Skip to content

Commit fc71bc4

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/defender-docs-pr (branch live)
2 parents ba15cf6 + 9b36ebe commit fc71bc4

File tree

8 files changed

+81
-69
lines changed

8 files changed

+81
-69
lines changed

defender-endpoint/behavior-monitor-macos.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
9-
ms.date: 06/06/2025
9+
ms.date: 06/27/2025
1010
ms.subservice: ngp
1111
audience: ITPro
1212
ms.collection:
@@ -32,25 +32,22 @@ f1.keywords: NOCSH
3232
- Microsoft Defender Antivirus
3333
- Supported [versions of macOS](/defender-endpoint/microsoft-defender-endpoint-mac)
3434

35-
> [!IMPORTANT]
36-
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
37-
3835
## Overview of behavior monitoring
3936

4037
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them.
4138

4239
## Prerequisites
4340

4441
- The device must be onboarded to Microsoft Defender for Endpoint.
45-
- [Preview features](/defender-endpoint/preview) must be enabled in the [Microsoft Defender portal](https://security.microsoft.com).
46-
- The device must be in the [Beta channel](/defender-endpoint/mac-updates) (formerly `InsiderFast`).
47-
- The minimum Microsoft Defender for Endpoint version number must be Beta (Insiders-Fast): [101.24042.0002](/defender-endpoint/mac-whatsnew#may-2024-build-101240420008---release-version-2012404280) or newer. The version number refers to the `app_version` (also known as **Platform update**).
42+
- For the best experience, Microsoft Defender should be up-to-date with the latest version.
43+
- The minimum Microsoft Defender for Endpoint version number must be [101.25032.0006](/defender-endpoint/mac-whatsnew#apr-2025-build-101250320006---release-version-2012503260) or newer. The version number refers to the `app_version` (also known as **Platform update**).
4844
- Real-time protection (RTP) must be enabled.
4945
- [Cloud-delivered protection](/defender-endpoint/mac-preferences) must be enabled.
50-
- The device must be explicitly enrolled in the preview program.
5146

5247
## Deployment instructions for behavior monitoring
5348

49+
Behavior Monitoring will soon be on by default. You can confirm your device’s enrollment status by checking the output of ***mdatp health --details features*** in your terminal. If not already enabled, you must configure it.
50+
5451
To deploy behavior monitoring in Microsoft Defender for Endpoint on macOS, you must change the behavior monitoring policy using one of the following methods:
5552

5653
- [Intune](#intune-deployment)
@@ -243,7 +240,7 @@ Once done, disable behavior monitoring statistics:
243240
sudo mdatp config behavior-monitoring-statistics --value disabled
244241
```
245242

246-
If the issue persists, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
243+
If the issue persists, especially after a reboot, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
247244

248245
## Network real-time inspection for macOS
249246

@@ -283,12 +280,12 @@ NRI should have a low impact on network performance. Instead of holding the conn
283280
sudo mdatp config behavior-monitoring --value enabled
284281
```
285282

286-
3. Enable network protection in block mode:
283+
1. Enable network protection in block mode:
287284

288285
```Bash
289286
sudo mdatp config network-protection enforcement-level --value block
290287
```
291-
288+
292289
1. Enable network real-time inspection (NRI):
293290

294291
```Bash

defender-endpoint/configure-device-connectivity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 06/11/2025
17+
ms.date: 06/27/2025
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -162,11 +162,11 @@ The following table lists the current static IP ranges covered by the MicrosoftD
162162

163163
Configure devices to communicate through your connectivity infrastructure. Ensure devices meet prerequisites and have updated sensor and Microsoft Defender Antivirus versions. For more information, see [Configure device proxy and Internet connection settings ](configure-proxy-internet.md).
164164

165-
### Stage 3. Verify client connectivity preonboarding
165+
### Stage 3. Verify client connectivity pre-onboarding
166166

167167
For more information, see [Verify client connectivity](verify-connectivity.md).
168168

169-
The following preonboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
169+
The following pre-onboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
170170

171171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
172172

defender-endpoint/mac-install-with-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: install-set-up-deploy
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/24/2025
18+
ms.date: 06/27/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -64,7 +64,7 @@ Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid
6464

6565
1. In the [Intune admin center](https://intune.microsoft.com/#home), go to **Devices**, and under **Manage Devices**, select **Configuration**.
6666

67-
1. On the **Policies** tab, select **Create** > **New Policy**.
67+
1. Under Configuration tab, On the **Policies** tab, select **+ Create** > **+ New Policy**.
6868

6969
1. Under **Platform**, select **macOS**.
7070

defender-endpoint/mac-whatsnew.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: emmwalshh
66
ms.author: ewalsh
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 06/13/2025
9+
ms.date: 06/27/2025
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -62,14 +62,25 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6262

6363
## macOS Deprecation
6464

65-
- Microsoft Defender for Endpoint no longer supports Big Sur (11).
66-
- macOS 12 (Monterey) won't be supported starting December 2024.
65+
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur) and 12 (Monterey).
6766

6867
## Releases for Defender for Endpoint on macOS
6968

70-
### Behavior Monitoring for macOS is now in public preview
69+
### Behavior Monitoring for macOS is now generally available
7170

72-
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
71+
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
72+
73+
### Jun-2025 (Build: 101.25052.0012 | Release version: 20.125052.12.0)
74+
75+
| Build: | **101.25052.0012** |
76+
|--------------------|-----------------------|
77+
| Release version: | **20.125052.12.0** |
78+
| Engine version: | **1.1.25060.3000** |
79+
| Signature version: | **1.431.226.0** |
80+
81+
##### What's new
82+
83+
- Bug and performance fixes
7384

7485
### May-2025 (Build: 101.25042.0009 | Release version: 20.125042.9.0)
7586

@@ -96,6 +107,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
96107

97108
- Hardware UUID is now displayed in the Security Portal
98109
- Bug and performance fixes
110+
- **(GA) Behavior Monitoring for macOS**: For information on Behavior Monitoring for Microsoft Defender for Endpoint on macOS, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
99111

100112
### Mar-2025 (Build: 101.25022.0003 | Release version: 20.125022.3.0)
101113

defender-endpoint/onboard-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/02/2025
17+
ms.date: 06/27/2025
1818
---
1919

2020
# Onboard servers through Microsoft Defender for Endpoint's onboarding experience
@@ -172,7 +172,7 @@ The following points apply to Windows Server 2016 and Windows Server 2012 R2:
172172

173173
- Not all attack surface reduction rules are applicable to all operating systems. See [Attack surface reduction rules](attack-surface-reduction-rules-reference.md).
174174

175-
- Operating system upgrades aren't supported. Offboard then uninstall before upgrading. The installer package can only be used to upgrade installations that haven't yet been updated with new anti-malware platform or EDR sensor update packages.
175+
- Operating system upgrades are supported on Windows 10 and 11, and Windows Server 2019 or later. These versions include the necessary Defender for Endpoint components. For Windows Server 2016 and earlier, you must offboard from Defender for Endpoint and uninstall Defender for Endpoint before upgrading the OS.
176176

177177
- To automatically deploy and onboard the new solution using Microsoft Endpoint Configuration Manager (MECM) you need to be on [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016). You can still configure and deploy using version 2107 with the hotfix rollup, but this requires extra deployment steps. See [Microsoft Endpoint Configuration Manager migration scenarios](server-migration.md#microsoft-endpoint-configuration-manager-migration-scenarios) for more information.
178178

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 03/04/2025
17+
ms.date: 06/27/2025
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -55,17 +55,17 @@ This article provides instructions on how to run the tool via Live Response on W
5555

5656
Repeat this step for the `MDEClientAnalyzerPreview.zip` file.
5757

58-
6. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
58+
1. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5959

60-
```console
60+
```console
6161
Putfile MDEClientAnalyzerPreview.zip
6262
Run MDELiveAnalyzer.ps1
6363
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
6464
```
6565

6666
[![Image of commands.](media/analyzer-commands.png)](media/analyzer-commands.png#lightbox)
6767

68-
68+
6969
### Additional information
7070

7171
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
@@ -108,24 +108,24 @@ The following script performs the first six steps of the [Running the Binary ver
108108

109109
```bash
110110
#! /usr/bin/bash
111-
111+
112112
echo "Starting Client Analyzer Script. Running As:"
113113
whoami
114-
114+
115115
echo "Getting XMDEClientAnalyzerBinary"
116116
wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/?linkid=2297517
117-
echo '9D0552DBBD1693D2E2ED55F36147019CFECFDC009E76BAC4186CF03CD691B469 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118-
117+
echo 'c65a4e4c6851d130942bfacd147a9d18b8a92b4f50facf519477fd1c41a1c323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118+
119119
echo "Unzipping XMDEClientAnalyzerBinary.zip"
120120
unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
121-
121+
122122
echo "Unzipping SupportToolLinuxBinary.zip"
123-
unzip -q /tmp/XMDEClientAnalyzerBinary/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
124-
123+
unzip -q /tmp/XMDEClientAnalyzerBinary/XMDEClientAnalyzer/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
124+
125125
echo "MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
126-
126+
127127
```
128-
128+
129129
#### Python Client Analyzer Install Script
130130

131131
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](/defender-endpoint/overview-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.

0 commit comments

Comments
 (0)