Skip to content

Commit fa308d8

Browse files
committed
Update tamperprotection-macos.md
1 parent b379a30 commit fa308d8

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

defender-endpoint/tamperprotection-macos.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You can configure the tamper protection mode by providing the mode name as enfor
8787
- Ensure that Defender for Endpoint has **Full Disk Access** authorization.
8888

8989
> [!NOTE]
90-
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
90+
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured device, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
9191
9292
## Configure tamper protection on macOS devices
9393

@@ -100,15 +100,14 @@ Microsoft Defender evaluates these settings in the following order. If a higher
100100

101101
2. [Manual configuration](#manual-configuration) (with `mdatp config tamper-protection enforcement-level --value { disabled|audit|block }`)
102102

103-
3. If tamper protection is enabled in the Microsoft Defender portal, "block" mode is used (in preview; not available to all customers).
103+
3. If tamper protection is enabled in the [Microsoft Defender portal](https://security.microsoft.com), "block" mode is used (in preview; not available to all customers).
104104

105-
4. If machine is licensed, then "audit" mode is used by default.
106-
107-
5. If machine isn't licensed, then tamper protection is in the "block" mode
105+
- If the device is licensed, then "audit" mode is used by default.
106+
- If the device isn't licensed, then tamper protection is in the "block" mode.
108107

109108
### Before you begin
110109

111-
Make sure that your machine is licensed and healthy (corresponding values report `true`):
110+
Make sure that your device is licensed and healthy (corresponding values report `true`):
112111

113112
```bash
114113
mdatp health
@@ -135,7 +134,7 @@ sudo mdatp config tamper-protection enforcement-level --value block
135134
![Image of manual configuration command](media/manual-config-cmd.png)
136135

137136
> [!NOTE]
138-
> You must use managed configuration profile (deployed via MDM) on production machines. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a Global Administrator will be able to undo it.
137+
> You must use managed configuration profile (deployed via MDM) on production devices. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a Global Administrator will be able to undo it.
139138
140139
2. Verify the result.
141140

@@ -323,7 +322,7 @@ sudo mdatp config tamper-protection enforcement-level --value disabled
323322

324323
## JAMF
325324

326-
Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the machine:
325+
Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the device:
327326

328327
```console
329328
<?xml version="1.0" encoding="UTF-8"?>
@@ -410,8 +409,8 @@ As an example, macOS can upgrade Defender's package, if tamper protection verifi
410409
There are other exclusions as well.
411410
For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
412411

413-
There are situations when a Global Administrator needs to restart Defender on all or some managed machines.
414-
Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
412+
There are situations when a Global Administrator needs to restart Defender on all or some managed devices.
413+
Typically it's done by creating and running a JAMF's policy that runs a script on remote devices (or similar operations for other MDM vendors.)
415414

416415
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
417416

0 commit comments

Comments
 (0)