You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/tamperprotection-macos.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ You can configure the tamper protection mode by providing the mode name as enfor
87
87
- Ensure that Defender for Endpoint has **Full Disk Access** authorization.
88
88
89
89
> [!NOTE]
90
-
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
90
+
> Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured device, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a Global Administrator revoking **Full Disk Access** Authorization by a local admin.
91
91
92
92
## Configure tamper protection on macOS devices
93
93
@@ -100,15 +100,14 @@ Microsoft Defender evaluates these settings in the following order. If a higher
3. If tamper protection is enabled in the Microsoft Defender portal, "block" mode is used (in preview; not available to all customers).
103
+
3. If tamper protection is enabled in the [Microsoft Defender portal](https://security.microsoft.com), "block" mode is used (in preview; not available to all customers).
104
104
105
-
4. If machine is licensed, then "audit" mode is used by default.
106
-
107
-
5. If machine isn't licensed, then tamper protection is in the "block" mode
105
+
- If the device is licensed, then "audit" mode is used by default.
106
+
- If the device isn't licensed, then tamper protection is in the "block" mode.
108
107
109
108
### Before you begin
110
109
111
-
Make sure that your machine is licensed and healthy (corresponding values report `true`):
110
+
Make sure that your device is licensed and healthy (corresponding values report `true`):

136
135
137
136
> [!NOTE]
138
-
> You must use managed configuration profile (deployed via MDM) on production machines. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a Global Administrator will be able to undo it.
137
+
> You must use managed configuration profile (deployed via MDM) on production devices. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a Global Administrator will be able to undo it.
Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the machine:
325
+
Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the device:
327
326
328
327
```console
329
328
<?xml version="1.0" encoding="UTF-8"?>
@@ -410,8 +409,8 @@ As an example, macOS can upgrade Defender's package, if tamper protection verifi
410
409
There are other exclusions as well.
411
410
For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
412
411
413
-
There are situations when a Global Administrator needs to restart Defender on all or some managed machines.
414
-
Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
412
+
There are situations when a Global Administrator needs to restart Defender on all or some managed devices.
413
+
Typically it's done by creating and running a JAMF's policy that runs a script on remote devices (or similar operations for other MDM vendors.)
415
414
416
415
In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune, and permits tampering operations from them. At the same time, tamper protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
0 commit comments