Skip to content

Commit be358f2

Browse files
committed
Update mac-install-with-intune.md
1 parent 46d6328 commit be358f2

File tree

1 file changed

+13
-45
lines changed

1 file changed

+13
-45
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 13 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -71,11 +71,9 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
7171

7272
1. Select **Create**.
7373

74-
1. On the **Basics** tab, **Name** the profile and enter a **Description.**
74+
1. On the **Basics** tab, **Name** the profile and enter a **Description.** Then select **Next**.
7575

76-
1. Select **Next**.
77-
78-
1. On the **Configuration settings tab,** select **+Add settings.**
76+
1. On the **Configuration settings tab,** select **+ Add settings.**
7977

8078
1. Under **Template name**, select **Extensions**.
8179

@@ -85,7 +83,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
8583

8684
1. Close the Settings picker, and then select **+ Edit instance**.
8785

88-
1. Configure the following entries in the **Allowed system extensions** section:
86+
1. Configure the following entries in the **Allowed system extensions** section, and then select **Next**.
8987

9088
|Allowed System Extensions|Team Identifier|
9189
|---|---|
@@ -94,8 +92,6 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
9492

9593
![Screenshot showing allowed system extensions](media/mac-install-with-intune/image003.png)
9694

97-
1. Select **Next**.
98-
9995
1. On the **Assignments** tab, assign the profile to a group where the macOS devices or users are located.
10096

10197
1. Review the configuration profile. Select **Create**.
@@ -121,17 +117,13 @@ To configure your network filter:
121117

122118
1. Select **Create**.
123119

124-
1. On the **Basics** tab, **Name** the profile. For example, `NetFilter-prod-macOS-Default-MDE`.
125-
126-
1. Select **Next**.
120+
1. On the **Basics** tab, **Name** the profile. For example, `NetFilter-prod-macOS-Default-MDE`. Then, select **Next**.
127121

128122
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
129123

130124
1. Choose a **Deployment channel** and select **Next**.
131125

132-
1. Select a **Configuration profile file**.
133-
134-
1. Select **Next**.
126+
1. Select a **Configuration profile file**, and then select **Next**.
135127

136128
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
137129

@@ -156,13 +148,11 @@ To configure Full Disk Access:
156148

157149
1. Under **Template name**, select **Custom**, and then select **Create**.
158150

159-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
160-
161-
1. Select **Next**.
151+
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`. Then select **Next**.
162152

163153
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
164154

165-
1. Choose a **Deployment channel** and select **Next**.
155+
1. Choose a **Deployment channel** and then select **Next**.
166156

167157
1. Select a **Configuration profile file**.
168158

@@ -192,9 +182,7 @@ To configure background services:
192182

193183
1. Select **Create**.
194184

195-
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
196-
197-
1. Select **Next**.
185+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`. Then select **Next**.
198186

199187
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `backgroundServices-prod-macOS-Default-MDE`.
200188

@@ -228,9 +216,7 @@ To configure notifications:
228216

229217
1. Select **Create**.
230218

231-
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
232-
233-
1. Select **Next**.
219+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`. Then select **Next**.
234220

235221
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notif.mobileconfig`.
236222

@@ -258,9 +244,7 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
258244

259245
1. Select **Create**.
260246

261-
1. On the **Basics** tab, **Name** the profile. For example, `Accessibility-prod-macOS-Default-MDE`.
262-
263-
1. Select **Next**.
247+
1. On the **Basics** tab, **Name** the profile. For example, `Accessibility-prod-macOS-Default-MDE`. Then select **Next**.
264248

265249
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Accessibility.mobileconfig`.
266250

@@ -307,9 +291,7 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
307291

308292
1. Select **Create**.
309293

310-
1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`.
311-
312-
1. Select **Next**.
294+
1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`. Then select **Next**.
313295

314296
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Autoupdate.mobileconfig`.
315297

@@ -345,12 +327,10 @@ For more information about managing security settings, see:
345327

346328
- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)
347329
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
330+
348331
> [!NOTE]
349-
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
332+
> If the device is managed via Intune, the device won't register via Defender for Endpoint Security Settings Management in the [Microsoft Defender portal](https://security.microsoft.com). Only the policies set via Intune take effect.
350333
351-
> [!IMPORTANT]
352-
> Important
353-
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
354334
#### **Set policies using Microsoft Intune**
355335

356336
You can manage the security settings for Microsoft Defender for Endpoint on macOS under **Setting Preferences** in Microsoft Intune.
@@ -570,15 +550,3 @@ For information on troubleshooting procedures, see:
570550

571551
See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove Microsoft Defender for Endpoint on macOS from client devices.
572552

573-
## Recommended content
574-
575-
|Article | Description |
576-
|---|---|
577-
| [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos?source=recommendations) | Learn about adding Microsoft Defender for Endpoint to macOS devices using Microsoft Intune |
578-
| [Examples of device control policies for Intune](mac-device-control-intune.md) | Learn how to use device control policies using examples that can be used with Intune |
579-
| [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md) | Describes how to deploy Microsoft Defender for Endpoint on iOS features |
580-
| [Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune](ios-install.md) | Describes how to deploy Microsoft Defender for Endpoint on iOS using an app |
581-
| [Configure Microsoft Defender for Endpoint in Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure?source=recommendations) | Describes connecting to Defender for Endpoint, onboarding devices, assigning compliance for risk levels, and conditional access policies |
582-
| [Troubleshoot issues and find answers on FAQs related to Microsoft Defender for Endpoint on iOS](ios-troubleshoot.md) | Troubleshooting and FAQ - Microsoft Defender for Endpoint on iOS |
583-
| [Configure Microsoft Defender for Endpoint on Android features](android-configure.md) | Describes how to configure Microsoft Defender for Endpoint on Android |
584-
| [Manage Defender for Endpoint on Android devices in Intune - Azure](/mem/intune/protect/advanced-threat-protection-manage-android?source=recommendations) | Configure Microsoft Defender for Endpoint web protection on Android devices managed by Microsoft Intune |

0 commit comments

Comments
 (0)