Skip to content

Commit e5f10e7

Browse files
authored
Merge pull request #1062 from YongRhee-MSFT/docs-editor/mac-install-with-intune-1722518860
Update mac-install-with-intune.md
2 parents 9bb7d93 + 41d70f1 commit e5f10e7

File tree

1 file changed

+16
-33
lines changed

1 file changed

+16
-33
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 16 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/20/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -65,7 +65,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
6565

6666
1. Under **Configuration profiles**, select **Create Profile**.
6767

68-
This profile is needed for Big Sur (11) or later. It is ignored on older versions of macOS, because they use the kernel extension.
68+
This profile is needed for Big Sur (11) or later. It's ignored on older versions of macOS, because they use the kernel extension.
6969

7070
1. On the **Policies** tab, select **Create** > **New Policy**.
7171

@@ -100,7 +100,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
100100

101101
Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
102102

103-
To configure network filter:
103+
To configure your network filter:
104104

105105
1. Under **Configuration profiles**, select **Create Profile**.
106106

@@ -160,7 +160,7 @@ To configure Full Disk Access:
160160
1. Review the configuration profile. Select **Create**.
161161

162162
> [!NOTE]
163-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
163+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
164164
165165
### Step 4: Background services
166166

@@ -267,10 +267,10 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
267267

268268
### Step 7: Bluetooth permissions
269269

270-
> [!CAUTION]
271-
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
270+
> [!CAUTION]
271+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
272272
273-
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings above to enable Bluetooth access.
273+
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings mentioned earlier in this article to enable Bluetooth access.
274274

275275
> [!NOTE]
276276
> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
@@ -288,7 +288,7 @@ For more information, see [Deploy updates for Microsoft Defender for Endpoint on
288288
Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/settings/microsoft_auto_update).
289289

290290
> [!NOTE]
291-
> The sample AutoUpdate2.mobileconfig from the GitHub repository has it set to Current Channel (Production).
291+
> The sample `AutoUpdate2.mobileconfig` from the GitHub repository has it set to Current Channel (Production).
292292
293293
1. Under **Configuration profiles**, select **Create Profile**.
294294

@@ -316,31 +316,15 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
316316

317317
### Step 9: Microsoft Defender for Endpoint configuration settings
318318

319-
In this step, we go over *Preferences* that enables you to configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) **or** Microsoft Intune ([https://intune.microsoft.com](https://intune.microsoft.com)).
319+
In this step, we go over *Preferences* that enables you to configure anti-malware and EDR policies using Microsoft Intune ([https://intune.microsoft.com](https://intune.microsoft.com)).
320320

321-
#### 9a. Set policies using Microsoft Defender portal
322-
323-
1. Go through [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender for Endpoint Security Settings Management.
324-
325-
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
326-
327-
3. Under **Select Platform**, select **macOS**.
328-
329-
4. Under **Select Template**, choose a template and select **Create Policy**.
330-
331-
5. Specify a name and description for the policy, and then select **Next**.
332-
333-
6. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
334-
335-
For more information about managing security settings, see:
336-
337-
- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)
338-
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
321+
> [!NOTE]
322+
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
339323
340324
> [!IMPORTANT]
341-
> The policies set via Intune will take precedence over the Microsoft Defender for Endpoint Security Settings Management.
342-
343-
#### Set policies using Microsoft Intune
325+
> Important
326+
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
327+
#### **Set policies using Microsoft Intune**
344328

345329
You can manage the security settings for Microsoft Defender for Endpoint on macOS under **Setting Preferences** in Microsoft Intune.
346330

@@ -372,9 +356,8 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
372356

373357
1. Review the policy in **Review+Create** and select **Save**.
374358

375-
376359
> [!TIP]
377-
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the .mobileconig from step 8.
360+
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the `.mobileconfig` from step 8.
378361
379362
### Step 11: Device Control for Microsoft Defender for Endpoint on macOS
380363

@@ -463,7 +446,7 @@ You can visit **Apps** > **By platform** > **macOS** to see it on the list of al
463446
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
464447

465448
> [!IMPORTANT]
466-
> You should create and deploy the configuration profiles in the above order (step 1-13) for a successful system configuration.
449+
> You should create and deploy the configuration profiles in the order specified (steps 1-13) for a successful system configuration.
467450
468451
#### Step 15: Download the onboarding package
469452

0 commit comments

Comments
 (0)