You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ Device control for macOS has similar capabilities to Device control for Windows,
113
113
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example, a `portableDevice` policy can deny or allow `download_photos_from_device`.
114
114
115
115
- To stay consistent with Windows, there are `generic_read`,`generic_write` , and `generic_execute` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116
-
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
116
+
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
117
117
118
118
119
119
### Settings
@@ -201,7 +201,7 @@ The following table lists the properties you can use in entry:
201
201
| Property name | Description | Options |
202
202
|:---|:---|:---|
203
203
|`$type`| The type of enforcement | See table below for supported enforcements |
204
-
|`options`| $type specific value to use | An array of options for the entry. May be omitted if not options are desired. |
204
+
|`options`| $type specific value to use | An array of options for the entry. Might be omitted if not options are desired. |
-`active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
259
259
-[] - Device Control isn't configured on this machine.
260
260
-["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
261
-
-["v1", "v2"] - You have both v1 and v2 enabled. Offboard from v1.
261
+
-["v1," "v2"] - You have both v1 and v2 enabled. Offboard from v1.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-exclusions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,15 +66,15 @@ File, folder, and process exclusions support the following wildcards:
66
66
>
67
67
> The product attempts to resolve firm links when evaluating exclusions. Firm link resolution doesn't work when the exclusion contains wildcards or the target file (on the `Data` volume) doesn't exist.
68
68
69
-
## Best practices for adding antimalware exclusions for Microsoft Defender for Endpoint on macOS
69
+
## Best practices for adding anti-malware exclusions for Microsoft Defender for Endpoint on macOS
70
70
71
71
1. Write down why an exclusion was added to a central location where only SecOps and/or Security Administrator have access. For example, list the submitter, date, app name, reason, and exclusion information.
72
72
73
73
1. Make sure to have an expiration date* for the exclusions
74
74
75
75
*except for apps that the ISV stated that there's no other tweaking that could be done to prevent the false positive or higher cpu utilization from occurring.
76
76
77
-
1. Avoid migrating non-Microsoft antimalware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
77
+
1. Avoid migrating non-Microsoft anti-malware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
78
78
79
79
1. Order of exclusions to consider top (more secure) to bottom (least secure):
# Manual deployment for Microsoft Defender for Endpoint on macOS
@@ -179,7 +179,7 @@ You can view applications permitted to run in background in System Settings => s
179
179
180
180
:::image type="content" source="media/background-items.png" alt-text="Screenshot that shows background items":::
181
181
182
-
Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they are disabled, then macOS won't start Microsoft Defender after a machine restart.
182
+
Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they're disabled, then macOS won't start Microsoft Defender after a machine restart.
183
183
184
184
## Bluetooth permissions
185
185
@@ -261,7 +261,7 @@ See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove M
261
261
> [!TIP]
262
262
>
263
263
> - Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP).
264
-
> - If you have any feedback that you'll like to share, submit it by opening Microsoft Defender Endpoint on macOS on your device and navigate to **Help**\>**Send feedback**.
264
+
> - If you have any feedback that you like to share, submit it by opening Microsoft Defender Endpoint on macOS on your device and navigate to **Help**\>**Send feedback**.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-install-with-intune.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -375,7 +375,7 @@ To set Device Control for Microsoft Defender for Endpoint on macOS, follow the s
375
375
376
376
To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
377
377
378
-
### Step 13: Check status of PList (.mobileconfig)
378
+
### Step 13: Check status of PList (.Mobileconfig)
379
379
380
380
After completing the profile configuration, you'll be able to review the status of the policies.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-jamfpro-policies.md
+21-22Lines changed: 21 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ Use this article to set up policies for Defender for Endpoint on macOS using Jam
110
110
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) or Jamf.
111
111
112
112
> [!IMPORTANT]
113
-
> Microsoft Defender for Endpoint Security Settings Management policies take precedence over Jamf set (and other 3rd party MDM) policies.
113
+
> Microsoft Defender for Endpoint Security Settings Management policies takes precedence over Jamf set (and other third party MDM) policies.
114
114
115
115
### 3a. Set policies using Microsoft Defender portal
116
116
@@ -354,9 +354,9 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
354
354
:::image type="content" source="media/f624de59b3cc86e3e2d32ae5de093e02.png" alt-text="The prompt to upload the image related to the configuration settings." lightbox="media/f624de59b3cc86e3e2d32ae5de093e02.png":::
355
355
356
356
> [!NOTE]
357
-
> If you happen to upload the Intune file, you'll get the following error:
357
+
> If you happen to upload the Intune file, you get the following error:
358
358
>
359
-
> :::image type="content" source="media/8e69f867664668796a3b2904896f0436.png" alt-text="The prompt to upload the intune file related to the configuration settings." lightbox="media/8e69f867664668796a3b2904896f0436.png":::
359
+
> :::image type="content" source="media/8e69f867664668796a3b2904896f0436.png" alt-text="The prompt to upload the Intune file related to the configuration settings." lightbox="media/8e69f867664668796a3b2904896f0436.png":::
360
360
361
361
11. Select **Save**.
362
362
@@ -419,7 +419,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
Note that now you have two tables with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
422
+
Now you have two tables with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
423
423
424
424
6. Select the **Scope** tab, and then select **Add**.
425
425
@@ -555,11 +555,11 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
555
555
556
556
7. Select **Save** (not the one at the bottom right).
557
557
558
-
:::image type="content" source="media/6de50b4a897408ddc6ded56a09c09fe2.png" alt-text="The save operation for the configuration setting." lightbox="media/6de50b4a897408ddc6ded56a09c09fe2.png":::
558
+
:::image type="content" source="media/6de50b4a897408ddc6ded56a09c09fe2.png" alt-text="The saved operation for the configuration setting." lightbox="media/6de50b4a897408ddc6ded56a09c09fe2.png":::
559
559
560
560
8. Select the `+` sign next to **App Access** to add a new entry.
561
561
562
-
:::image type="content" source="media/tcc-add-entry.png" alt-text="The save operation relating to the configuration setting." lightbox="media/tcc-add-entry.png":::
562
+
:::image type="content" source="media/tcc-add-entry.png" alt-text="The saved operation relating to the configuration setting." lightbox="media/tcc-add-entry.png":::
563
563
564
564
9. Enter the following details:
565
565
@@ -601,7 +601,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
601
601
Alternatively, you can download [fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) and upload it to Jamf Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
602
602
603
603
> [!NOTE]
604
-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
604
+
> Full Disk Access granted through Apple MDM Configuration Profile isn't reflected in System Settings => Privacy & Security => Full Disk Access.
605
605
606
606
## Step 7: Approve System extensions for Microsoft Defender for Endpoint
607
607
@@ -677,13 +677,13 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
@@ -708,7 +708,7 @@ Alternatively, you can download [netfilter.mobileconfig](https://github.com/micr
708
708
## Step 9: Configure Background Services
709
709
710
710
> [!CAUTION]
711
-
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
711
+
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications can't run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
712
712
> > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Jamf, we recommend you update the deployment with this configuration profile.
713
713
714
714
Download [**background_services.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [our GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
@@ -718,14 +718,13 @@ Upload downloaded mobileconfig to Jamf Configuration Profiles as described in [D
718
718
## Step 10: Grant Bluetooth Permissions
719
719
720
720
> [!CAUTION]
721
-
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
721
+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications can't access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
722
722
723
723
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
724
724
725
725
> [!WARNING]
726
-
> Current version of Jamf Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro will remove unsupported payload,
727
-
> and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro will consider it "sealed" and will not
728
-
> tamper with it. See instructions below:
726
+
> Current version of Jamf Pro doesn't support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro removes unsupported payload,
727
+
> and it fails to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro considers it "sealed" and won't tamper with it. See instructions below:
729
728
- You need to have at least one signing certificate installed into your KeyChain, even a self-signed certificate works. You can inspect what you have with:
730
729
731
730
```bash
@@ -744,10 +743,10 @@ Choose any of them, and provide the quoted text as the `-N` parameter:
Now you can upload the generated bluetooth-signed.mobileconfig to Jamf Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
746
+
Now you can upload the generated bluetooth-signed. Mobileconfig to Jamf Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
748
747
749
748
> [!NOTE]
750
-
> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
749
+
> Bluetooth granted through Apple MDM Configuration Profile isn't reflected in System Settings => Privacy & Security => Bluetooth.
751
750
752
751
## Step 11: Schedule scans with Microsoft Defender for Endpoint on macOS
753
752
@@ -782,7 +781,7 @@ Follow the instructions in [Schedule scans with Microsoft Defender for Endpoint
782
781
783
782
6. On the **General tab**, in **New Package**, specify the following details:
784
783
785
-
-**Display Name**: Leave it blank for now. Because it is reset when you choose your pkg.
784
+
-**Display Name**: Leave it blank for now. Because it's reset when you choose your pkg.
786
785
-**Category**: `None (default)`
787
786
-**Filename**: `Choose File`
788
787
@@ -889,13 +888,13 @@ Follow these steps:
889
888
Jamf requires you to define a set of machines for a configuration profile. You need to make sure that all machines receiving Defender's package, also receive *all* configuration profiles listed above.
890
889
891
890
> [!WARNING]
892
-
> Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically. It is a powerful concept that is widely used for configuration profiles distribution.
891
+
> Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically. It's a powerful concept that is widely used for configuration profiles distribution.
893
892
>
894
-
> However, keep in mind that these criteria should not include presence of Defender on a machine.
895
-
> While using this criterion may sound logical, it creates problems that are difficult to diagnose.
893
+
> However, keep in mind that these criteria shouldn't include presence of Defender on a machine.
894
+
> While using this criterion might sound logical, it creates problems that are difficult to diagnose.
896
895
>
897
896
> Defender relies on all these profiles at the moment of its installation.
898
897
>
899
-
> Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles.Deploying a policy with Microsoft Defender's package *after* deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.
898
+
> Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles.Deploying a policy with Microsoft Defender's package *after* deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.
900
899
901
900
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments