Skip to content

Commit f0cdf5d

Browse files
committed
Update mac-install-with-intune.md
1 parent 2367346 commit f0cdf5d

File tree

1 file changed

+23
-67
lines changed

1 file changed

+23
-67
lines changed

defender-endpoint/mac-install-with-intune.md

Lines changed: 23 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Before you get started, see [the main Microsoft Defender for Endpoint on macOS p
3434

3535
## Overview
3636

37-
The following table summarizes the steps to deploy and manage Microsoft Defender for Endpoint on Macs via Microsoft Intune:
37+
The following table summarizes the steps to deploy and manage Microsoft Defender for Endpoint on Macs via Microsoft Intune. See the following table for more detailed steps:
3838

3939
|Step |Sample file name |Bundle identifier |
4040
|---------|---------|---------|
@@ -59,7 +59,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
5959

6060
### Step 1: Approve system extensions
6161

62-
This profile is needed for Big Sur (11) or later. It is ignored on older versions of macOS since they use the kernel extension.
62+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
6363

6464
1. Under **Configuration profiles**, select **Create Profile**.
6565

@@ -88,7 +88,9 @@ This profile is needed for Big Sur (11) or later. It is ignored on older version
8888

8989
:::image type="content" source="../defender-endpoint/media/mac-system-extension-intune2.png" alt-text="Screenshot that shows the settings of the system's extension." lightbox="../defender-endpoint/media/mac-system-extension-intune2.png":::
9090

91-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
91+
1. Select **Next**.
92+
93+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
9294

9395
1. Review the configuration profile. Select **Create**.
9496

@@ -117,46 +119,18 @@ To configure your network filter:
117119

118120
7. Select **Next**.
119121

120-
8. On the **Configuration settings** tab, enter a Cus**tom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
122+
8. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
121123

122-
9. Choose a Deployment channel.
124+
9. Choose a Deployment channel and select **Next**.
123125

124126
10. Select **Next**.
125127

126-
11. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
128+
11. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
127129

128130
12. Review the configuration profile. Select **Create**.
129131

130132
### Step 3: Full Disk Access
131133

132-
Starting with macOS Catalina (10.15) or newer, to provide privacy for the end-users, it created the **FDA (Full Disk Access)**.
133-
134-
On this macOS Catalina v10.15 (or newer) platform, when you deploy Microsoft Defender for Endpoint using Intune, you can configure an FDA profile by doing the following steps:
135-
136-
1. Under **Configuration profiles**, select **Create Profile**.
137-
138-
1. Under **Platform**, select **macOS**.
139-
140-
1. Under **Profile type**, select **Templates**.
141-
142-
1. Under **Template name**, select **Custom**.
143-
144-
1. Select **Create**.
145-
146-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
147-
148-
1. Select **Next**.
149-
150-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
151-
152-
1. Choose a **Deployment channel**.
153-
154-
1. Select **Next**.
155-
156-
1. Review the configuration profile. Select **Create**.
157-
158-
### Full Disk Access
159-
160134
> [!NOTE]
161135
> Starting with macOS Catalina (10.15) or newer, in order to provide privacy for the end-users, it created the **FDA** (Full Disk Access). Enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly.
162136
>
@@ -184,32 +158,17 @@ To configure Full Disk Access:
184158

185159
1. Select a **Configuration profile file**.
186160

187-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
161+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
188162

189163
1. Review the configuration profile. Select **Create**.
190164

191-
By implementing these steps, you are ensuring that FDA is granted to Microsoft Defender for Endpoint.
192-
193165
> [!NOTE]
194-
> FDA granted through Apple MDM Configuration Profile isn't reflected in **System Settings > Privacy & Security > Full Disk Access**.
195-
196-
If you previously configured Microsoft Defender for Endpoint through Intune, we recommend you update the deployment with this configuration profile. In other words, you can upgrade the macOS—on which you've deployed Microsoft defender for Endpoint using Intune—from its current version to v10.15 to ensure that FDA is granted to Microsoft Defender for Endpoint.
197-
198-
> [!TIP]
199-
> If you already have an FDA profile, edit and add the Microsoft Defender for Endpoint on macOS settings instead of creating a new one. Apple only supports 1 bundle ID, in this case the FDA profile.
200-
201-
> [!IMPORTANT]
202-
> While adding the Microsoft Defender for Endpoint on macOS settings onto an existing FDA profile, enable **TCC** (Transparency, Consent & Control) through [Intune](mac-install-with-intune.md), a Mobile Device Management solution. Enabling TCC eliminates the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly.
203-
204-
Download [**fulldisk.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
205-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
166+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings > Privacy & Security > Full Disk Access**.
206167
207168
### Step 4: Background services
208169

209170
> [!CAUTION]
210-
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
211-
>
212-
> This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Microsoft Intune, we recommend you update the deployment with this configuration profile.
171+
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background. This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Microsoft Intune, we recommend you update the deployment with this configuration profile.
213172
214173
Download [background_services.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
215174

@@ -225,19 +184,19 @@ To configure background services:
225184

226185
1. Select **Create**.
227186

228-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
187+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
229188

230189
1. Select **Next**.
231190

232-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
191+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `backgroundServices-prod-macOS-Default-MDE`.
233192

234193
1. Choose a **Deployment channel**.
235194

236195
1. Select **Next**.
237196

238197
1. Select a **Configuration profile file**.
239198

240-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
199+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
241200

242201
1. Review the configuration profile. Select **Create**.
243202

@@ -263,19 +222,17 @@ To configure notifications:
263222

264223
1. Select **Create**.
265224

266-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
225+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
267226

268227
1. Select **Next**.
269228

270-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notification.mobileconfig`.
271-
272-
1. Choose a **Deployment channel**.
229+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notif.mobileconfig`.
273230

274-
1. Select **Next**.
231+
1. Choose a **Deployment channel** and then select **Next**.
275232

276233
1. Select a **Configuration profile file**.
277234

278-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
235+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
279236

280237
1. Review the configuration profile. Select **Create**.
281238

@@ -307,7 +264,7 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
307264

308265
1. Select a **Configuration profile file**.
309266

310-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
267+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
311268

312269
1. Review the configuration profile. Select **Create**.
313270

@@ -358,7 +315,7 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
358315

359316
1. Select a **Configuration profile file**.
360317

361-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
318+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
362319

363320
1. Review the configuration profile. Select **Create**.
364321

@@ -418,7 +375,7 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
418375

419376
:::image type="content" source="../defender-endpoint/media/networkprotection3.png" alt-text="Screenshot that shows the Create a new policy page." lightbox="../defender-endpoint/media/networkprotection3.png":::
420377

421-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
378+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
422379

423380
:::image type="content" source="../defender-endpoint/media/networkprotection4.png" alt-text="Screenshot that shows the page on which you configure the settings for the Assignments option." lightbox="../defender-endpoint/media/networkprotection4.png":::
424381

@@ -506,8 +463,7 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
506463

507464
:::image type="content" source="../defender-endpoint/media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="../defender-endpoint/media/mdatp-11-assignments.png":::
508465

509-
1. Review and **Create**.
510-
You can visit **Apps** > **By platform** > **macOS** to see it on the list of all applications.
466+
1. Review and **Create**. You can visit **Apps** > **By platform** > **macOS** to see it on the list of all applications.
511467

512468
:::image type="content" source="../defender-endpoint/media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="../defender-endpoint/media/mdatp-12-applications.png":::
513469

@@ -576,7 +532,7 @@ To deploy the onboarding package:
576532

577533
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png" alt-text="Screenshot that shows the configuration settings." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png":::
578534

579-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
535+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
580536

581537
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png" alt-text="Screenshot that shows the Assignments tab." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png":::
582538

0 commit comments

Comments
 (0)