mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
Merge pull request #3995 from MicrosoftDocs/master
Publish 10/13/2020 10:30 AM PT
This commit is contained in:
commit
73da69b2f6
@ -165,7 +165,10 @@ The following image illustrates how MDM applications will show up in the Azure a
|
|||||||
|
|
||||||
### Add cloud-based MDM to the app gallery
|
### Add cloud-based MDM to the app gallery
|
||||||
|
|
||||||
You should work with the Azure AD engineering team if your MDM application is cloud-based. The following table shows the required information to create an entry in the Azure AD app gallery.
|
> [!NOTE]
|
||||||
|
> You should work with the Azure AD engineering team if your MDM application is cloud-based and needs to be enabled as a multi-tenant MDM application
|
||||||
|
|
||||||
|
The following table shows the required information to create an entry in the Azure AD app gallery.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
|
@ -161,7 +161,7 @@ The following diagram shows the SurfaceHub CSP management objects in tree format
|
|||||||
<thead>
|
<thead>
|
||||||
<tr class="header">
|
<tr class="header">
|
||||||
<th>ErrorContext value</th>
|
<th>ErrorContext value</th>
|
||||||
<th>Stage where error occured</th>
|
<th>Stage where error occurred</th>
|
||||||
<th>Description and suggestions</th>
|
<th>Description and suggestions</th>
|
||||||
</tr>
|
</tr>
|
||||||
</thead>
|
</thead>
|
||||||
@ -239,7 +239,7 @@ The following diagram shows the SurfaceHub CSP management objects in tree format
|
|||||||
<p style="margin-left: 20px">The data type is boolean. Supported operation is Get and Replace.
|
<p style="margin-left: 20px">The data type is boolean. Supported operation is Get and Replace.
|
||||||
|
|
||||||
<a href="" id="inboxapps-welcome-currentbackgroundpath"></a>**InBoxApps/Welcome/CurrentBackgroundPath**
|
<a href="" id="inboxapps-welcome-currentbackgroundpath"></a>**InBoxApps/Welcome/CurrentBackgroundPath**
|
||||||
<p style="margin-left: 20px">Background image for the welcome screen. To set this, specify a https URL to a PNG file (only PNGs are supported for security reasons).
|
<p style="margin-left: 20px">Background image for the welcome screen. To set this, specify a https URL to a PNG file (only PNGs are supported for security reasons). If any certificate authorities need to be trusted in order to access the URL, please ensure they are valid and installed on the Hub, otherwise it may not be able to load the image.
|
||||||
|
|
||||||
<p style="margin-left: 20px">The data type is string. Supported operation is Get and Replace.
|
<p style="margin-left: 20px">The data type is string. Supported operation is Get and Replace.
|
||||||
|
|
||||||
|
@ -96,6 +96,7 @@ The following methodology was used to derive the network endpoints:
|
|||||||
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
||||||
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
||||||
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
||||||
|
|cs.dds.microsoft.com|TLSV1.2|Used by Device Directory Service to keep track of user-device associations and storing metadata about the devices.
|
||||||
|
|
||||||
## Windows 10 Pro
|
## Windows 10 Pro
|
||||||
|
|
||||||
@ -161,6 +162,7 @@ The following methodology was used to derive the network endpoints:
|
|||||||
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
|activity.windows.com|TLSV1.2|Used by Activity Feed Service which enables multiple cross-device data roaming scenarios on Windows
|
||||||
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
|adl.windows.com|HTTP|Used for compatibility database updates for Windows
|
||||||
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
|spclient.wg.spotify.com|TLSV1.2|Used for Spotify Live Tile
|
||||||
|
|cs.dds.microsoft.com|TLSV1.2|Used by Device Directory Service to keep track of user-device associations and storing metadata about the devices.
|
||||||
|
|
||||||
## Windows 10 Education
|
## Windows 10 Education
|
||||||
|
|
||||||
|
@ -75,6 +75,7 @@ Communicating with Azure Active Directory uses the following URLs:
|
|||||||
- enterpriseregistration.windows.net
|
- enterpriseregistration.windows.net
|
||||||
- login.microsoftonline.com
|
- login.microsoftonline.com
|
||||||
- login.windows.net
|
- login.windows.net
|
||||||
|
- account.live.com
|
||||||
|
|
||||||
If your environment uses Microsoft Intune, you need these additional URLs:
|
If your environment uses Microsoft Intune, you need these additional URLs:
|
||||||
- enrollment.manage.microsoft.com
|
- enrollment.manage.microsoft.com
|
||||||
|
@ -197,7 +197,7 @@ To approve the system extensions:
|
|||||||
|
|
||||||
9. As part of the Endpoint Detection and Response capabilities, Microsoft Defender ATP for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. The following policy allows the network extension to perform this functionality. Download `netfilter.mobileconfig` from [our GitHub repository](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig), save it as netext.xml and deploy it using the same steps as in the previous sections. <a name = "create-system-configuration-profiles-step-9" id = "create-system-configuration-profiles-step-9"></a>
|
9. As part of the Endpoint Detection and Response capabilities, Microsoft Defender ATP for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. The following policy allows the network extension to perform this functionality. Download `netfilter.mobileconfig` from [our GitHub repository](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig), save it as netext.xml and deploy it using the same steps as in the previous sections. <a name = "create-system-configuration-profiles-step-9" id = "create-system-configuration-profiles-step-9"></a>
|
||||||
|
|
||||||
10. To allow Defender and Auto Update to display notifications in UI on macOS 10.15 (Catalina), download `notif.mobileconfig` from [our GitHub repository](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/notif.mobileconfig) and import it as a custom payload. <a name = "create-system-configuration-profiles-step-10" id = "create-system-configuration-profiles-step-10"></a>
|
10. To allow Microsoft Defender ATP for Mac and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina), download `notif.mobileconfig` from [our GitHub repository](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/notif.mobileconfig) and import it as a custom payload. <a name = "create-system-configuration-profiles-step-10" id = "create-system-configuration-profiles-step-10"></a>
|
||||||
|
|
||||||
11. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
11. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
|
@ -46,6 +46,9 @@ If you can reproduce a problem, increase the logging level, run the system for s
|
|||||||
|
|
||||||
3. Run `sudo mdatp diagnostic create` to back up Microsoft Defender ATP's logs. The files will be stored inside a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
|
3. Run `sudo mdatp diagnostic create` to back up Microsoft Defender ATP's logs. The files will be stored inside a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> By default, diagnostic logs are saved to `/Library/Application Support/Microsoft/Defender/wdavdiag/`. To change the directory where diagnostic logs are saved, pass `--path [directory]` to the below command, replacing `[directory]` with the desired directory.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo mdatp diagnostic create
|
sudo mdatp diagnostic create
|
||||||
```
|
```
|
||||||
@ -99,7 +102,7 @@ Important tasks, such as controlling product settings and triggering on-demand s
|
|||||||
|Configuration|Turn on audit mode for PUA protection |`mdatp threat policy set --type potentially_unwanted_application -- action audit` |
|
|Configuration|Turn on audit mode for PUA protection |`mdatp threat policy set --type potentially_unwanted_application -- action audit` |
|
||||||
|Configuration|Turn on/off passiveMode |`mdatp config passive-mode --value enabled [enabled/disabled]` |
|
|Configuration|Turn on/off passiveMode |`mdatp config passive-mode --value enabled [enabled/disabled]` |
|
||||||
|Diagnostics |Change the log level |`mdatp log level set --level [error/warning/info/verbose]` |
|
|Diagnostics |Change the log level |`mdatp log level set --level [error/warning/info/verbose]` |
|
||||||
|Diagnostics |Generate diagnostic logs |`mdatp diagnostic create` |
|
|Diagnostics |Generate diagnostic logs |`mdatp diagnostic create --path [directory]` |
|
||||||
|Health |Check the product's health |`mdatp health` |
|
|Health |Check the product's health |`mdatp health` |
|
||||||
|Health |Check for a spefic product attribute |`mdatp health --field [attribute: healthy/licensed/engine_version...]` |
|
|Health |Check for a spefic product attribute |`mdatp health --field [attribute: healthy/licensed/engine_version...]` |
|
||||||
|Protection |Scan a path |`mdatp scan custom --path [path]` |
|
|Protection |Scan a path |`mdatp scan custom --path [path]` |
|
||||||
|
@ -64,7 +64,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
|
|||||||
>JAMF doesn’t have built-in support for content filtering policies, which are a pre-requisite for enabling the network extensions that Microsoft Defender ATP for Mac installs on the device. Furthermore, JAMF sometimes changes the content of the policies being deployed.
|
>JAMF doesn’t have built-in support for content filtering policies, which are a pre-requisite for enabling the network extensions that Microsoft Defender ATP for Mac installs on the device. Furthermore, JAMF sometimes changes the content of the policies being deployed.
|
||||||
>As such, the following steps provide a workaround that involve signing the configuration profile.
|
>As such, the following steps provide a workaround that involve signing the configuration profile.
|
||||||
|
|
||||||
1. Save the following content to your device as `com.microsoft.network-extension.mobileconfig`
|
1. Save the following content to your device as `com.microsoft.network-extension.mobileconfig` using a text editor:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
@ -127,19 +127,36 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
|
|||||||
</plist>
|
</plist>
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs `OK`:
|
2. Verify that the above file was copied correctly by running the `plutil` utility in the Terminal:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ plutil -lint com.microsoft.network-extension.mobileconfig
|
$ plutil -lint <PathToFile>/com.microsoft.network-extension.mobileconfig
|
||||||
com.microsoft.network-extension.mobileconfig: OK
|
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Follow the instructions on [this page](https://www.jamf.com/jamf-nation/articles/649/creating-a-signing-certificate-using-jamf-pro-s-built-in-certificate-authority) to create a signing certificate using JAMF’s built-in certificate authority
|
For example, if the file was stored in Documents:
|
||||||
|
|
||||||
4. After the certificate is created and installed to your device, run the following command from the Terminal:
|
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ security cms -S -N "<certificate name>" -i com.microsoft.network-extension.mobileconfig -o com.microsoft.network-extension.signed.mobileconfig
|
$ plutil -lint ~/Documents/com.microsoft.network-extension.mobileconfig
|
||||||
|
```
|
||||||
|
|
||||||
|
Verify that the command outputs `OK`.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
<PathToFile>/com.microsoft.network-extension.mobileconfig: OK
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Follow the instructions on [this page](https://www.jamf.com/jamf-nation/articles/649/creating-a-signing-certificate-using-jamf-pro-s-built-in-certificate-authority) to create a signing certificate using JAMF’s built-in certificate authority.
|
||||||
|
|
||||||
|
4. After the certificate is created and installed to your device, run the following command from the Terminal to sign the file:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ security cms -S -N "<CertificateName>" -i <PathToFile>/com.apple.webcontent-filter.mobileconfig -o <PathToSignedFile>/com.microsoft.network-extension.signed.mobileconfig
|
||||||
|
```
|
||||||
|
|
||||||
|
For example, if the certificate name is **SigningCertificate** and the signed file is going to be stored in Documents:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ security cms -S -N "SigningCertificate" -i ~/Documents/com.apple.webcontent-filter.mobileconfig -o ~/Documents/com.microsoft.network-extension.signed.mobileconfig
|
||||||
```
|
```
|
||||||
|
|
||||||
5. From the JAMF portal, navigate to **Configuration Profiles** and click the **Upload** button. Select `com.microsoft.network-extension.signed.mobileconfig` when prompted for the file.
|
5. From the JAMF portal, navigate to **Configuration Profiles** and click the **Upload** button. Select `com.microsoft.network-extension.signed.mobileconfig` when prompted for the file.
|
||||||
|
@ -43,6 +43,17 @@ ms.topic: conceptual
|
|||||||
> 2. Refer to this documentation for detailed configuration information and instructions: [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
> 2. Refer to this documentation for detailed configuration information and instructions: [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
||||||
> 3. Monitor this page for an announcement of the actual release of MDATP for Mac agent update.
|
> 3. Monitor this page for an announcement of the actual release of MDATP for Mac agent update.
|
||||||
|
|
||||||
|
## 101.09.50
|
||||||
|
|
||||||
|
- This product version has been validated on macOS Big Sur 11 beta 9
|
||||||
|
- The new syntax for the `mdatp` command-line tool is now the default one. For more information on the new syntax, see [Resources for Microsoft Defender ATP for Mac](mac-resources.md#configuring-from-the-command-line)
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The old command-line tool syntax will be removed from the product on **January 1st, 2021**.
|
||||||
|
|
||||||
|
- Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory
|
||||||
|
- Performance improvements & bug fixes
|
||||||
|
|
||||||
## 101.09.49
|
## 101.09.49
|
||||||
|
|
||||||
- User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user
|
- User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user
|
||||||
|
Loading…
x
Reference in New Issue
Block a user