mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
Replace click with select
This commit is contained in:
parent
b644885b7e
commit
7f2f9e3fb3
@ -77,11 +77,11 @@ Use any of the supported methods to deploy Microsoft Defender ATP for Mac
|
|||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos.
|
5. Download IntuneAppUtil from https://docs.microsoft.com/en-us/intune/lob-apps-macos.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -102,7 +102,7 @@ Download the installation and onboarding packages from Windows Defender Security
|
|||||||
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
mavel-macmini:Downloads test$
|
mavel-macmini:Downloads test$
|
||||||
```
|
```
|
||||||
7. Make IntuneAppUtil an executable:
|
7. Make IntuneAppUtil an executable:
|
||||||
|
|
||||||
```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
|
```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
|
||||||
|
|
||||||
@ -129,11 +129,11 @@ You need no special provisioning for a Mac machine beyond a standard [Company Po
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Click Open System Preferences, locate Management Profile on the list and click the **Approve...** button. Your Management Profile would be displayed as **Verified**:
|
Select Open System Preferences, locate Management Profile on the list and select the **Approve...** button. Your Management Profile would be displayed as **Verified**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Click the **Continue** button and complete the enrollment.
|
2. Select the **Continue** button and complete the enrollment.
|
||||||
|
|
||||||
You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned.
|
You can enroll additional machines. Optionally, you can do it later, after system configuration and application package are provisioned.
|
||||||
|
|
||||||
@ -142,17 +142,17 @@ You can enroll additional machines. Optionally, you can do it later, after syste
|
|||||||

|

|
||||||
|
|
||||||
### Create System Configuration profiles
|
### Create System Configuration profiles
|
||||||
1. In Intune open the **Manage > Device configuration** blade. Click **Manage > Profiles > Create Profile**.
|
1. In Intune open the **Manage > Device configuration** blade. Select **Manage > Profiles > Create Profile**.
|
||||||
2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Click **Configure**.
|
2. Choose a name for the profile. Change **Platform=macOS**, **Profile type=Custom**. Select **Configure**.
|
||||||
3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above.
|
3. Open the configuration profile and upload intune/kext.xml. This file was created during the Generate settings step above.
|
||||||
4. Click **OK**.
|
4. Select **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. **Click Manage > Assignments**. In the **Include** tab, click **Assign to All Users & All devices**.
|
5. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
7. Repeat these steps with the second profile.
|
7. Repeat these steps with the second profile.
|
||||||
8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file.
|
8. Create Profile one more time, give it a name, upload the intune/WindowsDefenderATPOnboarding.xml file.
|
||||||
9. Click **Manage > Assignments**. In the Include tab, click **Assign to All Users & All devices**.
|
9. Select **Manage > Assignments**. In the Include tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade:
|
After Intune changes are propagated to the enrolled machines, you'll see it on the **Monitor > Device status** blade:
|
||||||
|
|
||||||
@ -160,24 +160,24 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||
|
|
||||||
### Publish application
|
### Publish application
|
||||||
|
|
||||||
1. In Intune, open the **Manage > Client apps** blade. Click **Apps > Add**.
|
1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**.
|
||||||
2. Select **App type=Other/Line-of-business app**.
|
2. Select **App type=Other/Line-of-business app**.
|
||||||
3. Select **file=wdav.pkg.intunemac**. Click **OK** to upload.
|
3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload.
|
||||||
4. Click **Configure** and add the required information.
|
4. Select **Configure** and add the required information.
|
||||||
5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value.
|
5. Use **macOS Sierra 10.12** as the minimum OS. Other settings can be any other value.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Click **OK** and **Add**.
|
6. Select **OK** and **Add**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. It will take a while to upload the package. After it's done, click the name and then go to **Assignments** and **Add group**.
|
7. It will take a while to upload the package. After it's done, select the name and then go to **Assignments** and **Add group**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. Change **Assignment type=Required**.
|
8. Change **Assignment type=Required**.
|
||||||
9. Click **Included Groups**. Select **Make this app required for all devices=Yes**. Click **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**.
|
9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Select **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -186,7 +186,7 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||

|

|
||||||
|
|
||||||
### Verify client machine state
|
### Verify client machine state
|
||||||
1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**.
|
1. After the configuration profiles are deployed to your machines, on your Mac device, open **System Preferences > Profiles**.
|
||||||
|
|
||||||

|

|
||||||

|

|
||||||
@ -194,9 +194,9 @@ After Intune changes are propagated to the enrolled machines, you'll see it on t
|
|||||||
2. Verify the three profiles listed there:
|
2. Verify the three profiles listed there:
|
||||||

|

|
||||||
|
|
||||||
3. The **Management Profile** should be the Intune system profile.
|
3. The **Management Profile** should be the Intune system profile.
|
||||||
4. wdav-config and wdav-kext are system configuration profiles that we added in Intune.
|
4. wdav-config and wdav-kext are system configuration profiles that we added in Intune.
|
||||||
5. You should also see the Microsoft Defender icon in the top-right corner:
|
5. You should also see the Microsoft Defender icon in the top-right corner:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -207,10 +207,10 @@ You need to be familiar with JAMF administration tasks, have a JAMF tenant, and
|
|||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -251,15 +251,15 @@ The configuration profile contains one custom settings payload that includes:
|
|||||||
#### Approved Kernel Extension
|
#### Approved Kernel Extension
|
||||||
|
|
||||||
To approve the kernel extension:
|
To approve the kernel extension:
|
||||||
1. In **Computers > Configuration Profiles** click **Options > Approved Kernel Extensions**.
|
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
||||||
2. Use **UBF8T346G9** for Team Id.
|
2. Use **UBF8T346G9** for Team Id.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
#### Configuration Profile's Scope
|
#### Configuration Profile's Scope
|
||||||
Configure the appropriate scope to specify the machines that will receive this configuration profile.
|
Configure the appropriate scope to specify the machines that will receive this configuration profile.
|
||||||
|
|
||||||
Open Computers -> Configuration Profiles, click **Scope > Targets**. Select the appropriate Target computers.
|
Open Computers -> Configuration Profiles, select **Scope > Targets**. Select the appropriate Target computers.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -290,7 +290,7 @@ You need no special provisioning for a macOS computer beyond the standard JAMF E
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
||||||
|
|
||||||
1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and click **Approve** on the MDM Profile.
|
1. Open the machine details, from **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
||||||
|
|
||||||

|

|
||||||

|

|
||||||
@ -391,10 +391,10 @@ This script returns 0 if Microsoft Defender ATP is registered with the Windows D
|
|||||||
|
|
||||||
### Download installation and onboarding packages
|
### Download installation and onboarding packages
|
||||||
Download the installation and onboarding packages from Windows Defender Security Center:
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**.
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS or Android** and Deployment method to **Local script**.
|
||||||
3. In Section 2 of the page, click **Download installation package**. Save it as wdav.pkg to a local directory.
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
4. In Section 2 of the page, click **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -418,7 +418,7 @@ To complete this process, you must have admin privileges on the machine.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Click **Continue**, agree with the License terms, and enter the password when prompted.
|
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -427,7 +427,7 @@ To complete this process, you must have admin privileges on the machine.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Click **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Click **Allow**:
|
3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -435,10 +435,10 @@ To complete this process, you must have admin privileges on the machine.
|
|||||||
The installation will proceed.
|
The installation will proceed.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you don't click **Allow**, the installation will fail after 5 minutes. You can restart it again at any time.
|
> If you don't select **Allow**, the installation will fail after 5 minutes. You can restart it again at any time.
|
||||||
|
|
||||||
### Client configuration
|
### Client configuration
|
||||||
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
The client machine is not associated with orgId. Note that the orgid is blank.
|
The client machine is not associated with orgId. Note that the orgid is blank.
|
||||||
|
|
||||||
@ -447,14 +447,14 @@ The installation will proceed.
|
|||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid :
|
orgid :
|
||||||
```
|
```
|
||||||
2. Install the configuration file on a client machine:
|
2. Install the configuration file on a client machine:
|
||||||
|
|
||||||
```
|
```
|
||||||
mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py
|
mavel-mojave:wdavconfig testuser$ python WindowsDefenderATPOnboarding.py
|
||||||
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Verify that the machine is now associated with orgId:
|
3. Verify that the machine is now associated with orgId:
|
||||||
|
|
||||||
```
|
```
|
||||||
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
|
Loading…
x
Reference in New Issue
Block a user