Skip to content

Commit e4d558c

Browse files
Merge pull request #5038 from MicrosoftDocs/main
[AutoPublish] main to live - 09/15 01:34 PDT | 09/15 14:04 IST
2 parents 4629941 + aecfd7a commit e4d558c

12 files changed

+93
-79
lines changed

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,22 @@ ms.custom: include file
1414

1515
This procedure provides a high-level example of how to create a Conditional Access policy for use with Defender for Cloud Apps.
1616

17-
1. In Microsoft Entra ID Conditional Access, select **Create new policy**.
18-
19-
1. Enter a meaningful name for your policy, and then select the link under **Session** to add controls to your policy.
20-
21-
1. In the **Session** area, select **Use Conditional Access App Control**.
22-
23-
1. In the **Users** area, select to include all users, or specific users and groups only.
24-
25-
1. In the **Conditions** and **Client apps** areas, select the conditions and client apps that you want to include in your policy.
26-
27-
1. Save the policy by toggling **Report-only** to **On**, and then selecting **Create**.
28-
29-
Microsoft Entra ID supports both browser-based and non browser-based policies. We recommend that you create both types for increased security coverage.
30-
31-
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
17+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
18+
1. Browse to **Entra ID** > **Conditional Access** > **Policies**.
19+
1. Select **New policy**.
20+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
21+
1. Under **Assignments**, select **Users or workload identities**.
22+
1. Under **Include**, select **All users**
23+
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
24+
1. Under **Target resources** > **Resources (formerly cloud apps)**, select the following options:
25+
1. Under **Include**, choose **Select resources**.
26+
1. Select the client apps that you want to include in your policy.
27+
1. Under **Conditions**, select any conditions that you want to include in your policy.
28+
1. Under **Access controls** > **Session**, select **Use app enforced restrictions**, then select **Select**.
29+
1. Confirm your settings and set **Enable policy** to **Report-only**.
30+
1. Select **Create** to create to enable your policy.
31+
32+
After confirming your settings using [policy impact or report-only mode](/entra/identity/conditional-access/concept-conditional-access-report-only#reviewing-results), move the **Enable policy** toggle from **Report-only** to **On**.
3233

3334
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
3435

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1157,7 +1157,7 @@
11571157
href: api/api-power-bi.md
11581158
- name: Configure integration with other Microsoft solutions
11591159
items:
1160-
- name: Configure conditional access
1160+
- name: Configure Conditional Access
11611161
href: configure-conditional-access.md
11621162
- name: Configure Microsoft Defender for Cloud Apps integration
11631163
href: microsoft-cloud-app-security-config.md
@@ -1553,7 +1553,7 @@
15531553
items:
15541554
- name: Microsoft Defender for Endpoint integrations
15551555
href: threat-protection-integration.md
1556-
- name: Protect users, data, and devices with conditional access
1556+
- name: Protect users, data, and devices with Conditional Access
15571557
href: conditional-access.md
15581558
- name: Microsoft Defender for Cloud Apps integration overview
15591559
href: microsoft-cloud-app-security-integration.md

defender-endpoint/configure-conditional-access.md

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure Conditional Access in Microsoft Defender for Endpoint
3-
description: Learn about steps that you need to do in Intune, Microsoft Defender XDR, and Azure to implement Conditional access
3+
description: Learn about steps that you need to do in Intune, Microsoft Defender XDR, and Azure to implement Conditional Access
44
ms.service: defender-endpoint
55
ms.author: bagol
66
author: batamig
@@ -41,7 +41,7 @@ You need to make sure that all your devices are enrolled in Intune. You can use
4141

4242
There are steps you'll need to take in the Microsoft Defender portal, the Intune portal, and Microsoft Entra admin center.
4343

44-
It's important to note the required roles to access these portals and implement Conditional access:
44+
It's important to note the required roles to access these portals and implement Conditional Access:
4545

4646
- **Microsoft Defender portal** - You'll need to sign into the portal with an appropriate role to turn on integration. See [Permission options](user-roles.md#permission-options).
4747
- **Intune** - You'll need to sign in to the portal with Security Administrator rights with management permissions.
@@ -113,24 +113,27 @@ Take the following steps to enable Conditional Access:
113113

114114
### Step 5: Create a Microsoft Entra Conditional Access policy
115115

116-
1. In the [Azure portal](https://portal.azure.com), open **Microsoft Entra ID** \> **Conditional Access** \> **New policy**.
117-
118-
2. Enter a policy **Name**, and select **Users and groups**. Use the Include or Exclude options to add your groups for the policy, and select **Done**.
119-
120-
3. Select **Cloud apps**, and choose which apps to protect. For example, choose **Select apps**, and select **Office 365 SharePoint Online** and **Office 365 Exchange Online**. Select **Done** to save your changes.
121-
122-
4. Select **Conditions** \> **Client apps** to apply the policy to apps and browsers. For example, select **Yes**, and then enable **Browser** and **Mobile apps and desktop clients**. Select **Done** to save your changes.
123-
124-
5. Select **Grant** to apply Conditional Access based on device compliance. For example, select **Grant access** \> **Require device to be marked as compliant**. Choose **Select** to save your changes.
125-
126-
6. Select **Enable policy**, and then **Create** to save your changes.
116+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
117+
1. Browse to **Entra ID** > **Conditional Access** > **Policies**.
118+
1. Select **New policy**.
119+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
120+
1. Under **Assignments**, select **Users or workload identities**.
121+
1. Under **Include**, select **All users**
122+
1. Under **Exclude**:
123+
1. Select **Users and groups**
124+
1. Choose your organization's emergency access or break-glass accounts.
125+
1. If you use hybrid identity solutions like Microsoft Entra Connect or Microsoft Entra Connect Cloud Sync, select **Directory roles**, then select **Directory Synchronization Accounts**
126+
1. Under **Target resources** > **Resources (formerly cloud apps)** > **Include**, select **All resources (formerly 'All cloud apps')**.
127+
1. Under **Access controls** > **Grant**.
128+
1. Select **Require device to be marked as compliant**.
129+
1. Select **Select**.
130+
1. Confirm your settings and set **Enable policy** to **Report-only**.
131+
1. Select **Create** to create to enable your policy.
132+
133+
After confirming your settings using [policy impact or report-only mode](/entra/identity/conditional-access/concept-conditional-access-report-only#reviewing-results), move the **Enable policy** toggle from **Report-only** to **On**.
127134

128135
> [!NOTE]
129136
> You can use the Microsoft Defender for Endpoint app along with the **Approved Client app** , **App Protection policy** and **Compliant Device** (Require device to be marked as compliant) controls in Microsoft Entra Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it is able to report device security posture in all the three grant permissions.
130-
>
131-
> However, internally Defender requests **MSGraph/User.read** scope and **Intune Tunnel** scope (in case of Defender+Tunnel scenarios). So these scopes must be excluded*. To exclude MSGraph/User.read scope, any one cloud app can be excluded. To exclude Tunnel scope, you need to exclude 'Microsoft Tunnel Gateway'.These permission and exclusions enables the flow for compliance information to Conditional Access.
132-
133-
Applying a Conditional Access policy to All Cloud Apps could inadvertently block user access in some cases, so it's not recommended. Read more about [Conditional Access policies on Cloud Apps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#all-cloud-apps)
134137
135138
For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/mem/intune/protect/advanced-threat-protection).
136139

defender-endpoint/mac-install-manually.md

Lines changed: 6 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,11 @@ This article describes how to deploy Microsoft Defender for Endpoint on macOS ma
4242

4343
Before you get started, see [the main Microsoft Defender for Endpoint on macOS page](microsoft-defender-endpoint-mac.md) for a description of prerequisites and system requirements for the current software version.
4444

45+
> [!IMPORTANT]
46+
> Manual installation of Microsoft Defender for Endpoint on macOS requires changes to the Privacy & Security Settings on macOS. Please consult Apple's documentation for details.
47+
> [Change Privacy & Security settings on MacOS Sonoma 14](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/14.0/mac/14.0)
48+
> [Change Privacy & Security settings on MacOS Sequoia 15](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/15.0/mac/15.0)
49+
>
4550
## Download installation and onboarding packages
4651

4752
Download the installation and onboarding packages from Microsoft Defender portal.
@@ -55,12 +60,10 @@ Download the installation and onboarding packages from Microsoft Defender portal
5560
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
5661

5762
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
58-
:::image type="content" source="media/onboarding-package-step4.png" alt-text="Screenshot that shows the options to download the installation and onboarding packages.":::
5963

6064
5. From a command prompt, verify that you have the two files.
6165
- Type *cd Downloads* and press **Enter**.
6266
- Type *ls* and press **Enter**.
63-
:::image type="content" source="media/Terminal-image-step5.png" alt-text="Screenshot that displays the two download files.":::
6467

6568
6. Copy the *wdav.pkg* and *MicrosoftDefenderATPOnboardingMacOs.sh* to the device where you want to deploy the Microsoft Defender for Endpoint on macOS.
6669

@@ -79,55 +82,37 @@ To complete this process, you must have admin privileges on the device.
7982
```console
8083
sudo installer -pkg /Users/admin/Downloads/wdav.pkg -target /
8184
```
82-
83-
:::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application.":::
8485

8586
2. Select **Continue**.
8687

8788
3. Read through the **Software License Agreement** and select **Continue** to agree with the terms.
8889

89-
:::image type="content" source="media/software-license-agreement.png" alt-text="Screenshot that shows the Software License Agreement.":::
90-
9190
4. Read through the *End-User License Agreement (EULA)* and select **Agree**.
9291

93-
:::image type="content" source="media/agree-license.png" alt-text="Screenshot that shows the acceptance of the agreement.":::
94-
9592
5. From **Destination Select**, select the disk where you want to install the Microsoft Defender Software, for example, *Macintosh HD* and select **Continue**.
9693

97-
:::image type="content" source="media/destination-select.png" alt-text="Screenshot that shows the selection of destination for installation.":::
98-
9994
> [!NOTE]
10095
> The amount of disk space required for installation is around 777 MB.
10196

10297
6. To change the installation destination, select **Change Install Location...**.
10398

104-
:::image type="content" source="media/installation-type.png" alt-text="Screenshot that shows the final installation step.":::
105-
10699
7. Select **Install**.
107100

108101
8. Enter the password, when prompted.
109102

110-
:::image type="content" source="media/password-2g.png" alt-text="Screenshot that shows the password dialog box.":::
111-
112-
9. Select **Install Software**.
103+
1. Select **Install Software**.
113104

114105
10. At the end of the installation process, for macOS Ventura (13.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
115106

116-
:::image type="content" source="media/monterey-install-2.png" alt-text="Screenshot that shows the system extension approval":::
117-
118107
11. To enable system extension, select **Details**.
119108

120-
:::image type="content" source="media/system-extention-image.png" alt-text="Screenshot that shows the system extension.":::
121109

122110
12. From the **Security & Privacy** window, select the checkboxes next to **Microsoft Defender** and select **OK**.
123111

124-
:::image type="content" source="media/security-privacy-window-updated.png" alt-text="Screenshot that shows the security and privacy window.":::
125-
126112
13. Repeat steps 11 and 12 for all system extensions distributed with Microsoft Defender for Endpoint on macOS.
127113

128114
14. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**.
129115

130-
:::image type="content" source="media/monterey-install-4.png" alt-text="Screenshot that shows the system extension security preferences2":::
131116

132117
To troubleshoot System Extension issues, refer [Troubleshoot System Extension](mac-support-sys-ext.md).
133118

@@ -144,12 +129,8 @@ To grant full disk access:
144129

145130
2. Grant **Full Disk Access** permission to **Microsoft Defender** and **Microsoft Defenders Endpoint Security Extension**.
146131

147-
:::image type="content" source="media/full-disk-access-security-privacy.png" alt-text="The screenshot shows the full disk access's security and privacy.":::
148-
149132
3. Select **General** \> **Restart** for the new system extensions to take effect.
150133

151-
:::image type="content" source="media/restart-fulldisk.png" alt-text="Screenshot that allows you to restart the system for new system extensions to be enabled.":::
152-
153134
4. Enable *Potentially Unwanted Application* (PUA) in block mode.
154135

155136
To enable PUA, refer [configure PUA protection](mac-pua.md).
@@ -173,11 +154,9 @@ To grant full disk access:
173154
Starting with macOS 13, a user must explicitly allow an application to run in background.
174155
macOS will pop a prompt up, telling the user that Microsoft Defender can run in background.
175156

176-
:::image type="content" source="media/background-items-notification.png" alt-text="Screenshot that shows background items notification":::
177157

178158
You can view applications permitted to run in background in System Settings => sign in Items => Allow in the Background at any time:
179159

180-
:::image type="content" source="media/background-items.png" alt-text="Screenshot that shows background items":::
181160

182161
Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they're disabled, then macOS won't start Microsoft Defender after a machine restart.
183162

@@ -187,12 +166,9 @@ Starting with macOS 14, a user must explicitly allow an application to access Bl
187166
macOS will pop a prompt up, telling the user that Microsoft Defender can access Bluetooth (applies only if you use Bluetooth based policies for Device Control).
188167
Select Allow to grant Microsoft Defender to access Bluetooth.
189168

190-
:::image type="content" source="media/macos-defender-bluetooth.png" alt-text="Screenshot that shows Bluetooth access request":::
191169

192170
You can confirm that permissions are granted in System Settings => Privacy Settings => Bluetooth.
193171

194-
:::image type="content" source="media/macos-defender-bluetooth-review.png" alt-text="Screenshot that shows Review Bluetooth access":::
195-
196172
## Onboarding Package
197173

198174
Once you install the MDE on macOS client, you must now onboard the package, which registers to your Microsoft Defender for Endpoint tenant and licenses it.

defender-endpoint/mac-whatsnew.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,11 @@ ms.reviewer: mavel
3232
3333
For more information on Microsoft Defender for Endpoint on other operating systems:
3434

35+
- [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)
3536
- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md)
3637
- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)
37-
- [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)
38-
- [What's new in Microsoft Defender for Endpoint on macOS](mac-whatsnew.md)
38+
- [What's new in Microsoft Defender for Endpoint on Android](android-whatsnew.md)
39+
3940

4041
> [!TIP]
4142
> If you have any feedback that you would like to share, submit it by opening Microsoft Defender for Endpoint on macOS devices and navigating to **Help** \> **Send feedback**.
@@ -58,13 +59,17 @@ To get the latest features, including preview capabilities (such as endpoint det
5859

5960
If an end user encounters a prompt for Defender for Endpoint on macOS processes such as `wdavdaemon_enterprise` or `Microsoft Defender Helper`, the end user can safely choose the **Deny** option. This selection doesn't affect Defender for Endpoint's functionality. Enterprises can also add *Microsoft Defender* to allow [incoming connections](https://support.apple.com/en-ca/guide/deployment/dep8d306275f/web). This issue is fixed in macOS Sequoia 15.2.
6061

62+
## Tahoe support
63+
64+
- Microsoft Defender for Endpoint supports version 26.0 or newer.
65+
6166
## Sequoia support
6267

6368
- Microsoft Defender for Endpoint supports version 15.0.1 or newer.
6469

6570
## macOS Deprecation
6671

67-
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur) and 12 (Monterey).
72+
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur), 12 (Monterey) and 13 (Ventura)
6873

6974
## Releases for Defender for Endpoint on macOS
7075

@@ -81,7 +86,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
8186
| Build: | **101.25072.0011** |
8287
|--------------------|-----------------------|
8388
| Release version: | **20.125072.11.0** |
84-
| Engine version: | **1.1.25060.3000** |
89+
| Engine version: | **1.1.25070.3000** |
8590
| Signature version: | **1.429.309.0** |
8691

8792
##### What's new

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,10 @@ There are several methods and deployment tools that you can use to install and c
7070

7171
These three most recent major releases of macOS are supported.
7272

73+
- 26 (Tahoe)
74+
7375
- 15.0.1 (Sequoia)
7476
- 14 (Sonoma)
75-
- 13 (Ventura)
76-
7777
- Supported processors: x64 and ARM64 (Mx processors)
7878

7979
- Disk space: 1GB

0 commit comments

Comments
 (0)