You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-install-with-intune.md
+23-67Lines changed: 23 additions & 67 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Before you get started, see [the main Microsoft Defender for Endpoint on macOS p
34
34
35
35
## Overview
36
36
37
-
The following table summarizes the steps to deploy and manage Microsoft Defender for Endpoint on Macs via Microsoft Intune:
37
+
The following table summarizes the steps to deploy and manage Microsoft Defender for Endpoint on Macs via Microsoft Intune. See the following table for more detailed steps:
38
38
39
39
|Step |Sample file name |Bundle identifier |
40
40
|---------|---------|---------|
@@ -59,7 +59,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
59
59
60
60
### Step 1: Approve system extensions
61
61
62
-
This profile is needed for Big Sur (11) or later. It is ignored on older versions of macOS since they use the kernel extension.
62
+
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
63
63
64
64
1. Under **Configuration profiles**, select **Create Profile**.
65
65
@@ -88,7 +88,9 @@ This profile is needed for Big Sur (11) or later. It is ignored on older version
88
88
89
89
:::image type="content" source="../defender-endpoint/media/mac-system-extension-intune2.png" alt-text="Screenshot that shows the settings of the system's extension." lightbox="../defender-endpoint/media/mac-system-extension-intune2.png":::
90
90
91
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
91
+
1. Select **Next**.
92
+
93
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
92
94
93
95
1. Review the configuration profile. Select **Create**.
94
96
@@ -117,46 +119,18 @@ To configure your network filter:
117
119
118
120
7. Select **Next**.
119
121
120
-
8. On the **Configuration settings** tab, enter a Cus**tom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
122
+
8. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
121
123
122
-
9. Choose a Deployment channel.
124
+
9. Choose a Deployment channel and select **Next**.
123
125
124
126
10. Select **Next**.
125
127
126
-
11. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
128
+
11. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
127
129
128
130
12. Review the configuration profile. Select **Create**.
129
131
130
132
### Step 3: Full Disk Access
131
133
132
-
Starting with macOS Catalina (10.15) or newer, to provide privacy for the end-users, it created the **FDA (Full Disk Access)**.
133
-
134
-
On this macOS Catalina v10.15 (or newer) platform, when you deploy Microsoft Defender for Endpoint using Intune, you can configure an FDA profile by doing the following steps:
135
-
136
-
1. Under **Configuration profiles**, select **Create Profile**.
137
-
138
-
1. Under **Platform**, select **macOS**.
139
-
140
-
1. Under **Profile type**, select **Templates**.
141
-
142
-
1. Under **Template name**, select **Custom**.
143
-
144
-
1. Select **Create**.
145
-
146
-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
147
-
148
-
1. Select **Next**.
149
-
150
-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
151
-
152
-
1. Choose a **Deployment channel**.
153
-
154
-
1. Select **Next**.
155
-
156
-
1. Review the configuration profile. Select **Create**.
157
-
158
-
### Full Disk Access
159
-
160
134
> [!NOTE]
161
135
> Starting with macOS Catalina (10.15) or newer, in order to provide privacy for the end-users, it created the **FDA** (Full Disk Access). Enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly.
162
136
>
@@ -184,32 +158,17 @@ To configure Full Disk Access:
184
158
185
159
1. Select a **Configuration profile file**.
186
160
187
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
161
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
188
162
189
163
1. Review the configuration profile. Select **Create**.
190
164
191
-
By implementing these steps, you are ensuring that FDA is granted to Microsoft Defender for Endpoint.
192
-
193
165
> [!NOTE]
194
-
> FDA granted through Apple MDM Configuration Profile isn't reflected in **System Settings > Privacy & Security > Full Disk Access**.
195
-
196
-
If you previously configured Microsoft Defender for Endpoint through Intune, we recommend you update the deployment with this configuration profile. In other words, you can upgrade the macOS—on which you've deployed Microsoft defender for Endpoint using Intune—from its current version to v10.15 to ensure that FDA is granted to Microsoft Defender for Endpoint.
197
-
198
-
> [!TIP]
199
-
> If you already have an FDA profile, edit and add the Microsoft Defender for Endpoint on macOS settings instead of creating a new one. Apple only supports 1 bundle ID, in this case the FDA profile.
200
-
201
-
> [!IMPORTANT]
202
-
> While adding the Microsoft Defender for Endpoint on macOS settings onto an existing FDA profile, enable **TCC** (Transparency, Consent & Control) through [Intune](mac-install-with-intune.md), a Mobile Device Management solution. Enabling TCC eliminates the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly.
203
-
204
-
Download [**fulldisk.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
205
-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
166
+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings > Privacy & Security > Full Disk Access**.
206
167
207
168
### Step 4: Background services
208
169
209
170
> [!CAUTION]
210
-
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
211
-
>
212
-
> This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Microsoft Intune, we recommend you update the deployment with this configuration profile.
171
+
> macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background. This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Microsoft Intune, we recommend you update the deployment with this configuration profile.
213
172
214
173
Download [background_services.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
215
174
@@ -225,19 +184,19 @@ To configure background services:
225
184
226
185
1. Select **Create**.
227
186
228
-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
187
+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
229
188
230
189
1. Select **Next**.
231
190
232
-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
191
+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `backgroundServices-prod-macOS-Default-MDE`.
233
192
234
193
1. Choose a **Deployment channel**.
235
194
236
195
1. Select **Next**.
237
196
238
197
1. Select a **Configuration profile file**.
239
198
240
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
199
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
241
200
242
201
1. Review the configuration profile. Select **Create**.
243
202
@@ -263,19 +222,17 @@ To configure notifications:
263
222
264
223
1. Select **Create**.
265
224
266
-
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
225
+
1. On the **Basics** tab, **Name** the profile. For example, `BackgroundServices-prod-macOS-Default-MDE`.
267
226
268
227
1. Select **Next**.
269
228
270
-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notification.mobileconfig`.
271
-
272
-
1. Choose a **Deployment channel**.
229
+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notif.mobileconfig`.
273
230
274
-
1.Select**Next**.
231
+
1.Choose a **Deployment channel** and then select**Next**.
275
232
276
233
1. Select a **Configuration profile file**.
277
234
278
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
235
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
279
236
280
237
1. Review the configuration profile. Select **Create**.
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
318
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
362
319
363
320
1. Review the configuration profile. Select **Create**.
364
321
@@ -418,7 +375,7 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
418
375
419
376
:::image type="content" source="../defender-endpoint/media/networkprotection3.png" alt-text="Screenshot that shows the Create a new policy page." lightbox="../defender-endpoint/media/networkprotection3.png":::
420
377
421
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
378
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
422
379
423
380
:::image type="content" source="../defender-endpoint/media/networkprotection4.png" alt-text="Screenshot that shows the page on which you configure the settings for the Assignments option." lightbox="../defender-endpoint/media/networkprotection4.png":::
424
381
@@ -506,8 +463,7 @@ This step enables deploying Microsoft Defender for Endpoint to enrolled machines
506
463
507
464
:::image type="content" source="../defender-endpoint/media/mdatp-11-assignments.png" alt-text="Screenshot that shows the Intune assignments information page." lightbox="../defender-endpoint/media/mdatp-11-assignments.png":::
508
465
509
-
1. Review and **Create**.
510
-
You can visit **Apps** > **By platform** > **macOS** to see it on the list of all applications.
466
+
1. Review and **Create**. You can visit **Apps** > **By platform** > **macOS** to see it on the list of all applications.
511
467
512
468
:::image type="content" source="../defender-endpoint/media/mdatp-12-applications.png" alt-text="Screenshot that shows the application lists page." lightbox="../defender-endpoint/media/mdatp-12-applications.png":::
513
469
@@ -576,7 +532,7 @@ To deploy the onboarding package:
576
532
577
533
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png" alt-text="Screenshot that shows the configuration settings." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles.png":::
578
534
579
-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
535
+
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
580
536
581
537
:::image type="content" source="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png" alt-text="Screenshot that shows the Assignments tab." lightbox="../defender-endpoint/media/mdatp-6-systemconfigurationprofiles-3.png":::
0 commit comments