode is used (in Preview, not available to all customers)
103
+
3. If tamper protection is enabled in the Microsoft Defender portal, "block" mode is used (in preview; not available to all customers).
104
104
105
-
4. If machine is licensed, then "audit" mode is used by default
105
+
4. If machine is licensed, then "audit" mode is used by default.
106
106
107
-
5. If machine isn't licensed, then Tamper Protection is in the "block" mode
107
+
5. If machine isn't licensed, then tamper protection is in the "block" mode
108
108
109
109
### Before you begin
110
110
@@ -406,20 +406,18 @@ Add the following configuration in your Intune [profile](mac-preferences.md#tamp
406
406
Tamper protection prevents any macOS process from making changes to Microsoft Defender's assets or stopping Microsoft Defender's processes. Protected assets include installation and configuration files.
407
407
408
408
Internally, Microsoft Defender makes exceptions to certain macOS processes, under certain circumstances.
409
-
As an example, macOS can upgrade Defender's package, if Tamper Protection verifies the packages authenticity.
409
+
As an example, macOS can upgrade Defender's package, if tamper protection verifies the packages authenticity.
410
410
There are other exclusions as well.
411
411
For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
412
412
413
413
There are situations when a Global Administrator needs to restart Defender on all or some managed machines.
414
414
Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
415
415
416
-
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune,
417
-
and permit tampering operations from them.
418
-
At the same time, Tamper Protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
416
+
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
419
417
420
418
However, those policy running processes are vendor specific.
421
419
While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
422
-
Instead, a Global Administrator can add their own exclusions to Tamper Protection.
420
+
Instead, a Global Administrator can add their own exclusions to tamper protection.
423
421
Exclusions can be done only through MDM profile, not local configuration.
424
422
425
423
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
-`tamper_protection` is the *effective* mode. If this mode is the mode you intended to use, then you're all set.
536
-
-`configuration_source` indicates how Tamper Protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
534
+
-`configuration_source` indicates how tamper protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
537
535
-`mdm` - it's configured through a managed profile. Only a Global Administrator can change it with an update to the profile!
538
536
-`local` - it's configured with `mdatp config` command
539
537
-`portal` - default enforcement level set in Security Portal
540
538
-`defaults` - not configured, the default mode is used
541
-
- If `feature_enabled_protection` is false, then Tamper Protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')
539
+
- If `feature_enabled_protection` is false, then tamper protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')
542
540
- If `feature_enabled_portal` is false, then setting default mode via Security Portal isn't enabled for you yet.
543
-
-`configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure Tamper Protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)
541
+
-`configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure tamper protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)
544
542
545
543
> [!NOTE]
546
544
> You need to inspect Microsoft Defender's logs to get the same information prior to version 101.98.71. See below for an example.
0 commit comments