mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Update MDE for Mac docs to use new command-line tool syntax
This commit is contained in:
parent
bc61797b76
commit
402d66cf2d
@ -116,7 +116,7 @@ To complete this process, you must have admin privileges on the device.
|
|||||||
The client device is not associated with orgId. Note that the *orgId* attribute is blank.
|
The client device is not associated with orgId. Note that the *orgId* attribute is blank.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --health orgId
|
mdatp health --field org_id
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Run the Python script to install the configuration file:
|
2. Run the Python script to install the configuration file:
|
||||||
@ -128,7 +128,7 @@ To complete this process, you must have admin privileges on the device.
|
|||||||
3. Verify that the device is now associated with your organization and reports a valid *orgId*:
|
3. Verify that the device is now associated with your organization and reports a valid *orgId*:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --health orgId
|
mdatp health --field org_id
|
||||||
```
|
```
|
||||||
|
|
||||||
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
@ -59,7 +59,7 @@ You can configure how PUA files are handled from the command line or from the ma
|
|||||||
In Terminal, execute the following command to configure PUA protection:
|
In Terminal, execute the following command to configure PUA protection:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --threat --type-handling potentially_unwanted_application [off|audit|block]
|
mdatp threat policy set --type potentially_unwanted_application --action [off|audit|block]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Use the management console to configure PUA protection:
|
### Use the management console to configure PUA protection:
|
||||||
|
@ -149,7 +149,7 @@ To enable autocompletion in zsh:
|
|||||||
|
|
||||||
## Client Microsoft Defender for Endpoint quarantine directory
|
## Client Microsoft Defender for Endpoint quarantine directory
|
||||||
|
|
||||||
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds is shown with `mdatp --threat --list --pretty`.
|
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds is shown with `mdatp threat list`.
|
||||||
|
|
||||||
## Microsoft Defender for Endpoint portal information
|
## Microsoft Defender for Endpoint portal information
|
||||||
|
|
||||||
|
@ -47,7 +47,7 @@ You can create a scanning schedule using the *launchd* daemon on a macOS device.
|
|||||||
<array>
|
<array>
|
||||||
<string>sh</string>
|
<string>sh</string>
|
||||||
<string>-c</string>
|
<string>-c</string>
|
||||||
<string>/usr/local/bin/mdatp --scan --quick</string>
|
<string>/usr/local/bin/mdatp scan quick</string>
|
||||||
</array>
|
</array>
|
||||||
<key>RunAtLoad</key>
|
<key>RunAtLoad</key>
|
||||||
<true/>
|
<true/>
|
||||||
@ -73,7 +73,7 @@ You can create a scanning schedule using the *launchd* daemon on a macOS device.
|
|||||||
2. Save the file as *com.microsoft.wdav.schedquickscan.plist*.
|
2. Save the file as *com.microsoft.wdav.schedquickscan.plist*.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> To run a full scan instead of a quick scan, change line 12, `<string>/usr/local/bin/mdatp --scan --quick</string>`, to use the `--full` option instead of `--quick` (i.e. `<string>/usr/local/bin/mdatp --scan --full</string>`) and save the file as *com.microsoft.wdav.sched**full**scan.plist* instead of *com.microsoft.wdav.sched**quick**scan.plist*.
|
> To run a full scan instead of a quick scan, change line 12, `<string>/usr/local/bin/mdatp scan quick</string>`, to use the `full` option instead of `quick` (i.e. `<string>/usr/local/bin/mdatp scan full</string>`) and save the file as *com.microsoft.wdav.sched**full**scan.plist* instead of *com.microsoft.wdav.sched**quick**scan.plist*.
|
||||||
|
|
||||||
3. Open **Terminal**.
|
3. Open **Terminal**.
|
||||||
4. Enter the following commands to load your file:
|
4. Enter the following commands to load your file:
|
||||||
|
@ -37,15 +37,15 @@ If you did not approve the kernel extension during the deployment/installation o
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can also run ```mdatp --health```. It reports if real-time protection is enabled but not available. This indicates that the kernel extension is not approved to run on your device.
|
You can also run ```mdatp health```. It reports if real-time protection is enabled but not available. This indicates that the kernel extension is not approved to run on your device.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --health
|
mdatp health
|
||||||
```
|
```
|
||||||
```Output
|
```Output
|
||||||
...
|
...
|
||||||
realTimeProtectionAvailable : false
|
real_time_protection_enabled : true
|
||||||
realTimeProtectionEnabled : true
|
real_time_protection_available : true
|
||||||
...
|
...
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -90,15 +90,15 @@ In this case, you need to perform the following steps to trigger the approval fl
|
|||||||
sudo kextutil /Library/Extensions/wdavkext.kext
|
sudo kextutil /Library/Extensions/wdavkext.kext
|
||||||
```
|
```
|
||||||
|
|
||||||
The banner should disappear from the Defender application, and ```mdatp --health``` should now report that real-time protection is both enabled and available:
|
The banner should disappear from the Defender application, and ```mdatp health``` should now report that real-time protection is both enabled and available:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --health
|
mdatp health
|
||||||
```
|
```
|
||||||
|
|
||||||
```Output
|
```Output
|
||||||
...
|
...
|
||||||
realTimeProtectionAvailable : true
|
real_time_protection_enabled : true
|
||||||
realTimeProtectionEnabled : true
|
real_time_protection_available : true
|
||||||
...
|
...
|
||||||
```
|
```
|
||||||
|
@ -48,7 +48,7 @@ The following steps can be used to troubleshoot and mitigate these issues:
|
|||||||
- From the Terminal. For security purposes, this operation requires elevation.
|
- From the Terminal. For security purposes, this operation requires elevation.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mdatp --config realTimeProtectionEnabled false
|
mdatp config real-time-protection --value disabled
|
||||||
```
|
```
|
||||||
|
|
||||||
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Microsoft Defender for Endpoint for Mac](mac-preferences.md).
|
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Microsoft Defender for Endpoint for Mac](mac-preferences.md).
|
||||||
|
@ -173,7 +173,7 @@ ms.technology: mde
|
|||||||
- Fixed an issue where Microsoft Defender for Endpoint for Mac was sometimes interfering with Time Machine
|
- Fixed an issue where Microsoft Defender for Endpoint for Mac was sometimes interfering with Time Machine
|
||||||
- Added a new switch to the command-line utility for testing the connectivity with the backend service
|
- Added a new switch to the command-line utility for testing the connectivity with the backend service
|
||||||
```bash
|
```bash
|
||||||
mdatp --connectivity-test
|
mdatp connectivity test
|
||||||
```
|
```
|
||||||
- Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view)
|
- Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view)
|
||||||
- Performance improvements & bug fixes
|
- Performance improvements & bug fixes
|
||||||
|
@ -132,7 +132,7 @@ The output from this command should be similar to the following:
|
|||||||
|
|
||||||
Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:
|
Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:
|
||||||
```bash
|
```bash
|
||||||
mdatp --connectivity-test
|
mdatp connectivity test
|
||||||
```
|
```
|
||||||
|
|
||||||
## How to update Microsoft Defender for Endpoint for Mac
|
## How to update Microsoft Defender for Endpoint for Mac
|
||||||
|
Loading…
x
Reference in New Issue
Block a user