Skip to content

Commit b6bcd32

Browse files
authored
Merge branch 'public' into patch-1
2 parents c75ffa4 + 546e116 commit b6bcd32

File tree

2 files changed

+40
-30
lines changed

2 files changed

+40
-30
lines changed

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 22 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/20/2024
17+
ms.date: 08/26/2024
1818
---
1919

2020
# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
@@ -31,7 +31,10 @@ Use this article to set up policies for Defender for Endpoint on Mac using Jamf
3131

3232
## Step 1: Get the Microsoft Defender for Endpoint onboarding package
3333

34-
1. In [Microsoft Defender XDR](https://security.microsoft.com), navigate to **Settings > Endpoints > Onboarding**.
34+
> [!IMPORTANT]
35+
> You must have an appropriate role assigned to view, manage, and onboard devices. For more information, see [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](/defender-xdr/m365d-permissions#manage-access-to-microsoft-defender-xdr-with-microsoft-entra-global-roles).
36+
37+
1. In the [Microsoft Defender Portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Onboarding**.
3538

3639
2. Select macOS as the operating system and Mobile Device Management / Microsoft Intune as the deployment method.
3740

@@ -53,7 +56,7 @@ Use this article to set up policies for Defender for Endpoint on Mac using Jamf
5356

5457
:::image type="content" source="media/jamf-pro-configure-profile.png" alt-text="The page on which you create a new Jamf Pro dashboard." lightbox="media/jamf-pro-configure-profile.png":::
5558

56-
3. Enter the following details in the **General** tab:
59+
3. On the **General** tab, specify the following details:
5760

5861
- **Name**: `MDE onboarding for macOS`
5962
- **Description**: `MDE EDR onboarding for macOS`
@@ -144,7 +147,7 @@ Note that you must use exact `com.microsoft.wdav` as the **Preference Domain**;
144147
curl -o ~/Documents/schema.json https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/schema/schema.json
145148
```
146149

147-
2. Create a new configuration profile. Under **Computers**, go to **Configuration Profiles**, and then specify the following details on the **General** tab:
150+
2. Create a new configuration profile. Under **Computers**, go to **Configuration Profiles**, and then, on the **General** tab, specify the following details:
148151

149152
:::image type="content" source="media/644e0f3af40c29e80ca1443535b2fe32.png" alt-text="A new profile." lightbox="media/644e0f3af40c29e80ca1443535b2fe32.png":::
150153

@@ -325,7 +328,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
325328
326329
:::image type="content" source="media/644e0f3af40c29e80ca1443535b2fe32.png" alt-text="The page displaying a new profile." lightbox="media/644e0f3af40c29e80ca1443535b2fe32.png":::
327330
328-
4. Enter the following details on the **General** tab:
331+
4. On the **General** tab, specify the following details:
329332
330333
- **Name**: `MDATP MDAV configuration settings`
331334
- **Description**: `<blank>`
@@ -394,11 +397,12 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
394397
395398
## Step 4: Configure notifications settings
396399
397-
These steps are applicable on macOS 11 (Big Sur) or later.
400+
> [!NOTE]
401+
> These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
398402
399403
1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
400404
401-
2. Select **New**, and enter the following details in the **General** tab for **Options**:
405+
2. Select **New**, and then, on the **General** tab, for **Options**, specify the following details:
402406
403407
- **Name**: `MDATP MDAV Notification settings`
404408
- **Description**: `macOS 11 (Big Sur) or later`
@@ -408,7 +412,7 @@ These steps are applicable on macOS 11 (Big Sur) or later.
408412
409413
:::image type="content" source="media/c9820a5ff84aaf21635c04a23a97ca93.png" alt-text="The new macOS configuration profile page." lightbox="media/c9820a5ff84aaf21635c04a23a97ca93.png":::
410414
411-
- Tab **Notifications**, select **Add**, and enter the following values:
415+
- On the **Notifications** tab, select **Add**, and specify the following values:
412416
- **Bundle ID**: `com.microsoft.wdav.tray`
413417
- **Critical Alerts**: Select **Disable**
414418
- **Notifications**: Select **Enable**
@@ -419,7 +423,7 @@ These steps are applicable on macOS 11 (Big Sur) or later.
419423
420424
:::image type="content" source="media/7f9138053dbcbf928e5182ee7b295ebe.png" alt-text="The configuration settings mdatpmdav notifications tray." lightbox="media/7f9138053dbcbf928e5182ee7b295ebe.png":::
421425
422-
- Tab **Notifications**, select **Add** one more time, scroll down to **New Notifications Settings**
426+
- On the **Notifications** tab, select **Add** one more time, and then scroll down to **New Notifications Settings**
423427
- **Bundle ID**: `com.microsoft.autoupdate.fba`
424428
- Configure the rest of the settings to the same values mentioned earlier
425429
@@ -472,7 +476,7 @@ These steps are applicable on macOS 11 (Big Sur) or later.
472476

473477
:::image type="content" source="media/eaba2a23dd34f73bf59e826217ba6f15.png" alt-text="The configuration settings." lightbox="media/eaba2a23dd34f73bf59e826217ba6f15.png":::
474478

475-
4. Enter the following details on the **General** tab:
479+
4. On the **General** tab, specify the following details:
476480

477481
- **Name**: `MDATP MDAV MAU settings`
478482
- **Description**: `Microsoft AutoUpdate settings for MDATP for macOS`
@@ -531,7 +535,7 @@ These steps are applicable on macOS 11 (Big Sur) or later.
531535

532536
2. Select **+ New**.
533537

534-
3. Enter the following details on the **General** tab:
538+
3. On the **General** tab, specify the following details:
535539

536540
- **Name**: `MDATP MDAV - grant Full Disk Access to EDR and AV`
537541
- **Description**: `On macOS 11 (Big Sur) or later, the new Privacy Preferences Policy Control`
@@ -619,7 +623,7 @@ Alternatively, you can download [fulldisk.mobileconfig](https://github.com/micro
619623

620624
:::image type="content" source="media/6c8b406ee224335a8c65d06953dc756e.png" alt-text="The automatically generated social media post's description." lightbox="media/6c8b406ee224335a8c65d06953dc756e.png":::
621625

622-
2. Enter the following details on the **General** tab:
626+
2. On the **General** tab, specify the following details:
623627

624628
- **Name**: `MDATP MDAV System Extensions`
625629
- **Description**: `MDATP system extensions`
@@ -666,22 +670,23 @@ Alternatively, you can download [fulldisk.mobileconfig](https://github.com/micro
666670

667671
## Step 8: Configure Network Extension
668672

669-
As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal. The following policy allows the network extension to perform this functionality.
673+
As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal.
670674

671-
These steps are applicable on macOS 11 (Big Sur) or later.
675+
> [!NOTE]
676+
> These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.
672677

673678
1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
674679

675680
2. Select **New**, and enter the following details for **Options**:
676681

677-
- Tab **General**:
682+
- On the **General** tab, specify the following values:
678683
- **Name**: `Microsoft Defender Network Extension`
679684
- **Description**: `macOS 11 (Big Sur) or later`
680685
- **Category**: `None *(default)*`
681686
- **Distribution Method**: `Install Automatically *(default)*`
682687
- **Level**: `Computer Level *(default)*`
683688

684-
- Tab **Content Filter**:
689+
- On the **Content Filter** tab, specify the following values:
685690
- **Filter Name**: `Microsoft Defender Content Filter`
686691
- **Identifier**: `com.microsoft.wdav`
687692
- Leave **Service Address**, **Organization**, **User Name**, **Password**, **Certificate** blank (**Include** is *not* selected)
@@ -793,7 +798,7 @@ Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint
793798

794799
:::image type="content" source="media/57aa4d21e2ccc65466bf284701d4e961.png" alt-text="The bird Description for an automatically generated package." lightbox="media/57aa4d21e2ccc65466bf284701d4e961.png":::
795800

796-
6. In the **General tab**, enter the following details in **New Package**:
801+
6. On the **General tab**, in **New Package**, specify the following details:
797802

798803
- **Display Name**: Leave it blank for now. Because it is reset when you choose your pkg.
799804
- **Category**: `None (default)`

defender-xdr/data-privacy.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Microsoft Defender XDR data security and privacy
2+
title: Data retention and data security in Microsoft Defender XDR
33
description: Describes the privacy and data security of the service.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
77
ms.author: macapara
8-
author: mjcaparas
8+
author: diannegali
99
ms.localizationpriority: medium
1010
manager: dansimp
1111
audience: ITPro
@@ -19,25 +19,30 @@ ms.topic: conceptual
1919
search.appverid:
2020
- MOE150
2121
- MET150
22-
ms.date: 08/12/2024
22+
ms.date: 08/19/2024
23+
appliesto: Microsoft Defender XDR
2324
---
2425

25-
# Microsoft Defender XDR data security and privacy
26+
# Data security and retention in Microsoft Defender XDR
2627

2728
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2829

30+
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, and Switzerland. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
2931

30-
**Applies to:**
31-
- Microsoft Defender XDR
32+
Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
3233

33-
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, and India. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
34+
The table below shows the general information on the data retention of specific service sources in Defender XDR:
3435

35-
Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
36+
|Product|Default data retention period|More information|
37+
|:---|:---|:---|
38+
|Microsoft Defender for Endpoint|180 days|[Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
39+
|Microsoft Defender for Office 365|Varies according to feature and license|[Defender for Office 365 data retention information](/defender-office-365/mdo-data-retention)|
40+
|Microsoft Defender for Identity|180 days|[Defender for Identity data storage and privacy](/defender-for-identity/privacy-compliance)|
41+
|Microsoft Defender for Cloud Apps|180 days|[Defender for Cloud Apps data storage and privacy](/defender-cloud-apps/cas-compliance-trust)|
42+
|Microsoft Entra|Varies according to feature and license|[Microsoft Entra data storage and privacy](/entra/identity/monitoring-health/reference-reports-data-retention)|
43+
|Microsoft Sentinel|90 days for Basic logs, varies depending on pricing|[Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/)|
3644

37-
For more information on the data storage and privacy information of the specific products, see:
38-
- [Microsoft Defender for Endpoint data storage and privacy](/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy)
39-
- [Microsoft Defender for Cloud Apps data security and privacy](/cloud-app-security/cas-compliance-trust)
40-
- [Microsoft Defender for Identity data security and privacy](/defender-for-identity/privacy-compliance)
41-
- [Microsoft 365 privacy, security, and transparency](/office365/servicedescriptions/office-365-platform-service-description/privacy-security-and-transparency#advanced-threat-protection)
45+
> [!NOTE]
46+
> [Advanced hunting](advanced-hunting-overview.md) lets you query up to 30 days of raw data.
4247
4348
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)