Skip to content

Commit bcc49e3

Browse files
committed
Update tamperprotection-macos.md
1 parent 79feec0 commit bcc49e3

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,11 @@ You can configure the tamper protection mode by providing the mode name as enfor
7474
7575
## Before you begin
7676

77+
Make sure that the following requirements are met:
78+
7779
- Supported macOS versions: Big Sur (11), or later
7880
- Minimum required version for Defender for Endpoint: `101.70.19`
81+
- You have an appropriate role assigned (see [Create and manage roles for role-based access control](user-roles.md))
7982

8083
> [!IMPORTANT]
8184
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
@@ -497,7 +500,7 @@ Configure [preferences](mac-preferences.md#exclusions), for example for JAMF:
497500
</plist>
498501
```
499502

500-
Note, that excluding a scripting interpreter (like Ruby from the example above) instead of a compiled executable isn't secure, as it can run *any script*, not just the one that a Global Administrator uses.
503+
Note, that excluding a scripting interpreter (like Ruby from the example above) instead of a compiled executable isn't secure, as it can run *any script*, not just the one that a Security Administrator uses.
501504

502505
To minimize the risk, we recommend using extra `args` to allow only specific scripts to run with scripting interpreters.
503506
In the example above, only `/usr/bin/ruby /usr/local/bin/global_mdatp_restarted.rb` is permitted to restart Defender.
@@ -530,7 +533,7 @@ configuration_is_managed : false
530533

531534
- `tamper_protection` is the *effective* mode. If this mode is the mode you intended to use, then you're all set.
532535
- `configuration_source` indicates how tamper protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
533-
- `mdm` - it's configured through a managed profile. Only a Global Administrator can change it with an update to the profile!
536+
- `mdm` - it's configured through a managed profile. Only a Security Administrator can change it with an update to the profile!
534537
- `local` - it's configured with `mdatp config` command
535538
- `portal` - default enforcement level set in Security Portal
536539
- `defaults` - not configured, the default mode is used

0 commit comments

Comments
 (0)