Skip to content

Commit c8e72ff

Browse files
committed
acrolinx fixes
1 parent c5c8bf9 commit c8e72ff

19 files changed

+107
-108
lines changed

defender-endpoint/mac-device-control-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Device control for macOS has similar capabilities to Device control for Windows,
113113
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example, a `portableDevice` policy can deny or allow `download_photos_from_device`.
114114

115115
- To stay consistent with Windows, there are `generic_read`,`generic_write` , and `generic_execute` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116-
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
116+
- Creating a `deny` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
117117

118118

119119
### Settings
@@ -201,7 +201,7 @@ The following table lists the properties you can use in entry:
201201
| Property name | Description | Options |
202202
|:---|:---|:---|
203203
| `$type` | The type of enforcement | See table below for supported enforcements |
204-
| `options` | $type specific value to use | An array of options for the entry. May be omitted if not options are desired. |
204+
| `options` | $type specific value to use | An array of options for the entry. Might be omitted if not options are desired. |
205205

206206
#### Enforcement type
207207

@@ -258,7 +258,7 @@ v2_full_disk_access : "approved"
258258
- `active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
259259
- [] - Device Control isn't configured on this machine.
260260
- ["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
261-
- ["v1", "v2"] - You have both v1 and v2 enabled. Offboard from v1.
261+
- ["v1," "v2"] - You have both v1 and v2 enabled. Offboard from v1.
262262
- `v1_configured` - v1 configuration is applied
263263
- `v1_enforcement_level` - when v1 is enabled
264264
- `v2_configured` - v2 configuration is applied

defender-endpoint/mac-exclusions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,15 +66,15 @@ File, folder, and process exclusions support the following wildcards:
6666
>
6767
> The product attempts to resolve firm links when evaluating exclusions. Firm link resolution doesn't work when the exclusion contains wildcards or the target file (on the `Data` volume) doesn't exist.
6868
69-
## Best practices for adding antimalware exclusions for Microsoft Defender for Endpoint on macOS
69+
## Best practices for adding anti-malware exclusions for Microsoft Defender for Endpoint on macOS
7070

7171
1. Write down why an exclusion was added to a central location where only SecOps and/or Security Administrator have access. For example, list the submitter, date, app name, reason, and exclusion information.
7272

7373
1. Make sure to have an expiration date* for the exclusions
7474

7575
*except for apps that the ISV stated that there's no other tweaking that could be done to prevent the false positive or higher cpu utilization from occurring.
7676

77-
1. Avoid migrating non-Microsoft antimalware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
77+
1. Avoid migrating non-Microsoft anti-malware exclusions since they might no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
7878

7979
1. Order of exclusions to consider top (more secure) to bottom (least secure):
8080

defender-endpoint/mac-install-manually.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: macos
1818
search.appverid: met150
19-
ms.date: 04/30/2024
19+
ms.date: 04/16/2025
2020
---
2121

2222
# Manual deployment for Microsoft Defender for Endpoint on macOS
@@ -179,7 +179,7 @@ You can view applications permitted to run in background in System Settings => s
179179

180180
:::image type="content" source="media/background-items.png" alt-text="Screenshot that shows background items":::
181181

182-
Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they are disabled, then macOS won't start Microsoft Defender after a machine restart.
182+
Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they're disabled, then macOS won't start Microsoft Defender after a machine restart.
183183

184184
## Bluetooth permissions
185185

@@ -261,7 +261,7 @@ See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove M
261261
> [!TIP]
262262
>
263263
> - Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP).
264-
> - If you have any feedback that you'll like to share, submit it by opening Microsoft Defender Endpoint on macOS on your device and navigate to **Help** \> **Send feedback**.
264+
> - If you have any feedback that you like to share, submit it by opening Microsoft Defender Endpoint on macOS on your device and navigate to **Help** \> **Send feedback**.
265265
266266
## Recommended content
267267

defender-endpoint/mac-install-with-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -375,7 +375,7 @@ To set Device Control for Microsoft Defender for Endpoint on macOS, follow the s
375375

376376
To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
377377

378-
### Step 13: Check status of PList (.mobileconfig)
378+
### Step 13: Check status of PList (.Mobileconfig)
379379

380380
After completing the profile configuration, you'll be able to review the status of the policies.
381381

defender-endpoint/mac-install-with-other-mdm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 04/16/2025
1919
---
2020

2121
# Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on macOS

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Use this article to set up policies for Defender for Endpoint on macOS using Jam
110110
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) or Jamf.
111111

112112
> [!IMPORTANT]
113-
> Microsoft Defender for Endpoint Security Settings Management policies take precedence over Jamf set (and other 3rd party MDM) policies.
113+
> Microsoft Defender for Endpoint Security Settings Management policies takes precedence over Jamf set (and other third party MDM) policies.
114114
115115
### 3a. Set policies using Microsoft Defender portal
116116

@@ -354,9 +354,9 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
354354
:::image type="content" source="media/f624de59b3cc86e3e2d32ae5de093e02.png" alt-text="The prompt to upload the image related to the configuration settings." lightbox="media/f624de59b3cc86e3e2d32ae5de093e02.png":::
355355

356356
> [!NOTE]
357-
> If you happen to upload the Intune file, you'll get the following error:
357+
> If you happen to upload the Intune file, you get the following error:
358358
>
359-
> :::image type="content" source="media/8e69f867664668796a3b2904896f0436.png" alt-text="The prompt to upload the intune file related to the configuration settings." lightbox="media/8e69f867664668796a3b2904896f0436.png":::
359+
> :::image type="content" source="media/8e69f867664668796a3b2904896f0436.png" alt-text="The prompt to upload the Intune file related to the configuration settings." lightbox="media/8e69f867664668796a3b2904896f0436.png":::
360360
361361
11. Select **Save**.
362362

@@ -419,7 +419,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
419419

420420
:::image type="content" source="media/4bac6ce277aedfb4a674f2d9fcb2599a.png" alt-text="The configuration settings mdatpmdav notifications mau." lightbox="media/4bac6ce277aedfb4a674f2d9fcb2599a.png":::
421421

422-
Note that now you have two tables with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
422+
Now you have two tables with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
423423

424424
6. Select the **Scope** tab, and then select **Add**.
425425

@@ -555,11 +555,11 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
555555

556556
7. Select **Save** (not the one at the bottom right).
557557

558-
:::image type="content" source="media/6de50b4a897408ddc6ded56a09c09fe2.png" alt-text="The save operation for the configuration setting." lightbox="media/6de50b4a897408ddc6ded56a09c09fe2.png":::
558+
:::image type="content" source="media/6de50b4a897408ddc6ded56a09c09fe2.png" alt-text="The saved operation for the configuration setting." lightbox="media/6de50b4a897408ddc6ded56a09c09fe2.png":::
559559

560560
8. Select the `+` sign next to **App Access** to add a new entry.
561561

562-
:::image type="content" source="media/tcc-add-entry.png" alt-text="The save operation relating to the configuration setting." lightbox="media/tcc-add-entry.png":::
562+
:::image type="content" source="media/tcc-add-entry.png" alt-text="The saved operation relating to the configuration setting." lightbox="media/tcc-add-entry.png":::
563563

564564
9. Enter the following details:
565565

@@ -601,7 +601,7 @@ Microsoft Defender for Endpoint adds new settings over time. These new settings
601601
Alternatively, you can download [fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) and upload it to Jamf Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
602602

603603
> [!NOTE]
604-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
604+
> Full Disk Access granted through Apple MDM Configuration Profile isn't reflected in System Settings => Privacy & Security => Full Disk Access.
605605
606606
## Step 7: Approve System extensions for Microsoft Defender for Endpoint
607607

@@ -677,13 +677,13 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
677677

678678
- **Filter Name**: `Microsoft Defender Content Filter`
679679
- **Identifier**: `com.microsoft.wdav`
680-
- Leave **Service Address**, **Organization**, **User Name**, **Password**, **Certificate** blank (**Include** is *not* selected)
680+
- Leave **Service Address**, **Organization**, **User Name**, **Password**, **Certificate** blank (**Include** isn't* selected)
681681
- **Filter Order**: `Inspector`
682682
- **Socket Filter**: `com.microsoft.wdav.netext`
683683
- **Socket Filter Designated Requirement**: `identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
684-
- Leave **Network Filter** fields blank (**Include** is *not* selected)
684+
- Leave **Network Filter** fields blank (**Include** isn't* selected)
685685

686-
Note that **Identifier**, **Socket Filter** and **Socket Filter Designated Requirement** exact values as specified earlier.
686+
Note that **Identifier**, **Socket Filter, and **Socket Filter Designated Requirement** exact values as specified earlier.
687687

688688
:::image type="content" source="media/netext-create-profile.png" alt-text="The mdatpmdav configuration setting." lightbox="media/netext-create-profile.png":::
689689

@@ -708,7 +708,7 @@ Alternatively, you can download [netfilter.mobileconfig](https://github.com/micr
708708
## Step 9: Configure Background Services
709709

710710
> [!CAUTION]
711-
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
711+
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications can't run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
712712
> > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Jamf, we recommend you update the deployment with this configuration profile.
713713
714714
Download [**background_services.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [our GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
@@ -718,14 +718,13 @@ Upload downloaded mobileconfig to Jamf Configuration Profiles as described in [D
718718
## Step 10: Grant Bluetooth Permissions
719719

720720
> [!CAUTION]
721-
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
721+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications can't access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
722722
723723
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
724724

725725
> [!WARNING]
726-
> Current version of Jamf Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro will remove unsupported payload,
727-
> and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro will consider it "sealed" and will not
728-
> tamper with it. See instructions below:
726+
> Current version of Jamf Pro doesn't support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro removes unsupported payload,
727+
> and it fails to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro considers it "sealed" and won't tamper with it. See instructions below:
729728
- You need to have at least one signing certificate installed into your KeyChain, even a self-signed certificate works. You can inspect what you have with:
730729

731730
```bash
@@ -744,10 +743,10 @@ Choose any of them, and provide the quoted text as the `-N` parameter:
744743
/usr/bin/security cms -S -N "DevCert" -i bluetooth.mobileconfig -o bluetooth-signed.mobileconfig
745744
```
746745

747-
Now you can upload the generated bluetooth-signed.mobileconfig to Jamf Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
746+
Now you can upload the generated bluetooth-signed. Mobileconfig to Jamf Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
748747

749748
> [!NOTE]
750-
> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
749+
> Bluetooth granted through Apple MDM Configuration Profile isn't reflected in System Settings => Privacy & Security => Bluetooth.
751750
752751
## Step 11: Schedule scans with Microsoft Defender for Endpoint on macOS
753752

@@ -782,7 +781,7 @@ Follow the instructions in [Schedule scans with Microsoft Defender for Endpoint
782781

783782
6. On the **General tab**, in **New Package**, specify the following details:
784783

785-
- **Display Name**: Leave it blank for now. Because it is reset when you choose your pkg.
784+
- **Display Name**: Leave it blank for now. Because it's reset when you choose your pkg.
786785
- **Category**: `None (default)`
787786
- **Filename**: `Choose File`
788787

@@ -889,13 +888,13 @@ Follow these steps:
889888
Jamf requires you to define a set of machines for a configuration profile. You need to make sure that all machines receiving Defender's package, also receive *all* configuration profiles listed above.
890889

891890
> [!WARNING]
892-
> Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically. It is a powerful concept that is widely used for configuration profiles distribution.
891+
> Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically. It's a powerful concept that is widely used for configuration profiles distribution.
893892
>
894-
> However, keep in mind that these criteria should not include presence of Defender on a machine.
895-
> While using this criterion may sound logical, it creates problems that are difficult to diagnose.
893+
> However, keep in mind that these criteria shouldn't include presence of Defender on a machine.
894+
> While using this criterion might sound logical, it creates problems that are difficult to diagnose.
896895
>
897896
> Defender relies on all these profiles at the moment of its installation.
898897
>
899-
> Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles.Deploying a policy with Microsoft Defender's package *after* deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.
898+
> Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles. Deploying a policy with Microsoft Defender's package *after* deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.
900899
901900
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)