mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
text updates
This commit is contained in:
parent
bac50e06c2
commit
3947b93f48
@ -33,13 +33,11 @@ This topic describes the structure of this profile (including a recommended prof
|
||||
|
||||
## Configuration profile structure
|
||||
|
||||
The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.
|
||||
The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences. The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections.
|
||||
|
||||
>[!CAUTION]
|
||||
>[!NOTE]
|
||||
>The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.
|
||||
|
||||
The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections.
|
||||
|
||||
### Antivirus engine preferences
|
||||
|
||||
The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of the product.
|
||||
|
@ -18,7 +18,7 @@ ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
---
|
||||
|
||||
# Microsoft Defender ATP for Mac Resources
|
||||
# Microsoft Defender ATP for Mac resources
|
||||
|
||||
**Applies to:**
|
||||
|
||||
@ -68,11 +68,11 @@ There are several ways to uninstall Microsoft Defender ATP for Mac. Please note
|
||||
|
||||
### Interactive uninstallation
|
||||
|
||||
- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**.
|
||||
Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**.
|
||||
|
||||
### From the command line
|
||||
|
||||
- ```sudo rm -rf '/Applications/Microsoft Defender ATP.app'```
|
||||
```sudo rm -rf '/Applications/Microsoft Defender ATP.app'```
|
||||
|
||||
## Configuring from the command line
|
||||
|
||||
@ -103,13 +103,16 @@ Important tasks, such as controlling product settings and triggering on-demand s
|
||||
|
||||
In the Microsoft Defender ATP portal, you'll see two categories of information:
|
||||
|
||||
- Antivirus alerts, including:
|
||||
Antivirus alerts, including:
|
||||
|
||||
- Severity
|
||||
- Scan type
|
||||
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
||||
- File information (name, path, size, and hash)
|
||||
- Threat information (name, type, and state)
|
||||
- Device information, including:
|
||||
|
||||
Device information, including:
|
||||
|
||||
- Machine identifier
|
||||
- Tenant identifier
|
||||
- App version
|
||||
|
@ -217,6 +217,6 @@ To read more on how to configure MAU in enterprise environments, refer to [Deplo
|
||||
|
||||
## Resources
|
||||
|
||||
- [Microsoft Defender ATP for Mac Resources](microsoft-defender-atp-mac-resources.md) has more information about logging, uninstalling, or other topics
|
||||
- [Microsoft Defender ATP for Mac resources](microsoft-defender-atp-mac-resources.md) has more information about logging, uninstalling, or other topics
|
||||
- [Set preferences for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-preferences.md) has guidance on how to configure the product in enterprise environments
|
||||
- [Privacy for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-privacy.md) has privacy info
|
||||
|
Loading…
x
Reference in New Issue
Block a user