mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
fix-suggestions
to fix suggestions
This commit is contained in:
@ -50,7 +50,7 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal.
|
||||
1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** -> **iOS/iPadOS** -> **Add** -> **iOS store app** and click **Select**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
1. On the Add app page, click on **Search the App Store** and type **Microsoft Defender ATP** in the search bar. In the search results section, click on *Microsoft Defender ATP* and click **Select**.
|
||||
|
||||
@ -62,14 +62,14 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal.
|
||||
> The selected user group should consist of Intune enrolled users.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page.
|
||||
|
||||
1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
## Complete onboarding and check status
|
||||
|
||||
@ -99,7 +99,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
||||
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
1. In the *Create app configuration policy* page, provide the following information:
|
||||
- Policy Name
|
||||
@ -107,7 +107,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
||||
- Targeted app: Select **Microsoft Defender ATP** from the list
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
1. In the next screen, select **Use configuration designer** as the format. Specify the following property:
|
||||
- Configuration Key: issupervised
|
||||
@ -115,7 +115,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
||||
- Configuration Value: {{issupervised}}
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
1. Click **Next** to open the **Scope tags** page. Scope tags are optional. Click **Next** to continue.
|
||||
|
||||
@ -132,7 +132,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura
|
||||
- Navigate to **Devices** -> **iOS/iPadOS** -> **Configuration profiles** -> **Create Profile**
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||

|
||||

|
||||
|
||||
- Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded above.
|
||||
- In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Click **Next**.
|
||||
|
@ -31,15 +31,15 @@ ms.topic: conceptual
|
||||
|
||||
1. Enter your credentials.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select **Computers**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. You will see the settings that are available.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
## Next step
|
||||
|
@ -58,16 +58,16 @@ To complete this process, you must have admin privileges on the device.
|
||||
|
||||
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||
|
||||

|
||||

|
||||
|
||||
> [!IMPORTANT]
|
||||
> You will be prompted to allow a driver from Microsoft to be installed (either "System Extension Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**:
|
||||
|
||||
@ -87,7 +87,7 @@ To complete this process, you must have admin privileges on the device.
|
||||
|
||||
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||
|
||||
@ -97,13 +97,13 @@ To complete this process, you must have admin privileges on the device.
|
||||
|
||||
4. From the **Security & Privacy** window, select **Allow**.
|
||||
|
||||

|
||||

|
||||
|
||||
5. Repeat steps 3 & 4 for all system extensions distributed with Microsoft Defender for Endpoint for Mac.
|
||||
|
||||
6. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**.
|
||||
|
||||

|
||||

|
||||
|
||||
7. Open **System Preferences** > **Security & Privacy** and navigate to the **Privacy** tab. Grant **Full Disk Access** permission to **Microsoft Defender ATP** and **Microsoft Defender ATP Endpoint Security Extension**.
|
||||
|
||||
|
@ -35,15 +35,15 @@ Set up the device groups similar to Group policy organizational unite (OUs), Mi
|
||||
|
||||
2. Select **New**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Provide a display name and select **Save**.
|
||||
|
||||

|
||||

|
||||
|
||||
4. Now you will see the **Contoso's Machine Group** under **Static Computer Groups**.
|
||||
|
||||

|
||||

|
||||
|
||||
## Next step
|
||||
- [Set up Microsoft Defender for Endpoint for macOS policies in Jamf Pro](mac-jamfpro-policies.md)
|
||||
|
@ -46,7 +46,7 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
||||
|
||||
1. In the Jamf Pro dashboard, navigate to **Enrollment invitations**.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select **+ New**.
|
||||
|
||||
@ -54,29 +54,29 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
||||
|
||||
3. In **Specify Recipients for the Invitation** > under **Email Addresses** enter the e-mail address(es) of the recipients.
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
For example: janedoe@contoso.com
|
||||
|
||||

|
||||

|
||||
|
||||
4. Configure the message for the invitation.
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
## Enrollment Method 2: Prestage Enrollments
|
||||
|
||||
1. In the Jamf Pro dashboard, navigate to **Prestage enrollments**.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Follow the instructions in [Computer PreStage Enrollments](https://docs.jamf.com/9.9/casper-suite/administrator-guide/Computer_PreStage_Enrollments.html).
|
||||
|
||||
@ -84,24 +84,24 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c
|
||||
|
||||
1. Select **Continue** and install the CA certificate from a **System Preferences** window.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Once CA certificate is installed, return to the browser window and select **Continue** and install the MDM profile.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Select **Allow** to downloads from JAMF.
|
||||
|
||||

|
||||

|
||||
|
||||
4. Select **Continue** to proceed with the MDM Profile installation.
|
||||
|
||||

|
||||

|
||||
|
||||
5. Select **Continue** to install the MDM Profile.
|
||||
|
||||

|
||||

|
||||
|
||||
6. Select **Continue** to complete the configuration.
|
||||
|
||||

|
||||

|
||||
|
Reference in New Issue
Block a user