mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
markdown linting
This commit is contained in:
parent
1372d3faed
commit
12bebd56e8
@ -22,8 +22,8 @@ ms.topic: conceptual
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change.
|
This topic describes how to install and use Microsoft Defender ATP for Mac. It supports the preview program and the information here is subject to change.
|
||||||
Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program.
|
Microsoft Defender ATP for Mac is not yet widely available, and this topic only applies to enterprise customers who have been accepted into the preview program.
|
||||||
|
|
||||||
## What’s new in the public preview
|
## What’s new in the public preview
|
||||||
|
|
||||||
@ -38,14 +38,17 @@ We've been working hard through the private preview period, and we've heard your
|
|||||||
- Admins can set their cloud preference for any location, not just for those in the US.
|
- Admins can set their cloud preference for any location, not just for those in the US.
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine.
|
You should have beginner-level experience in macOS and BASH scripting. You must have administrative privileges on the machine.
|
||||||
|
|
||||||
You should also have access to Windows Defender Security Center.
|
You should also have access to Windows Defender Security Center.
|
||||||
|
|
||||||
### System Requirements
|
### System Requirements
|
||||||
|
|
||||||
Microsoft Defender ATP for Mac system requirements:
|
Microsoft Defender ATP for Mac system requirements:
|
||||||
|
|
||||||
- macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra)
|
- macOS version: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra)
|
||||||
- Disk space during preview: 1GB
|
- Disk space during preview: 1GB
|
||||||
|
|
||||||
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
|
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
|
||||||
|
|
||||||
@ -57,39 +60,43 @@ The following table lists the services and their associated URLs that your netwo
|
|||||||
|
|
||||||
To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal:
|
To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/api/report` and `https://wu-cdn.x.cp.wd.microsoft.com/` in a browser, or run the following command in Terminal:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report'
|
mavel-mojave:~ testuser$ curl 'https://x.cp.wd.microsoft.com/api/report'
|
||||||
OK
|
OK
|
||||||
```
|
```
|
||||||
|
|
||||||
We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines.
|
We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines.
|
||||||
SIP is a built-in macOS security feature that prevents low-level tampering with the OS.
|
SIP is a built-in macOS security feature that prevents low-level tampering with the OS.
|
||||||
|
|
||||||
## Installation and configuration overview
|
## Installation and configuration overview
|
||||||
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
|
||||||
|
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
||||||
In general you'll need to take the following steps:
|
In general you'll need to take the following steps:
|
||||||
- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal
|
|
||||||
- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods:
|
- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal
|
||||||
* [Microsoft Intune based deployment](#microsoft-intune-based-deployment)
|
- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods:
|
||||||
* [JAMF based deployment](#jamf-based-deployment)
|
- [Microsoft Intune based deployment](#microsoft-intune-based-deployment)
|
||||||
* [Manual deployment](#manual-deployment)
|
- [JAMF based deployment](#jamf-based-deployment)
|
||||||
|
- [Manual deployment](#manual-deployment)
|
||||||
|
|
||||||
## Microsoft Intune based deployment
|
## Microsoft Intune based deployment
|
||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
|
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
5. Download IntuneAppUtil from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. From a command prompt, verify that you have the three files.
|
6. From a command prompt, verify that you have the three files.
|
||||||
Extract the contents of the .zip files:
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-macmini:Downloads test$ ls -l
|
mavel-macmini:Downloads test$ ls -l
|
||||||
total 721688
|
total 721688
|
||||||
-rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil
|
-rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil
|
||||||
@ -103,13 +110,14 @@ Download the installation and onboarding packages from Windows Defender Security
|
|||||||
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
mavel-macmini:Downloads test$
|
mavel-macmini:Downloads test$
|
||||||
```
|
```
|
||||||
7. Make IntuneAppUtil an executable:
|
|
||||||
|
7. Make IntuneAppUtil an executable:
|
||||||
|
|
||||||
```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
|
```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
|
||||||
|
|
||||||
8. Create the wdav.pkg.intunemac package from wdav.pkg:
|
8. Create the wdav.pkg.intunemac package from wdav.pkg:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
|
mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
|
||||||
Microsoft Intune Application Utility for Mac OS X
|
Microsoft Intune Application Utility for Mac OS X
|
||||||
Version: 1.0.0.0
|
Version: 1.0.0.0
|
||||||
@ -124,6 +132,7 @@ Download the installation and onboarding packages from Windows Defender Security
|
|||||||
```
|
```
|
||||||
|
|
||||||
### Client Machine Setup
|
### Client Machine Setup
|
||||||
|
|
||||||
You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp).
|
You need no special provisioning for a Mac machine beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp).
|
||||||
|
|
||||||
1. You'll be asked to confirm device management.
|
1. You'll be asked to confirm device management.
|
||||||
@ -143,17 +152,18 @@ You can enroll additional machines. Optionally, you can do it later, after syste
|
|||||||

|

|
||||||
|
|
||||||
### Create System Configuration profiles
|
### Create System Configuration profiles
|
||||||
1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**.
|
|
||||||
2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**.
|
1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**.
|
||||||
3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above.
|
2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**.
|
||||||
4. Select **OK**.
|
3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above.
|
||||||
|
4. Select **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
7. Repeat these steps with the second profile.
|
6. Repeat these steps with the second profile.
|
||||||
8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file.
|
7. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file.
|
||||||
9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**.
|
8. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade:
|
After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade:
|
||||||
|
|
||||||
@ -161,16 +171,16 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||
|
|
||||||
### Publish application
|
### Publish application
|
||||||
|
|
||||||
1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**.
|
1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**.
|
||||||
2. Select **App type=Other/Line-of-business app**.
|
2. Select **App type=Other/Line-of-business app**.
|
||||||
3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload.
|
3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload.
|
||||||
4. Select **Configure** and add the required information.
|
4. Select **Configure** and add the required information.
|
||||||
5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value.
|
5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Select **OK** and **Add**.
|
6. Select **OK** and **Add**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**.
|
7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**.
|
||||||
@ -187,7 +197,8 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||

|

|
||||||
|
|
||||||
### Verify client machine state
|
### Verify client machine state
|
||||||
1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**.
|
|
||||||
|
1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**.
|
||||||
|
|
||||||

|

|
||||||

|

|
||||||
@ -195,30 +206,33 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||
2. Verify the three profiles listed there:
|
2. Verify the three profiles listed there:
|
||||||

|

|
||||||
|
|
||||||
3. The **Management Profile** should be the Intune system profile.
|
3. The **Management Profile** should be the Intune system profile.
|
||||||
4. wdav-config and wdav-kext are system configuration profiles that we added in Intune.
|
4. wdav-config and wdav-kext are system configuration profiles that we added in Intune.
|
||||||
5. You should also see the Microsoft Defender icon in the top-right corner:
|
5. You should also see the Microsoft Defender icon in the top-right corner:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## JAMF based deployment
|
## JAMF based deployment
|
||||||
### Prerequsites
|
|
||||||
You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow.
|
|
||||||
|
|
||||||
|
### Prerequsites
|
||||||
|
|
||||||
|
You need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes a properly configured distribution point. JAMF has many alternative ways to complete the same task. These instructions provide you an example for most common processes. Your organization might use a different workflow.
|
||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
|
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. From a command prompt, verify that you have the two files.
|
5. From a command prompt, verify that you have the two files.
|
||||||
Extract the contents of the .zip files:
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-macmini:Downloads test$ ls -l
|
mavel-macmini:Downloads test$ ls -l
|
||||||
total 721160
|
total 721160
|
||||||
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
||||||
@ -230,18 +244,19 @@ Download the installation and onboarding packages from Windows Defender Security
|
|||||||
inflating: intune/WindowsDefenderATPOnboarding.xml
|
inflating: intune/WindowsDefenderATPOnboarding.xml
|
||||||
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
mavel-macmini:Downloads test$
|
mavel-macmini:Downloads test$
|
||||||
```
|
```
|
||||||
|
|
||||||
### Create JAMF Policies
|
### Create JAMF Policies
|
||||||
|
|
||||||
You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines.
|
You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client machines.
|
||||||
|
|
||||||
#### Configuration Profile
|
#### Configuration Profile
|
||||||
|
|
||||||
The configuration profile contains one custom settings payload that includes:
|
The configuration profile contains one custom settings payload that includes:
|
||||||
|
|
||||||
- Microsoft Defender ATP for Mac onboarding information
|
- Microsoft Defender ATP for Mac onboarding information
|
||||||
- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run
|
- Approved Kernel Extensions payload to enable the Microsoft kernel driver to run
|
||||||
|
|
||||||
|
|
||||||
1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File.
|
1. Upload jamf/WindowsDefenderATPOnboarding.plist as the Property List File.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
@ -252,15 +267,17 @@ The configuration profile contains one custom settings payload that includes:
|
|||||||
#### Approved Kernel Extension
|
#### Approved Kernel Extension
|
||||||
|
|
||||||
To approve the kernel extension:
|
To approve the kernel extension:
|
||||||
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
|
||||||
2. Use **UBF8T346G9** for Team Id.
|
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
||||||
|
2. Use **UBF8T346G9** for Team Id.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
#### Configuration Profile's Scope
|
#### Configuration Profile's Scope
|
||||||
|
|
||||||
Configure the appropriate scope to specify the machines that will receive this configuration profile.
|
Configure the appropriate scope to specify the machines that will receive this configuration profile.
|
||||||
|
|
||||||
Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers.
|
Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -269,14 +286,16 @@ Save the **Configuration Profile**.
|
|||||||
Use the **Logs** tab to monitor deployment status for each enrolled machine.
|
Use the **Logs** tab to monitor deployment status for each enrolled machine.
|
||||||
|
|
||||||
#### Package
|
#### Package
|
||||||
|
|
||||||
1. Create a package in **Settings > Computer Management > Packages**.
|
1. Create a package in **Settings > Computer Management > Packages**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Upload wdav.pkg to the Distribution Point.
|
2. Upload wdav.pkg to the Distribution Point.
|
||||||
3. In the **filename** field, enter the name of the package. For example, wdav.pkg.
|
3. In the **filename** field, enter the name of the package. For example, wdav.pkg.
|
||||||
|
|
||||||
#### Policy
|
#### Policy
|
||||||
|
|
||||||
Your policy should contain a single package for Microsoft Defender.
|
Your policy should contain a single package for Microsoft Defender.
|
||||||
|
|
||||||

|

|
||||||
@ -286,34 +305,38 @@ Configure the appropriate scope to specify the computers that will receive this
|
|||||||
After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine.
|
After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled machine.
|
||||||
|
|
||||||
### Client machine setup
|
### Client machine setup
|
||||||
|
|
||||||
You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment.
|
You need no special provisioning for a macOS computer beyond the standard JAMF Enrollment.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
||||||
|
|
||||||
1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
||||||
|
|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
After some time, the machine's User Approved MDM status will change to Yes.
|
After some time, the machine's User Approved MDM status will change to Yes.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned.
|
You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned.
|
||||||
|
|
||||||
### Deployment
|
### Deployment
|
||||||
|
|
||||||
Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected.
|
Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected.
|
||||||
|
|
||||||
#### Status on server
|
#### Status on server
|
||||||
|
|
||||||
You can monitor the deployment status in the Logs tab:
|
You can monitor the deployment status in the Logs tab:
|
||||||
- **Pending** means that the deployment is scheduled but has not yet happened
|
|
||||||
- **Completed** means that the deployment succeeded and is no longer scheduled
|
- **Pending** means that the deployment is scheduled but has not yet happened
|
||||||
|
- **Completed** means that the deployment succeeded and is no longer scheduled
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Status on client machine
|
#### Status on client machine
|
||||||
|
|
||||||
After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile.
|
After the Configuration Profile is deployed, you'll see the profile on the machine in the **System Preferences > Profiles >** Name of Configuration Profile.
|
||||||
|
|
||||||

|

|
||||||
@ -324,7 +347,7 @@ After the policy is applied, you'll see the Microsoft Defender icon in the macOS
|
|||||||
|
|
||||||
You can monitor policy installation on a machine by following the JAMF's log file:
|
You can monitor policy installation on a machine by following the JAMF's log file:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-mojave:~ testuser$ tail -f /var/log/jamf.log
|
mavel-mojave:~ testuser$ tail -f /var/log/jamf.log
|
||||||
Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
|
Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
|
||||||
Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
|
Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
|
||||||
@ -336,7 +359,8 @@ Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found.
|
|||||||
```
|
```
|
||||||
|
|
||||||
You can also check the onboarding status:
|
You can also check the onboarding status:
|
||||||
```
|
|
||||||
|
```bash
|
||||||
mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
@ -349,6 +373,7 @@ orgid effective : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
|||||||
- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed.
|
- **orgid effective**: This is the Microsoft Defender ATP org id currently in use. If it does not match the value in the Configuration Profile, then the configuration has not been refreshed.
|
||||||
|
|
||||||
### Uninstalling Microsoft Defender ATP for Mac
|
### Uninstalling Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
#### Uninstalling with a script
|
#### Uninstalling with a script
|
||||||
|
|
||||||
Create a script in **Settings > Computer Management > Scripts**.
|
Create a script in **Settings > Computer Management > Scripts**.
|
||||||
@ -357,7 +382,7 @@ Create a script in **Settings > Computer Management > Scripts**.
|
|||||||
|
|
||||||
For example, this script removes Microsoft Defender ATP from the /Applications directory:
|
For example, this script removes Microsoft Defender ATP from the /Applications directory:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
echo "Is WDAV installed?"
|
echo "Is WDAV installed?"
|
||||||
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
||||||
|
|
||||||
@ -371,6 +396,7 @@ echo "Done!"
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### Uninstalling with a policy
|
#### Uninstalling with a policy
|
||||||
|
|
||||||
Your policy should contain a single script:
|
Your policy should contain a single script:
|
||||||
|
|
||||||

|

|
||||||
@ -381,7 +407,7 @@ Configure the appropriate scope in the **Scope** tab to specify the machines tha
|
|||||||
|
|
||||||
You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded:
|
You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+'
|
sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+'
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -390,18 +416,20 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D
|
|||||||
## Manual deployment
|
## Manual deployment
|
||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
|
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**.
|
||||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. From a command prompt, verify that you have the two files.
|
5. From a command prompt, verify that you have the two files.
|
||||||
Extract the contents of the .zip files:
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-macmini:Downloads test$ ls -l
|
mavel-macmini:Downloads test$ ls -l
|
||||||
total 721152
|
total 721152
|
||||||
-rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip
|
-rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip
|
||||||
@ -409,9 +437,10 @@ Download the installation and onboarding packages from Windows Defender Security
|
|||||||
mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
|
mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
Archive: WindowsDefenderATPOnboardingPackage.zip
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
inflating: WindowsDefenderATPOnboarding.py
|
inflating: WindowsDefenderATPOnboarding.py
|
||||||
```
|
```
|
||||||
|
|
||||||
### Application installation
|
### Application installation
|
||||||
|
|
||||||
To complete this process, you must have admin privileges on the machine.
|
To complete this process, you must have admin privileges on the machine.
|
||||||
|
|
||||||
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||||
@ -431,36 +460,38 @@ To complete this process, you must have admin privileges on the machine.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
The installation will proceed.
|
The installation will proceed.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time.
|
> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time.
|
||||||
|
|
||||||
### Client configuration
|
### Client configuration
|
||||||
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
|
||||||
|
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
The client machine is not associated with orgId. Note that the orgid is blank.
|
The client machine is not associated with orgId. Note that the orgid is blank.
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid :
|
orgid :
|
||||||
```
|
```
|
||||||
2. Install the configuration file on a client machine:
|
|
||||||
|
|
||||||
```
|
2. Install the configuration file on a client machine:
|
||||||
|
|
||||||
|
```bash
|
||||||
mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py
|
mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py
|
||||||
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Verify that the machine is now associated with orgId:
|
3. Verify that the machine is now associated with orgId:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8
|
orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8
|
||||||
```
|
```
|
||||||
|
|
||||||
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||

|

|
||||||
@ -490,7 +521,7 @@ Controlling product settings, triggering on-demand scans, and several other impo
|
|||||||
## What to expect in the ATP portal
|
## What to expect in the ATP portal
|
||||||
|
|
||||||
- AV alerts:
|
- AV alerts:
|
||||||
- Severity
|
- Severity
|
||||||
- Scan type
|
- Scan type
|
||||||
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
||||||
- File information (name, path, size, and hash)
|
- File information (name, path, size, and hash)
|
||||||
@ -528,37 +559,39 @@ Or, from a command line:
|
|||||||
- Geo preference for telemetry traffic is not supported yet. Cloud traffic is routed to the US only.
|
- Geo preference for telemetry traffic is not supported yet. Cloud traffic is routed to the US only.
|
||||||
- Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device.
|
- Centrally managed uninstall is still being developed. As a workaround, a manual uninstall must be performed on each client device.
|
||||||
|
|
||||||
|
|
||||||
## Collecting diagnostic information
|
## Collecting diagnostic information
|
||||||
|
|
||||||
If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default.
|
If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default.
|
||||||
|
|
||||||
1) Increase logging level:
|
1) Increase logging level:
|
||||||
```
|
|
||||||
mavel-mojave:~ testuser$ mdatp log-level --verbose
|
```bash
|
||||||
Creating connection to daemon
|
mavel-mojave:~ testuser$ mdatp log-level --verbose
|
||||||
Connection established
|
Creating connection to daemon
|
||||||
Operation succeeded
|
Connection established
|
||||||
|
Operation succeeded
|
||||||
```
|
```
|
||||||
|
|
||||||
2) Reproduce the problem
|
2) Reproduce the problem
|
||||||
|
|
||||||
3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file.
|
3) Run `mdatp --diagnostic` to backup Defender ATP's logs. The command will print out location with generated zip file.
|
||||||
|
|
||||||
```
|
```bash
|
||||||
mavel-mojave:~ testuser$ mdatp --diagnostic
|
mavel-mojave:~ testuser$ mdatp --diagnostic
|
||||||
Creating connection to daemon
|
Creating connection to daemon
|
||||||
Connection established
|
Connection established
|
||||||
"/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip"
|
"/Library/Application Support/Microsoft/Defender/wdavdiag/d85e7032-adf8-434a-95aa-ad1d450b9a2f.zip"
|
||||||
```
|
```
|
||||||
|
|
||||||
4) Restore logging level:
|
4) Restore logging level:
|
||||||
```
|
|
||||||
|
```bash
|
||||||
mavel-mojave:~ testuser$ mdatp log-level --info
|
mavel-mojave:~ testuser$ mdatp log-level --info
|
||||||
Creating connection to daemon
|
Creating connection to daemon
|
||||||
Connection established
|
Connection established
|
||||||
Operation succeeded
|
Operation succeeded
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
### Installation issues
|
### Installation issues
|
||||||
|
|
||||||
If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause.
|
If an error occurs during installation, the installer will only report a general failure. The detailed log is saved to /Library/Logs/Microsoft/wdav.install.log. If you experience issues during installation, send us this file so we can help diagnose the cause.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user