You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-faq.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: macOS Device control policies frequently asked questions (FAQ)
3
3
description: Get answers to common questions about device control policies using JAMF or Intune.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -39,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
39
40
40
41
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
41
42
42
-
### How do I know whether the policy has been delivered to the client machine?
43
+
### How do I know if the policy is delivered to the client machine?
43
44
44
45
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-intune.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: Deploy and manage Device Control using Intune
3
3
description: Learn how to deploy and manage device control policies using Intune.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -44,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
44
45
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
45
46
46
47
> [!NOTE]
47
-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48
+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-jamf.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: Deploy and manage device control using JAMF
3
3
description: Learn how to use device control policies using JAMF.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -42,27 +43,27 @@ Before you get started with Removable Storage Access Control, you must confirm y
42
43
43
44
### Step 1: Create policy JSON
44
45
45
-
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46
+
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here's the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46
47
47
-
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48
+
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
48
49
49
50
### Step 2: Update MDE Preferences Schema
50
51
51
-
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json)has been updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52
+
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json)is updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52
53
53
54
:::image type="content" source="media/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="media/macos-device-control-jamf-mde-preferences-schema.png":::
54
55
55
56
### Step 3: Add Device Control Policy to MDE Preferences
56
57
57
-
A new 'Device Control' property will now be available to add to the UX.
58
+
A new 'Device Control' property is now available to add to the UX.
58
59
59
60
1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
60
61
61
62
:::image type="content" source="media/macos-device-control-jamf-device-control-property.png" alt-text="Shows how to add Device Control in Microsoft Defender for Endpoint" lightbox="media/macos-device-control-jamf-device-control-property.png":::
62
63
63
-
2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
64
+
2. Next, scroll down until you see the **Device Control** property (it's the bottommost entry), and select **Add/Remove properties** directly underneath it.
64
65
65
-
3. Select **Device Control Policy**, and then click**Apply**.
66
+
3. Select **Device Control Policy**, and then select**Apply**.
66
67
67
68
:::image type="content" source="media/macos-device-control-jamf-device-control-add-remove-property.png" alt-text="Shows how to apply Device Control Policy in Microsoft Defender for Endpoint." lightbox="media/macos-device-control-jamf-device-control-add-remove-property.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-overview.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: Device control for macOS
3
3
description: Learn how to configure Microsoft Defender for Endpoint on Mac to reduce threats from removable storage such as USB devices.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -51,7 +52,7 @@ Microsoft Defender for Endpoint Device Control feature enables you to:
51
52
52
53
- Microsoft Defender for Endpoint entitlement (can be trial)
53
54
- Minimum OS version: macOS 11 or higher
54
-
- Deploy Full Disk Access: you may already have previously created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
55
+
- Deploy Full Disk Access: you might have created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.
55
56
- Enable Device Control on the MDE Preference setting:
56
57
57
58
- Data Loss Prevention (DLP)/Features/
@@ -89,7 +90,7 @@ Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/
89
90
90
91
## Understanding policies
91
92
92
-
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
93
+
Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
93
94
94
95
The Device Control for macOS policy includes settings, groups, and rules:
95
96
@@ -111,9 +112,9 @@ The Device Control for macOS policy includes settings, groups, and rules:
111
112
112
113
Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
113
114
114
-
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example on a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
115
-
- To stay consistent with Windows, there are ```generic_read```,```generic_write``` and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when additional specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
116
-
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (e.g. Android phones), but there may still be gaps if the operation is performed using an application that isn't supported by macOS device control.
115
+
- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example of a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.
116
+
- To stay consistent with Windows, there are ```generic_read```,```generic_write```,and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when more specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.
117
+
- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (for example, Android phones), but there might still be gaps if the operation is performed using an application that isn't supported by macOS device control.
117
118
118
119
119
120
### Settings
@@ -122,7 +123,7 @@ Here are the properties you can use when you create the groups, rules, and setti
122
123
123
124
| Property name | Description | Options |
124
125
|:---|:---|:---|
125
-
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it will not apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126
+
| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it won't apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
126
127
| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny`|
127
128
| ux | You can set a hyperlink on notification. |`navigationTarget: string`. Example: `"http://www.microsoft.com"`|
128
129
@@ -167,8 +168,8 @@ Query type 2 is as follows:
167
168
| clause $type | value | Description |
168
169
|:---|:---|:---|
169
170
|`primaryId`| One of: <br>- `apple_devices`<br>- `removable_media_devices` <br>- `portable_devices` <br>- `bluetooth_devices`||
170
-
|`vendorId`|4 digit hexadecimal string | Matches a device's vendor ID |
171
-
|`productId`|4 digit hexadecimal string | Matches a device's product ID |
171
+
|`vendorId`|Four digit hexadecimal string | Matches a device's vendor ID |
172
+
|`productId`|Four digit hexadecimal string | Matches a device's product ID |
172
173
|`serialNumber`| string | Matches a device's serial number. Doesn't match if the device doesn't have a serial number. |
173
174
|`encryption`| apfs | Match if a device is apfs-encrypted. |
174
175
|`groupId`| UUID string | Match if a device is a member of another group. The value represents the UUID of the group to match against. <br> The group must be defined within the policy prior to the clause. |
@@ -179,8 +180,8 @@ Query type 2 is as follows:
179
180
|:---|:---|:---|
180
181
|`id`| GUID, a unique ID, represents the rule and will be used in the policy. | New-Guid (Microsoft.PowerShell.Utility) - PowerShell <br> uuidgen |
181
182
|`name`| String, the name of the policy and will display on the toast based on the policy setting. ||
182
-
|`includeGroups`| The group(s) that the policy will be applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The **id** value inside the group must be used in this instance. If multiple groups are in the `includeGroups`, it's _AND_. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]`|
183
-
|`excludeGroups`| The group(s) that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. |
183
+
|`includeGroups`| The groups that the policy will be applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The **id** value inside the group must be used in this instance. If multiple groups are in the `includeGroups`, it's _AND_. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]`|
184
+
|`excludeGroups`| The groups that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. |
184
185
|`entries`| One rule can have multiple entries; each entry with a unique GUID tells Device Control one restriction.| See entry properties table later in this article to get the details. |
185
186
186
187
The following table lists the properties you can use in your entry:
@@ -189,7 +190,7 @@ The following table lists the properties you can use in your entry:
| enforcement || - `$type`:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny`<br/><br/>**When $type allow is selected, options value supports:** <br/>- `disable_audit_allow`<br/> Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event.<br/><br/>**When $type deny is selected, options value supports:** <br/>`disable_audit_deny`<br/>Even if **Block** happens and the **auditDeny** is setting configured, the system won't show notification or send event.<br/><br/>**When $type auditAllow is selected, options value supports:** <br/>`send_event`<br/><br/>**When $type auditDeny is selected, options value supports:** <br/>`send_event`<br/>`show_notification`|
192
-
|`access`||Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193
+
|`access`||Specify one or more access rights for this rule. These might include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
193
194
|`id`| UUID||
194
195
195
196
The following table lists the properties you can use in entry:
@@ -220,7 +221,7 @@ The following table lists the properties you can use in entry:
220
221
|**appleDevice**| backup_device | generic_read ||
221
222
| appleDevice | update_device | generic_write ||
222
223
| appleDevice | download_photos_from_device | generic_read | download photo from the specific iOS device to local machine |
223
-
| appleDevice | download_files_from_device | generic_read | download file(s) from the specific iOS device to local machine |
224
+
| appleDevice | download_files_from_device | generic_read | download files from the specific iOS device to local machine |
224
225
| appleDevice | sync_content_to_device | generic_write | sync content from local machine to specific iOS device |
-`active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
259
260
-[] - Device Control isn't configured on this machine.
260
261
-["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
261
-
-["v1","v2"] - You have both v1 and v2 enabled. Offboard from v1.
262
+
-["v1,""v2"] - You have both v1 and v2 enabled. Offboard from v1.
You are able to see the policy event on Advanced hunting and Device Control report. For more information, see [Protect your organization's data with Device Control](device-control-report.md).
272
+
You're able to see the policy event on Advanced hunting and Device Control report. For more information, see [Protect your organization's data with Device Control](device-control-report.md).
272
273
273
274
## Scenarios
274
275
@@ -472,10 +473,10 @@ In this case, only have one access rule policy, but if you have multiple, make s
472
473
## Known Issues
473
474
474
475
> [!WARNING]
475
-
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI.
476
+
> Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control doesn't restrict other modes such as File Transfer, USB Tethering, and MIDI.
476
477
477
478
> [!WARNING]
478
-
> Device Control on macOS does not prevent software developed on XCode from being transferred to an external device.
479
+
> Device Control on macOS doesn't prevent software developed on XCode from being transferred to an external device.
0 commit comments