Skip to content

Commit eea827f

Browse files
authored
Merge branch 'main' into docs-editor/aggregated-reporting-1738148425
2 parents 84bb3f0 + 39939dc commit eea827f

33 files changed

+224
-200
lines changed

defender-endpoint/mac-device-control-faq.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: macOS Device control policies frequently asked questions (FAQ)
33
description: Get answers to common questions about device control policies using JAMF or Intune.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -39,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
3940

4041
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
4142

42-
### How do I know whether the policy has been delivered to the client machine?
43+
### How do I know if the policy is delivered to the client machine?
4344

4445
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
4546

defender-endpoint/mac-device-control-intune.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage Device Control using Intune
33
description: Learn how to deploy and manage device control policies using Intune.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -44,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
4445
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4546

4647
> [!NOTE]
47-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4849
4950
### Deploy the mobileconfig file using Intune
5051

defender-endpoint/mac-device-control-jamf.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage device control using JAMF
33
description: Learn how to use device control policies using JAMF.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -42,27 +43,27 @@ Before you get started with Removable Storage Access Control, you must confirm y
4243

4344
### Step 1: Create policy JSON
4445

45-
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46+
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here's the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4647

47-
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4849

4950
### Step 2: Update MDE Preferences Schema
5051

51-
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) has been updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52+
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) is updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
5253

5354
:::image type="content" source="media/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="media/macos-device-control-jamf-mde-preferences-schema.png":::
5455

5556
### Step 3: Add Device Control Policy to MDE Preferences
5657

57-
A new 'Device Control' property will now be available to add to the UX.
58+
A new 'Device Control' property is now available to add to the UX.
5859

5960
1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
6061

6162
:::image type="content" source="media/macos-device-control-jamf-device-control-property.png" alt-text="Shows how to add Device Control in Microsoft Defender for Endpoint" lightbox="media/macos-device-control-jamf-device-control-property.png":::
6263

63-
2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
64+
2. Next, scroll down until you see the **Device Control** property (it's the bottommost entry), and select **Add/Remove properties** directly underneath it.
6465

65-
3. Select **Device Control Policy**, and then click **Apply**.
66+
3. Select **Device Control Policy**, and then select **Apply**.
6667

6768
:::image type="content" source="media/macos-device-control-jamf-device-control-add-remove-property.png" alt-text="Shows how to apply Device Control Policy in Microsoft Defender for Endpoint." lightbox="media/macos-device-control-jamf-device-control-add-remove-property.png":::
6869

defender-endpoint/mac-device-control-manual.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage device control manually
33
description: Learn how to use device control policies manually.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro

defender-endpoint/mac-device-control-overview.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Device control for macOS
33
description: Learn how to configure Microsoft Defender for Endpoint on Mac to reduce threats from removable storage such as USB devices.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -51,7 +52,7 @@ Microsoft Defender for Endpoint Device Control feature enables you to:
5152

5253
- Microsoft Defender for Endpoint entitlement (can be trial)
5354
- Minimum OS version: macOS 11 or higher
54-
- Deploy Full Disk Access: you may already have previously created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
55+
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
5556
- Enable Device Control on the MDE Preference setting:
5657

5758
- Data Loss Prevention (DLP)/Features/
@@ -89,7 +90,7 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
8990

9091
## Understanding policies
9192

92-
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
93+
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
9394

9495
The Device Control for macOS policy includes settings, groups, and rules:
9596

@@ -111,9 +112,9 @@ The Device Control for macOS policy includes settings, groups, and rules:
111112

112113
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
113114

114-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example on a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
115-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when additional specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (e.g. Android phones), but there may still be gaps if the operation is performed using an application that isn't supported by macOS device control.
115+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116+
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` ,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117+
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
117118

118119

119120
### Settings
@@ -122,7 +123,7 @@ Here are the properties you can use when you create the groups, rules, and setti
122123

123124
| Property name | Description | Options |
124125
|:---|:---|:---|
125-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it will not apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126127
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny` |
127128
| ux | You can set a hyperlink on notification. | `navigationTarget: string`. Example: `"http://www.microsoft.com"` |
128129

@@ -167,8 +168,8 @@ Query type 2 is as follows:
167168
| clause $type | value | Description |
168169
|:---|:---|:---|
169170
| `primaryId` | One of: <br>- `apple_devices`<br>- `removable_media_devices` <br>- `portable_devices` <br>- `bluetooth_devices` | |
170-
| `vendorId` | 4 digit hexadecimal string | Matches a device's vendor ID |
171-
| `productId` | 4 digit hexadecimal string | Matches a device's product ID |
171+
| `vendorId` | Four digit hexadecimal string | Matches a device's vendor ID |
172+
| `productId` | Four digit hexadecimal string | Matches a device's product ID |
172173
| `serialNumber` | string | Matches a device's serial number. Doesn't match if the device doesn't have a serial number. |
173174
| `encryption` | apfs | Match if a device is apfs-encrypted. |
174175
| `groupId` | UUID string | Match if a device is a member of another group. The value represents the UUID of the group to match against. <br> The group must be defined within the policy prior to the clause. |
@@ -179,8 +180,8 @@ Query type 2 is as follows:
179180
|:---|:---|:---|
180181
| `id` | GUID, a unique ID, represents the rule and will be used in the policy. | New-Guid (Microsoft.PowerShell.Utility) - PowerShell <br> uuidgen |
181182
| `name` | String, the name of the policy and will display on the toast based on the policy setting. | |
182-
| `includeGroups` | The group(s) that the policy will be applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The **id** value inside the group must be used in this instance. If multiple groups are in the `includeGroups`, it's _AND_. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]` |
183-
| `excludeGroups` | The group(s) that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. |
183+
| `includeGroups` | The groups that the policy will be applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The **id** value inside the group must be used in this instance. If multiple groups are in the `includeGroups`, it's _AND_. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]` |
184+
| `excludeGroups` | The groups that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. |
184185
| `entries` | One rule can have multiple entries; each entry with a unique GUID tells Device Control one restriction.| See entry properties table later in this article to get the details. |
185186

186187
The following table lists the properties you can use in your entry:
@@ -189,7 +190,7 @@ The following table lists the properties you can use in your entry:
189190
|:---|:---|:---|
190191
| `$type` | | Includes: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `PortableDevice`<br/>- `bluetoothDevice`<br/>- `generic` |
191192
| enforcement | | - `$type`:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny`<br/><br/>**When $type allow is selected, options value supports:** <br/>- `disable_audit_allow`<br/> Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event.<br/><br/>**When $type deny is selected, options value supports:** <br/>`disable_audit_deny`<br/>Even if **Block** happens and the **auditDeny** is setting configured, the system won't show notification or send event.<br/><br/>**When $type auditAllow is selected, options value supports:** <br/>`send_event`<br/><br/>**When $type auditDeny is selected, options value supports:** <br/>`send_event`<br/>`show_notification` |
192-
| `access`| |Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193+
| `access`| |Specify one or more access rights for this rule. These might include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193194
| `id`| UUID| |
194195

195196
The following table lists the properties you can use in entry:
@@ -220,7 +221,7 @@ The following table lists the properties you can use in entry:
220221
| **appleDevice** | backup_device | generic_read | |
221222
| appleDevice | update_device | generic_write | |
222223
| appleDevice | download_photos_from_device | generic_read | download photo from the specific iOS device to local machine |
223-
| appleDevice | download_files_from_device | generic_read | download file(s) from the specific iOS device to local machine |
224+
| appleDevice | download_files_from_device | generic_read | download files from the specific iOS device to local machine |
224225
| appleDevice | sync_content_to_device | generic_write | sync content from local machine to specific iOS device |
225226
| **portableDevice**| download_files_from_device | generic_read | |
226227
| portableDevice | send_files_to_device | generic_write | |
@@ -258,7 +259,7 @@ v2_full_disk_access : "approved"
258259
- `active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
259260
- [] - Device Control isn't configured on this machine.
260261
- ["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
261-
- ["v1","v2"] - You have both v1 and v2 enabled. Offboard from v1.
262+
- ["v1,""v2"] - You have both v1 and v2 enabled. Offboard from v1.
262263
- `v1_configured` - v1 configuration is applied
263264
- `v1_enforcement_level` - when v1 is enabled
264265
- `v2_configured` - v2 configuration is applied
@@ -268,7 +269,7 @@ v2_full_disk_access : "approved"
268269

269270
## Reporting
270271

271-
You are able to see the policy event on Advanced hunting and Device Control report. For more information, see [Protect your organization's data with Device Control](device-control-report.md).
272+
You're able to see the policy event on Advanced hunting and Device Control report. For more information, see [Protect your organization's data with Device Control](device-control-report.md).
272273

273274
## Scenarios
274275

@@ -472,10 +473,10 @@ In this case, only have one access rule policy, but if you have multiple, make s
472473
## Known Issues
473474

474475
> [!WARNING]
475-
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI.
476+
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering, and MIDI.
476477
477478
> [!WARNING]
478-
> Device Control on macOS does not prevent software developed on XCode from being transferred to an external device.
479+
> Device Control on macOS doesn't prevent software developed on XCode from being transferred to an external device.
479480
480481

481482

0 commit comments

Comments
 (0)