You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
134
+
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
These four most recent major releases of macOS are supported.
73
-
74
71
- 15.0.1 (Sequoia)
75
-
76
72
- 14 (Sonoma)
77
-
78
73
- 13 (Ventura)
79
-
80
74
- 12 (Monterey)
81
75
82
76
- Supported processors: x64 and ARM64
@@ -85,24 +79,23 @@ These four most recent major releases of macOS are supported.
85
79
86
80
- Beta versions of macOS aren't supported.
87
81
88
-
- Important
89
-
90
-
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmicrosoft-defender-endpoint-mac.md/main/979628aa-e0a5-ba01-7de6-f03ef27b15df/mac-sysext-policies.md).
82
+
> [!IMPORTANT]
83
+
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
91
84
92
-
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
85
+
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
93
86
94
87
### Licensing requirements
95
88
96
89
Microsoft Defender for Endpoint on Mac requires one of the following Microsoft Volume Licensing offers:
97
90
98
-
- Microsoft 365 E5 (M365 E5)
91
+
- Microsoft 365 E5
99
92
- Microsoft 365 E5 Security
100
-
- Microsoft 365 A5 (M365 A5)
93
+
- Microsoft 365 A5
101
94
- Windows 10 Enterprise E5
102
95
- Microsoft 365 Business Premium
103
96
- Windows 11 Enterprise E5
104
-
- Microsoft Defender for Endpoint P2
105
-
- Microsoft Defender for Endpoint P1 (which is included in [Microsoft 365 E3 (M365 E3)](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639))
97
+
- Microsoft Defender for Endpoint P2 (included in Microsoft 365 E5 and E5 Security)
98
+
- Microsoft Defender for Endpoint P1 (included in [Microsoft 365 E3](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639))
106
99
107
100
> [!NOTE]
108
101
> Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices.
@@ -126,7 +119,6 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
126
119
127
120
> [!WARNING]
128
121
> Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used.
129
-
>
130
122
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-macos-linux.md
+25-29Lines changed: 25 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,39 +22,40 @@ search.appverid: met150
22
22
# Run the client analyzer on macOS and Linux
23
23
24
24
**Applies to:**
25
+
25
26
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27
28
28
29
The XMDEClientAnalyzer is used for diagnosing Microsoft Defender for Endpoint health or reliability issues on onboarded devices running either Linux, or macOS.
29
30
30
31
There are two ways to run the client analyzer tool:
31
32
32
-
1. Using a binary version (no Python dependency)
33
+
1. Using a binary version (no external Python dependency)
33
34
2. Using a Python-based solution
34
35
35
-
36
36
## Running the binary version of the client analyzer
37
37
38
38
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the macOS or Linux machine you need to investigate.\
39
39
If you're using a terminal, download the tool by entering the following command:
> The current SHA256 hash of `XMDEClientAnalyzerBinary.zip` that is downloaded from this link is: `4E972F7950EA475A21735042484CD00CED6EA70ED9CBB48B4C9405FFD2706DFA`.
4. Change to the tool's directory by entering the following command:
71
72
72
-
```console
73
+
```bash
73
74
cd XMDEClientAnalyzerBinary
74
75
```
75
76
@@ -84,87 +85,82 @@ If you're using a terminal, download the tool by entering the following command:
84
85
85
86
- Linux
86
87
87
-
```console
88
+
```bash
88
89
unzip -q SupportToolLinuxBinary.zip
89
90
```
90
91
91
92
- Mac
92
93
93
-
```console
94
+
```bash
94
95
unzip -q SupportToolMacOSBinary.zip
95
96
```
96
97
97
98
7. Run the tool as _root_ to generate diagnostic package:
98
99
99
-
```console
100
+
```bash
100
101
sudo ./MDESupportTool -d
101
102
```
102
103
103
104
## Running the Python-based client analyzer
104
105
105
106
> [!NOTE]
106
-
>
107
-
> - The analyzer depends on few extra PIP packages (sh, distro, lxml, pandas) which are installed in the OS when in root to produce the result output. If not installed, the analyzer will try to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
108
-
>
109
-
> >[!WARNING]
110
-
> >Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
111
-
>
112
-
> - In addition, the tool currently requires Python version 3 or later to be installed.
113
-
>
114
-
> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the mde_support_tool.sh script. For example:
> - The analyzer depends on few extra PIP packages (`decorator`, `sh`, `distro`, `lxml`, and `psutil`) which are installed in the operating system when in root to produce the result output. If not installed, the analyzer attempts to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
108
+
> - In addition, the tool currently requires Python version 3 or later to be installed on your device.
109
+
> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the `mde_support_tool.sh` script. For example: `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`.
110
+
111
+
> [!WARNING]
112
+
> Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
117
113
118
114
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
119
115
120
116
If you're using a terminal, download the tool by running the following command:
Copy file name to clipboardExpand all lines: defender-office-365/message-headers-eop-mdo.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ The individual fields and values are described in the following table.
56
56
|Field|Description|
57
57
|---|---|
58
58
|`ARC`|The `ARC` protocol has the following fields: <ul><li>`AAR`: Records the content of the **Authentication-results** header from DMARC.</li><li>`AMS`: Includes cryptographic signatures of the message.</li><li>`AS`: Includes cryptographic signatures of the message headers. This field contains a tag of a chain validation called `"cv="`, which includes the outcome of the chain validation as **none**, **pass**, or **fail**.</li></ul>|
59
-
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
59
+
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BIMP`: Brand impersonation<sup>\*</sup></li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`BIMP`: Brand impersonation</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
60
60
|`CIP:[IP address]`|The connecting IP address. You can use this IP address in the IP Allow List or the IP Block List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
61
61
|`CTRY`|The source country/region as determined by the connecting IP address, which might not be the same as the originating sending IP address.|
62
62
|`DIR`|The Directionality of the message: <ul><li>`INB`: Inbound message.</li><li>`OUT`: Outbound message.</li><li>`INT`: Internal message.</li></ul>|
Copy file name to clipboardExpand all lines: defender-xdr/experts-on-demand.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.collection:
19
19
- essentials-manage
20
20
ms.topic: conceptual
21
21
search.appverid: met150
22
-
ms.date: 10/14/2024
22
+
ms.date: 10/16/2024
23
23
---
24
24
25
25
# Collaborate with experts on demand
@@ -52,12 +52,12 @@ You need to select one of the following Microsoft Entra ID roles to view and sub
52
52
53
53
To learn more about how Microsoft Entra ID roles map to Microsoft Defender Unified RBAC permissions, see [Microsoft Entra Global roles access](compare-rbac-roles.md#microsoft-entra-global-roles-access).
54
54
55
-
Microsoft Defender Experts customers using Ask Defender Experts capability will also be able to use the following permissions from [Microsoft Defender XDR Unified RBAC](../defender-xdr/custom-permissions-details.md).
55
+
Microsoft Threat Experts customers using Ask Defender Experts capability will also be able to use the following permissions from [Microsoft Defender XDR Unified RBAC](../defender-xdr/custom-permissions-details.md).
0 commit comments