mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
moved what to expect from mdatp-mac to mdatp-mac resources
This commit is contained in:
@ -104,6 +104,25 @@ If you are running JAMF, your policy should contain a single script:
|
||||
|
||||
Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy.
|
||||
|
||||
## What to expect in the ATP portal
|
||||
|
||||
- AV alerts:
|
||||
- Severity
|
||||
- Scan type
|
||||
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
||||
- File information (name, path, size, and hash)
|
||||
- Threat information (name, type, and state)
|
||||
- Device information:
|
||||
- Machine identifier
|
||||
- Tenant identifier
|
||||
- App version
|
||||
- Hostname
|
||||
- OS type
|
||||
- OS version
|
||||
- Computer model
|
||||
- Processor architecture
|
||||
- Whether the device is a virtual machine
|
||||
|
||||
## Known issues
|
||||
|
||||
- Not fully optimized for performance or disk space yet.
|
||||
|
@ -37,7 +37,7 @@ We've been working hard through the private preview period, and we've heard your
|
||||
- Product health can be queried with JAMF or the command line.
|
||||
- Admins can set their cloud preference for any location, not just for those in the US.
|
||||
|
||||
## Installing and configuring
|
||||
## Installing and configuring
|
||||
|
||||
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
||||
In general you'll need to take the following steps:
|
||||
@ -80,27 +80,4 @@ To test that a connection is not blocked, open `https://x.cp.wd.microsoft.com/ap
|
||||
```
|
||||
|
||||
We recommend to keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) ([Wiki](https://en.wikipedia.org/wiki/System_Integrity_Protection)) enabled (default setting) on client machines.
|
||||
SIP is a built-in macOS security feature that prevents low-level tampering with the OS.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## What to expect in the ATP portal
|
||||
|
||||
- AV alerts:
|
||||
- Severity
|
||||
- Scan type
|
||||
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
||||
- File information (name, path, size, and hash)
|
||||
- Threat information (name, type, and state)
|
||||
- Device information:
|
||||
- Machine identifier
|
||||
- Tenant identifier
|
||||
- App version
|
||||
- Hostname
|
||||
- OS type
|
||||
- OS version
|
||||
- Computer model
|
||||
- Processor architecture
|
||||
- Whether the device is a virtual machine
|
||||
SIP is a built-in macOS security feature that prevents low-level tampering with the OS.
|
Reference in New Issue
Block a user