mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
fix-suggestions
to fix suggestions
This commit is contained in:
@ -50,7 +50,7 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal.
|
|||||||
1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** -> **iOS/iPadOS** -> **Add** -> **iOS store app** and click **Select**.
|
1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** -> **iOS/iPadOS** -> **Add** -> **iOS store app** and click **Select**.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
1. On the Add app page, click on **Search the App Store** and type **Microsoft Defender ATP** in the search bar. In the search results section, click on *Microsoft Defender ATP* and click **Select**.
|
1. On the Add app page, click on **Search the App Store** and type **Microsoft Defender ATP** in the search bar. In the search results section, click on *Microsoft Defender ATP* and click **Select**.
|
||||||
|
|
||||||
@ -62,14 +62,14 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal.
|
|||||||
> The selected user group should consist of Intune enrolled users.
|
> The selected user group should consist of Intune enrolled users.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page.
|
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page.
|
||||||
|
|
||||||
1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully.
|
1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
## Complete onboarding and check status
|
## Complete onboarding and check status
|
||||||
|
|
||||||
@ -99,7 +99,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
|||||||
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**.
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
1. In the *Create app configuration policy* page, provide the following information:
|
1. In the *Create app configuration policy* page, provide the following information:
|
||||||
- Policy Name
|
- Policy Name
|
||||||
@ -107,7 +107,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
|||||||
- Targeted app: Select **Microsoft Defender ATP** from the list
|
- Targeted app: Select **Microsoft Defender ATP** from the list
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
1. In the next screen, select **Use configuration designer** as the format. Specify the following property:
|
1. In the next screen, select **Use configuration designer** as the format. Specify the following property:
|
||||||
- Configuration Key: issupervised
|
- Configuration Key: issupervised
|
||||||
@ -115,7 +115,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
|||||||
- Configuration Value: {{issupervised}}
|
- Configuration Value: {{issupervised}}
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
1. Click **Next** to open the **Scope tags** page. Scope tags are optional. Click **Next** to continue.
|
1. Click **Next** to open the **Scope tags** page. Scope tags are optional. Click **Next** to continue.
|
||||||
|
|
||||||
@ -132,7 +132,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
|||||||
- Navigate to **Devices** -> **iOS/iPadOS** -> **Configuration profiles** -> **Create Profile**
|
- Navigate to **Devices** -> **iOS/iPadOS** -> **Configuration profiles** -> **Create Profile**
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||

|

|
||||||
|
|
||||||
- Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded above.
|
- Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded above.
|
||||||
- In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Click **Next**.
|
- In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Click **Next**.
|
||||||
|
@ -31,15 +31,15 @@ ms.topic: conceptual
|
|||||||
|
|
||||||
1. Enter your credentials.
|
1. Enter your credentials.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Computers**.
|
2. Select **Computers**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. You will see the settings that are available.
|
3. You will see the settings that are available.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
## Next step
|
## Next step
|
||||||
|
@ -58,16 +58,16 @@ To complete this process, you must have admin privileges on the device.
|
|||||||
|
|
||||||
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> You will be prompted to allow a driver from Microsoft to be installed (either "System Extension Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed.
|
> You will be prompted to allow a driver from Microsoft to be installed (either "System Extension Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**:
|
3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**:
|
||||||
|
|
||||||
@ -87,7 +87,7 @@ To complete this process, you must have admin privileges on the device.
|
|||||||
|
|
||||||
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||||
|
|
||||||
@ -97,13 +97,13 @@ To complete this process, you must have admin privileges on the device.
|
|||||||
|
|
||||||
4. From the **Security & Privacy** window, select **Allow**.
|
4. From the **Security & Privacy** window, select **Allow**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Repeat steps 3 & 4 for all system extensions distributed with Microsoft Defender for Endpoint for Mac.
|
5. Repeat steps 3 & 4 for all system extensions distributed with Microsoft Defender for Endpoint for Mac.
|
||||||
|
|
||||||
6. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**.
|
6. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Open **System Preferences** > **Security & Privacy** and navigate to the **Privacy** tab. Grant **Full Disk Access** permission to **Microsoft Defender ATP** and **Microsoft Defender ATP Endpoint Security Extension**.
|
7. Open **System Preferences** > **Security & Privacy** and navigate to the **Privacy** tab. Grant **Full Disk Access** permission to **Microsoft Defender ATP** and **Microsoft Defender ATP Endpoint Security Extension**.
|
||||||
|
|
||||||
|
@ -35,15 +35,15 @@ Set up the device groups similar to Group policy organizational unite (OUs), Mi
|
|||||||
|
|
||||||
2. Select **New**.
|
2. Select **New**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Provide a display name and select **Save**.
|
3. Provide a display name and select **Save**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Now you will see the **Contoso's Machine Group** under **Static Computer Groups**.
|
4. Now you will see the **Contoso's Machine Group** under **Static Computer Groups**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Next step
|
## Next step
|
||||||
- [Set up Microsoft Defender for Endpoint for macOS policies in Jamf Pro](mac-jamfpro-policies.md)
|
- [Set up Microsoft Defender for Endpoint for macOS policies in Jamf Pro](mac-jamfpro-policies.md)
|
||||||
|
@ -46,7 +46,7 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
|||||||
|
|
||||||
1. In the Jamf Pro dashboard, navigate to **Enrollment invitations**.
|
1. In the Jamf Pro dashboard, navigate to **Enrollment invitations**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **+ New**.
|
2. Select **+ New**.
|
||||||
|
|
||||||
@ -54,29 +54,29 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
|||||||
|
|
||||||
3. In **Specify Recipients for the Invitation** > under **Email Addresses** enter the e-mail address(es) of the recipients.
|
3. In **Specify Recipients for the Invitation** > under **Email Addresses** enter the e-mail address(es) of the recipients.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
For example: janedoe@contoso.com
|
For example: janedoe@contoso.com
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Configure the message for the invitation.
|
4. Configure the message for the invitation.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Enrollment Method 2: Prestage Enrollments
|
## Enrollment Method 2: Prestage Enrollments
|
||||||
|
|
||||||
1. In the Jamf Pro dashboard, navigate to **Prestage enrollments**.
|
1. In the Jamf Pro dashboard, navigate to **Prestage enrollments**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Follow the instructions in [Computer PreStage Enrollments](https://docs.jamf.com/9.9/casper-suite/administrator-guide/Computer_PreStage_Enrollments.html).
|
2. Follow the instructions in [Computer PreStage Enrollments](https://docs.jamf.com/9.9/casper-suite/administrator-guide/Computer_PreStage_Enrollments.html).
|
||||||
|
|
||||||
@ -84,24 +84,24 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
|||||||
|
|
||||||
1. Select **Continue** and install the CA certificate from a **System Preferences** window.
|
1. Select **Continue** and install the CA certificate from a **System Preferences** window.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Once CA certificate is installed, return to the browser window and select **Continue** and install the MDM profile.
|
2. Once CA certificate is installed, return to the browser window and select **Continue** and install the MDM profile.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Select **Allow** to downloads from JAMF.
|
3. Select **Allow** to downloads from JAMF.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Select **Continue** to proceed with the MDM Profile installation.
|
4. Select **Continue** to proceed with the MDM Profile installation.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Select **Continue** to install the MDM Profile.
|
5. Select **Continue** to install the MDM Profile.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Select **Continue** to complete the configuration.
|
6. Select **Continue** to complete the configuration.
|
||||||
|
|
||||||

|

|
||||||
|
Reference in New Issue
Block a user