Skip to content

Commit b379a30

Browse files
committed
Update tamperprotection-macos.md
1 parent 81baa50 commit b379a30

File tree

1 file changed

+16
-18
lines changed

1 file changed

+16
-18
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ Tamper protection in macOS helps prevent unwanted changes to security settings f
3434
> [!IMPORTANT]
3535
> Starting March of 2023, Microsoft Defender for Endpoint on macOS respects the selection for tamper protection applied via the global tamper protection switch under advanced settings in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). You can choose to enforce (block/audit/disable) your own macOS tamper protection settings by using a Mobile Device Management (MDM) solution such as Intune or JAMF (recommended). If the tamper protection setting was not enforced via MDM, a local administrator can continue to manually change the setting with the following command: `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.
3636
37-
You can set Tamper Protection in the following modes:
37+
You can set tamper protection in the following modes:
3838

39-
|Topic|Description|
39+
|Article|Description|
4040
|---|---|
4141
|Disabled|Tamper protection is completely off.|
4242
|Audit|Tampering operations are logged, but not blocked. This mode is the default after installation.|
@@ -74,8 +74,8 @@ You can configure the tamper protection mode by providing the mode name as enfor
7474
7575
## Before you begin
7676

77-
- Supported macOS versions: Big Sur (11), or later.
78-
- Minimum required version for Defender for Endpoint: 101.70.19.
77+
- Supported macOS versions: Big Sur (11), or later
78+
- Minimum required version for Defender for Endpoint: `101.70.19`
7979

8080
> [!IMPORTANT]
8181
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
@@ -89,22 +89,22 @@ You can configure the tamper protection mode by providing the mode name as enfor
8989
> [!NOTE]
9090
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
9191
92-
## Configure Tamper Protection on macOS devices
92+
## Configure tamper protection on macOS devices
9393

94-
Microsoft Defender evaluates these settings in the following order.
95-
If a higher priority setting is configured, the rest are ignored:
94+
Microsoft Defender evaluates these settings in the following order. If a higher priority setting is configured, the rest are ignored:
9695

9796
1. Managed configuration profile (tamperProtection/enforcementLevel setting):
97+
9898
- [JAMF](#jamf)
9999
- [Intune](#intune)
100100

101101
2. [Manual configuration](#manual-configuration) (with `mdatp config tamper-protection enforcement-level --value { disabled|audit|block }`)
102102

103-
3. If Tamper Protection flag in Security Portal is set, the "block" mode is used (in Preview, not available to all customers)
103+
3. If tamper protection is enabled in the Microsoft Defender portal, "block" mode is used (in preview; not available to all customers).
104104

105-
4. If machine is licensed, then "audit" mode is used by default
105+
4. If machine is licensed, then "audit" mode is used by default.
106106

107-
5. If machine isn't licensed, then Tamper Protection is in the "block" mode
107+
5. If machine isn't licensed, then tamper protection is in the "block" mode
108108

109109
### Before you begin
110110

@@ -406,20 +406,18 @@ Add the following configuration in your Intune [profile](mac-preferences.md#tamp
406406
Tamper protection prevents any macOS process from making changes to Microsoft Defender's assets or stopping Microsoft Defender's processes. Protected assets include installation and configuration files.
407407

408408
Internally, Microsoft Defender makes exceptions to certain macOS processes, under certain circumstances.
409-
As an example, macOS can upgrade Defender's package, if Tamper Protection verifies the packages authenticity.
409+
As an example, macOS can upgrade Defender's package, if tamper protection verifies the packages authenticity.
410410
There are other exclusions as well.
411411
For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
412412

413413
There are situations when a Global Administrator needs to restart Defender on all or some managed machines.
414414
Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
415415

416-
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune,
417-
and permit tampering operations from them.
418-
At the same time, Tamper Protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
416+
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
419417

420418
However, those policy running processes are vendor specific.
421419
While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
422-
Instead, a Global Administrator can add their own exclusions to Tamper Protection.
420+
Instead, a Global Administrator can add their own exclusions to tamper protection.
423421
Exclusions can be done only through MDM profile, not local configuration.
424422

425423
To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
@@ -533,14 +531,14 @@ configuration_is_managed : false
533531
```
534532

535533
- `tamper_protection` is the *effective* mode. If this mode is the mode you intended to use, then you're all set.
536-
- `configuration_source` indicates how Tamper Protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
534+
- `configuration_source` indicates how tamper protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
537535
- `mdm` - it's configured through a managed profile. Only a Global Administrator can change it with an update to the profile!
538536
- `local` - it's configured with `mdatp config` command
539537
- `portal` - default enforcement level set in Security Portal
540538
- `defaults` - not configured, the default mode is used
541-
- If `feature_enabled_protection` is false, then Tamper Protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')
539+
- If `feature_enabled_protection` is false, then tamper protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')
542540
- If `feature_enabled_portal` is false, then setting default mode via Security Portal isn't enabled for you yet.
543-
- `configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure Tamper Protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)
541+
- `configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure tamper protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)
544542

545543
> [!NOTE]
546544
> You need to inspect Microsoft Defender's logs to get the same information prior to version 101.98.71. See below for an example.

0 commit comments

Comments
 (0)