mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
First set of pages for Linux
Copied from Mac
This commit is contained in:
parent
0562139019
commit
c45c45ebe5
@ -0,0 +1,185 @@
|
|||||||
|
---
|
||||||
|
title: Installing Microsoft Defender ATP for Mac manually
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to install Microsoft Defender ATP for Mac manually, from the command line.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Manual deployment
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
This topic describes how to deploy Microsoft Defender ATP for Mac manually. A successful deployment requires the completion of all of the following steps:
|
||||||
|
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)
|
||||||
|
- [Application installation](#application-installation)
|
||||||
|
- [Client configuration](#client-configuration)
|
||||||
|
|
||||||
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
|
Before you get started, see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
|
|
||||||
|
1. In Windows Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
|
2. In Section 1 of the page, set operating system to **Linux, macOS, iOS, and Android** and Deployment method to **Local script**.
|
||||||
|
3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
|
||||||
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. From a command prompt, verify that you have the two files.
|
||||||
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ ls -l
|
||||||
|
total 721152
|
||||||
|
-rw-r--r-- 1 test staff 6185 Mar 15 10:45 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
inflating: WindowsDefenderATPOnboarding.py
|
||||||
|
```
|
||||||
|
|
||||||
|
## Application installation
|
||||||
|
|
||||||
|
To complete this process, you must have admin privileges on the machine.
|
||||||
|
|
||||||
|
1. Navigate to the downloaded wdav.pkg in Finder and open it.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Continue**, agree with the License terms, and enter the password when prompted.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> You will be prompted to allow a driver from Microsoft to be installed (either "System Exception Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The installation proceeds.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you don't select **Allow**, the installation will proceed after 5 minutes. Defender ATP will be loaded, but real-time protection will be disabled.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> macOS may request to reboot the machine upon the first installation of Microsoft Defender. Real-Time Protection will not be available until the machine is rebooted.
|
||||||
|
|
||||||
|
### Fixing disabled Real-Time Protection
|
||||||
|
|
||||||
|
If you did not enable Microsoft's driver during installation, then the application displays a banner prompting you to enable it:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can also run ```mdatp --health```. It reports if Real-Time Protection is enabled but not available:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health
|
||||||
|
...
|
||||||
|
realTimeProtectionAvailable : false
|
||||||
|
realTimeProtectionEnabled : true
|
||||||
|
...
|
||||||
|
```
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> You have a 30 minute window to enable Real-Time Protection from the warning banner, immediately following installation.
|
||||||
|
|
||||||
|
The warning banner contains a **Fix** button, which allows you to quickly enable Real-Time Protection, without having to open a command prompt. Select the **Fix** button. It prompts the **Security & Privacy** system window, where you have to **Allow** system software from developers "Microsoft Corporation".
|
||||||
|
|
||||||
|
If you don't see a prompt, it means that 30 or more minutes have already passed, and Real-Time Protection has still not been enabled:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
In this case, you need to perform the following steps to enable Real-Time Protection instead.
|
||||||
|
|
||||||
|
1. In Terminal, attempt to install the driver. (The operation will fail)
|
||||||
|
```bash
|
||||||
|
$ sudo kextutil /Library/Extensions/wdavkext.kext
|
||||||
|
Kext rejected due to system policy: <OSKext 0x7fc34d528390 [0x7fffa74aa8e0]> { URL = "file:///Library/StagedExtensions/Library/Extensions/wdavkext.kext/", ID = "com.microsoft.wdavkext" }
|
||||||
|
Kext rejected due to system policy: <OSKext 0x7fc34d528390 [0x7fffa74aa8e0]> { URL = "file:///Library/StagedExtensions/Library/Extensions/wdavkext.kext/", ID = "com.microsoft.wdavkext" }
|
||||||
|
Diagnostics for /Library/Extensions/wdavkext.kext:
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Open **System Preferences...** > **Security & Privacy** from the menu. (Close it first, if it's opened.)
|
||||||
|
|
||||||
|
3. **Allow** system software from developers "Microsoft Corporation"
|
||||||
|
|
||||||
|
4. In Terminal, install the driver again. This time the operation will succeed:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ sudo kextutil /Library/Extensions/wdavkext.kext
|
||||||
|
```
|
||||||
|
|
||||||
|
The banner should disappear from the Defender application, and ```mdatp --health``` should now report that Real-Time Protection is both enabled and available:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health
|
||||||
|
...
|
||||||
|
realTimeProtectionAvailable : true
|
||||||
|
realTimeProtectionEnabled : true
|
||||||
|
...
|
||||||
|
```
|
||||||
|
|
||||||
|
## Client configuration
|
||||||
|
|
||||||
|
1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
The client machine is not associated with orgId. Note that the *orgId* attribute is blank.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health orgId
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Run the Python script to install the configuration file:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ /usr/bin/python WindowsDefenderATPOnboarding.py
|
||||||
|
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Verify that the machine is now associated with your organization and reports a valid *orgId*:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health orgId
|
||||||
|
E6875323-A6C0-4C60-87AD-114BBE7439B8
|
||||||
|
```
|
||||||
|
|
||||||
|
After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## How to Allow Full Disk Access
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.
|
||||||
|
|
||||||
|
To grant consent, open System Preferences -> Security & Privacy -> Privacy -> Full Disk Access. Click the lock icon to make changes (bottom of the dialog box). Select Microsoft Defender ATP.
|
||||||
|
|
||||||
|
## Logging installation issues
|
||||||
|
|
||||||
|
See [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
|
||||||
|
|
||||||
|
## Uninstallation
|
||||||
|
|
||||||
|
See [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling) for details on how to remove Microsoft Defender ATP for Mac from client devices.
|
@ -0,0 +1,259 @@
|
|||||||
|
---
|
||||||
|
title: Installing Microsoft Defender ATP for Mac with JAMF
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to install Microsoft Defender ATP for Mac, using JAMF.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# JAMF-based deployment
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
This topic describes how to deploy Microsoft Defender ATP for Mac through JAMF. A successful deployment requires the completion of all of the following steps:
|
||||||
|
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)
|
||||||
|
- [Create JAMF policies](#create-jamf-policies)
|
||||||
|
- [Client device setup](#client-device-setup)
|
||||||
|
- [Deployment](#deployment)
|
||||||
|
- [Check onboarding status](#check-onboarding-status)
|
||||||
|
|
||||||
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
|
Before you get started, please see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
|
In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow.
|
||||||
|
|
||||||
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
|
Download the installation and onboarding packages from Windows Defender Security Center:
|
||||||
|
|
||||||
|
1. In Windows Defender Security Center, go to **Settings > device Management > Onboarding**.
|
||||||
|
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS or Android** and deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
|
3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||||
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ ls -l
|
||||||
|
total 721160
|
||||||
|
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
|
||||||
|
inflating: intune/kext.xml
|
||||||
|
inflating: intune/WindowsDefenderATPOnboarding.xml
|
||||||
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
|
```
|
||||||
|
|
||||||
|
## Create JAMF policies
|
||||||
|
|
||||||
|
You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client devices.
|
||||||
|
|
||||||
|
### Configuration Profile
|
||||||
|
|
||||||
|
The configuration profile contains a custom settings payload that includes:
|
||||||
|
|
||||||
|
- Microsoft Defender ATP for Mac onboarding information
|
||||||
|
- Approved Kernel Extensions payload, to enable running the Microsoft kernel driver
|
||||||
|
|
||||||
|
To set the onboarding information, add a property list file with the name, _jamf/WindowsDefenderATPOnboarding.plist_, as a custom setting. You can do this by navigating to **Computers**>**Configuration Profiles**, selecting **New**, then choosing **Custom Settings**>**Configure**. From there, you can upload the property list.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
> You must set the Preference Domain as "com.microsoft.wdav.atp"
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Approved Kernel Extension
|
||||||
|
|
||||||
|
To approve the kernel extension:
|
||||||
|
|
||||||
|
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
||||||
|
2. Use **UBF8T346G9** for Team Id.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Privacy Preferences Policy Control
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.
|
||||||
|
>
|
||||||
|
> If you previously configured Microsoft Defender ATP through JAMF, we recommend applying the following configuration.
|
||||||
|
|
||||||
|
Add the following JAMF policy to grant Full Disk Access to Microsoft Defender ATP.
|
||||||
|
|
||||||
|
1. Select **Options > Privacy Preferences Policy Control**.
|
||||||
|
2. Use any identifier and identifier type = Bundle.
|
||||||
|
3. Set Code Requirement to `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`.
|
||||||
|
4. Set app or service to SystemPolicyAllFiles and access to Allow.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Configuration Profile's Scope
|
||||||
|
|
||||||
|
Configure the appropriate scope to specify the devices that will receive the configuration profile.
|
||||||
|
|
||||||
|
Open **Computers** > **Configuration Profiles**, and select **Scope > Targets**. From there, select the devices you want to target.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Save the **Configuration Profile**.
|
||||||
|
|
||||||
|
Use the **Logs** tab to monitor deployment status for each enrolled device.
|
||||||
|
|
||||||
|
### Package
|
||||||
|
|
||||||
|
1. Create a package in **Settings > Computer Management > Packages**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Upload the package to the Distribution Point.
|
||||||
|
3. In the **filename** field, enter the name of the package. For example, _wdav.pkg_.
|
||||||
|
|
||||||
|
### Policy
|
||||||
|
|
||||||
|
Your policy should contain a single package for Microsoft Defender.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Configure the appropriate scope to specify the computers that will receive this policy.
|
||||||
|
|
||||||
|
After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled device.
|
||||||
|
|
||||||
|
## Client device setup
|
||||||
|
|
||||||
|
You'll need no special provisioning for a macOS computer, beyond the standard JAMF Enrollment.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> After a computer is enrolled, it will show up in the Computers inventory (All Computers).
|
||||||
|
|
||||||
|
1. Open **Device Profiles**, from the **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's currently set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
After a moment, the device's User Approved MDM status will change to **Yes**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You may now enroll additional devices. You may also enroll them later, after you have finished provisioning system configuration and application packages.
|
||||||
|
|
||||||
|
## Deployment
|
||||||
|
|
||||||
|
Enrolled client devices periodically poll the JAMF Server, and install new configuration profiles and policies as soon as they are detected.
|
||||||
|
|
||||||
|
### Status on the server
|
||||||
|
|
||||||
|
You can monitor deployment status in the **Logs** tab:
|
||||||
|
|
||||||
|
- **Pending** means that the deployment is scheduled but has not yet happened
|
||||||
|
- **Completed** means that the deployment succeeded and is no longer scheduled
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Status on client device
|
||||||
|
|
||||||
|
After the Configuration Profile is deployed, you'll see the profile for the device in **System Preferences** > **Profiles >**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Once the policy is applied, you'll see the Microsoft Defender ATP icon in the macOS status bar in the top-right corner.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can monitor policy installation on a device by following the JAMF log file:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ tail -f /var/log/jamf.log
|
||||||
|
Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
|
||||||
|
Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
|
||||||
|
Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV
|
||||||
|
Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender...
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender.
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches...
|
||||||
|
Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found.
|
||||||
|
```
|
||||||
|
|
||||||
|
You can also check the onboarding status:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health
|
||||||
|
...
|
||||||
|
licensed : true
|
||||||
|
orgId : "4751b7d4-ea75-4e8f-a1f5-6d640c65bc45"
|
||||||
|
...
|
||||||
|
```
|
||||||
|
|
||||||
|
- **licensed**: This confirms that the device has an ATP license.
|
||||||
|
|
||||||
|
- **orgid**: Your Microsoft Defender ATP org id; it will be the same for your organization.
|
||||||
|
|
||||||
|
## Check onboarding status
|
||||||
|
|
||||||
|
You can check that devices have been correctly onboarded by creating a script. For example, the following script checks enrolled devices for onboarding status:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --health healthy
|
||||||
|
```
|
||||||
|
|
||||||
|
The above command prints "1" if the product is onboarded and functioning as expected.
|
||||||
|
|
||||||
|
If the product is not healthy, the exit code (which can be checked through `echo $?`) indicates the problem:
|
||||||
|
- 1 if the device is not yet onboarded
|
||||||
|
- 3 if the connection to the daemon cannot be established—for example, if the daemon is not running
|
||||||
|
|
||||||
|
## Logging installation issues
|
||||||
|
|
||||||
|
See [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
|
||||||
|
|
||||||
|
## Uninstallation
|
||||||
|
|
||||||
|
This method is based on the script described in [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling).
|
||||||
|
|
||||||
|
### Script
|
||||||
|
|
||||||
|
Create a script in **Settings > Computer Management > Scripts**.
|
||||||
|
|
||||||
|
This script removes Microsoft Defender ATP from the /Applications directory:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
echo "Is WDAV installed?"
|
||||||
|
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
||||||
|
|
||||||
|
echo "Uninstalling WDAV..."
|
||||||
|
rm -rf '/Applications/Microsoft Defender ATP.app'
|
||||||
|
|
||||||
|
echo "Is WDAV still installed?"
|
||||||
|
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
||||||
|
|
||||||
|
echo "Done!"
|
||||||
|
```
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Policy
|
||||||
|
|
||||||
|
Your policy should contain a single script:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy.
|
@ -0,0 +1,79 @@
|
|||||||
|
---
|
||||||
|
title: Installing Microsoft Defender ATP for Mac with different MDM product
|
||||||
|
description: Describes how to install Microsoft Defender ATP for Mac on other management solutions.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: mavel
|
||||||
|
author: maximvelichko
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Deployment with a different Mobile Device Management (MDM) system
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
|
Before you get started, see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
|
## Approach
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> Currently, Microsoft oficially supports only Intune and JAMF for the deployment and management of Microsoft Defender ATP for Mac. Microsoft makes no warranties, express or implied, with respect to the information provided below.
|
||||||
|
|
||||||
|
If your organization uses a Mobile Device Management (MDM) solution that is not officially supported, this does not mean you are unable to deploy or run Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
Microsoft Defender ATP for Mac does not depend on any vendor-specific features. It can be used with any MDM solution that supports the following features:
|
||||||
|
|
||||||
|
- Deploy a macOS .pkg to managed machines.
|
||||||
|
- Deploy macOS system configuration profiles to managed machines.
|
||||||
|
- Run an arbitrary admin-configured tool/script on managed machines.
|
||||||
|
|
||||||
|
Most modern MDM solutions include these features, however, they may call them differently.
|
||||||
|
|
||||||
|
You can deploy Defender without the last requirement from the preceding list, however:
|
||||||
|
|
||||||
|
- You will not be able to collect status in a centralized way
|
||||||
|
- If you decide to uninstall Defender, you will need to logon to the client machine locally as an administrator
|
||||||
|
|
||||||
|
## Deployment
|
||||||
|
|
||||||
|
Most MDM solutions use the same model for managing macOS machines, with similar terminology. Use [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf.md) as a template.
|
||||||
|
|
||||||
|
### Package
|
||||||
|
|
||||||
|
Configure deployment of a [required application package](microsoft-defender-atp-mac-install-with-jamf.md#package),
|
||||||
|
with the installation package (wdav.pkg) downloaded from [Microsoft Defender Security Center](microsoft-defender-atp-mac-install-with-jamf.md#download-installation-and-onboarding-packages).
|
||||||
|
|
||||||
|
In order to deploy the package to your enterprise, use the instructions associated with your MDM solution.
|
||||||
|
|
||||||
|
### License settings
|
||||||
|
|
||||||
|
Set up [a system configuration profile](microsoft-defender-atp-mac-install-with-jamf.md#configuration-profile).
|
||||||
|
Your MDM solution may call it something like "Custom Settings Profile", as Microsoft Defender ATP for Mac is not part of macOS.
|
||||||
|
|
||||||
|
Use the property list, jamf/WindowsDefenderATPOnboarding.plist, which can be extracted from an onboarding package downloaded from [Microsoft Defender Security Center](microsoft-defender-atp-mac-install-with-jamf.md#download-installation-and-onboarding-packages).
|
||||||
|
Your system may support an arbitrary property list in XML format. You can upload the jamf/WindowsDefenderATPOnboarding.plist file as-is in that case.
|
||||||
|
Alternatively, it may require you to convert the property list to a different format first.
|
||||||
|
|
||||||
|
Typically, your custom profile has an id, name, or domain attribute. You must use exactly "com.microsoft.wdav.atp" for this value.
|
||||||
|
MDM uses it to deploy the settings file to **/Library/Managed Preferences/com.microsoft.wdav.atp.plist** on a client machine, and Defender uses this file for loading the onboarding information.
|
||||||
|
|
||||||
|
### Kernel extension policy
|
||||||
|
|
||||||
|
Set up a KEXT or kernel extension policy. Use team identifier **UBF8T346G9** to whitelist kernel extensions provided by Microsoft.
|
||||||
|
|
||||||
|
## Check installation status
|
||||||
|
|
||||||
|
Run [mdatp](microsoft-defender-atp-mac-install-with-jamf.md#check-onboarding-status) on a client machine to check the onboarding status.
|
@ -0,0 +1,253 @@
|
|||||||
|
---
|
||||||
|
title: Installing Microsoft Defender ATP for Mac with Microsoft Intune
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to install Microsoft Defender ATP for Mac, using Microsoft Intune.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Intune-based deployment
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
This topic describes how to deploy Microsoft Defender ATP for Mac through Intune. A successful deployment requires the completion of all of the following steps:
|
||||||
|
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)
|
||||||
|
- [Client device setup](#client-device-setup)
|
||||||
|
- [Create System Configuration profiles](#create-system-configuration-profiles)
|
||||||
|
- [Publish application](#publish-application)
|
||||||
|
|
||||||
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
|
Before you get started, see [the main Microsoft Defender ATP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
|
Download the installation and onboarding packages from Microsoft Defender Security Center:
|
||||||
|
|
||||||
|
1. In Microsoft Defender Security Center, go to **Settings** > **Device Management** > **Onboarding**.
|
||||||
|
2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS, or Android** and the deployment method to **Mobile Device Management / Microsoft Intune**.
|
||||||
|
3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||||
|
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||||
|
5. Download **IntuneAppUtil** from [https://docs.microsoft.com/intune/lob-apps-macos](https://docs.microsoft.com/intune/lob-apps-macos).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. From a command prompt, verify that you have the three files.
|
||||||
|
Extract the contents of the .zip files:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ ls -l
|
||||||
|
total 721688
|
||||||
|
-rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil
|
||||||
|
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
|
||||||
|
$ unzip WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
Archive: WindowsDefenderATPOnboardingPackage.zip
|
||||||
|
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
|
||||||
|
inflating: intune/kext.xml
|
||||||
|
inflating: intune/WindowsDefenderATPOnboarding.xml
|
||||||
|
inflating: jamf/WindowsDefenderATPOnboarding.plist
|
||||||
|
```
|
||||||
|
|
||||||
|
7. Make IntuneAppUtil an executable:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ chmod +x IntuneAppUtil
|
||||||
|
```
|
||||||
|
|
||||||
|
8. Create the wdav.pkg.intunemac package from wdav.pkg:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
|
||||||
|
Microsoft Intune Application Utility for Mac OS X
|
||||||
|
Version: 1.0.0.0
|
||||||
|
Copyright 2018 Microsoft Corporation
|
||||||
|
|
||||||
|
Creating intunemac file for /Users/test/Downloads/wdav.pkg
|
||||||
|
Composing the intunemac file output
|
||||||
|
Output written to ./wdav.pkg.intunemac.
|
||||||
|
|
||||||
|
IntuneAppUtil successfully processed "wdav.pkg",
|
||||||
|
to deploy refer to the product documentation.
|
||||||
|
```
|
||||||
|
|
||||||
|
## Client device setup
|
||||||
|
|
||||||
|
You need no special provisioning for a Mac device beyond a standard [Company Portal installation](https://docs.microsoft.com/intune-user-help/enroll-your-device-in-intune-macos-cp).
|
||||||
|
|
||||||
|
1. You are asked to confirm device management.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Continue** and complete the enrollment.
|
||||||
|
|
||||||
|
You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.
|
||||||
|
|
||||||
|
3. In Intune, open **Manage** > **Devices** > **All devices**. Here you can see your device among those listed:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Create System Configuration profiles
|
||||||
|
|
||||||
|
1. In Intune, open **Manage** > **Device configuration**. Select **Manage** > **Profiles** > **Create Profile**.
|
||||||
|
2. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select **Configure**.
|
||||||
|
3. Open the configuration profile and upload intune/kext.xml. This file was created in one of the preceding sections.
|
||||||
|
4. Select **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
|
6. Repeat steps 1 through 5 for more profiles.
|
||||||
|
7. Create another profile, give it a name, and upload the intune/WindowsDefenderATPOnboarding.xml file.
|
||||||
|
8. Create tcc.xml file with content below. Create another profile, give it any name and upload this file to it.
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.
|
||||||
|
>
|
||||||
|
> The following configuration profile grants Full Disk Access to Microsoft Defender ATP. If you previously configured Microsoft Defender ATP through Intune, we recommend you update the deployment with this configuration profile.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string>Allows Microsoft Defender to access all files on Catalina+</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>TCC - Microsoft Defender</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.wdav.tcc</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft Corp.</string>
|
||||||
|
<key>PayloadRemovalDisallowed</key>
|
||||||
|
<false/>
|
||||||
|
<key>PayloadScope</key>
|
||||||
|
<string>system</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>Configuration</string>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>C234DF2E-DFF6-11E9-B279-001C4299FB44</string>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadContent</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string>Allows Microsoft Defender to access all files on Catalina+</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>TCC - Microsoft Defender</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.wdav.tcc.C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft Corp.</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>com.apple.TCC.configuration-profile-policy</string>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>Services</key>
|
||||||
|
<dict>
|
||||||
|
<key>SystemPolicyAllFiles</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>Allowed</key>
|
||||||
|
<true/>
|
||||||
|
<key>CodeRequirement</key>
|
||||||
|
<string>identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string>Allow SystemPolicyAllFiles control for Microsoft Defender ATP</string>
|
||||||
|
<key>Identifier</key>
|
||||||
|
<string>com.microsoft.wdav</string>
|
||||||
|
<key>IdentifierType</key>
|
||||||
|
<string>bundleID</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
9. Select **Manage > Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
|
Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor** > **Device status**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Publish application
|
||||||
|
|
||||||
|
1. In Intune, open the **Manage > Client apps** blade. Select **Apps > Add**.
|
||||||
|
2. Select **App type=Other/Line-of-business app**.
|
||||||
|
3. Select **file=wdav.pkg.intunemac**. Select **OK** to upload.
|
||||||
|
4. Select **Configure** and add the required information.
|
||||||
|
5. Use **macOS Sierra 10.12** as the minimum OS and set *Ignore app version* to **Yes**. Other settings can be any arbitrary value.
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> Failure to set *Ignore app version* to **Yes** impacts the ability of the application to receive updates through Microsoft AutoUpdate. See [Deploy updates for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-updates.md) for additional information about how the product is updated.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Select **OK** and **Add**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. It may take a few moments to upload the package. After it's done, select the package from the list and go to **Assignments** and **Add group**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Change **Assignment type** to **Required**.
|
||||||
|
9. Select **Included Groups**. Select **Make this app required for all devices=Yes**. Click **Select group to include** and add a group that contains the users you want to target. Select **OK** and **Save**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. After some time the application will be published to all enrolled devices. You can see it listed in **Monitor** > **Device**, under **Device install status**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Verify client device state
|
||||||
|
|
||||||
|
1. After the configuration profiles are deployed to your devices, open **System Preferences** > **Profiles** on your Mac device.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
2. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile. _Wdav-config_ and _wdav-kext_ are system configuration profiles that were added in Intune:
|
||||||
|

|
||||||
|
|
||||||
|
3. You should also see the Microsoft Defender icon in the top-right corner:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
Issue: No license found
|
||||||
|
|
||||||
|
Solution: Follow the steps above to create a device profile using WindowsDefenderATPOnboarding.xml
|
||||||
|
|
||||||
|
## Logging installation issues
|
||||||
|
|
||||||
|
For more information on how to find the automatically generated log that is created by the installer when an error occurs, see [Logging installation issues](microsoft-defender-atp-mac-resources.md#logging-installation-issues) .
|
||||||
|
|
||||||
|
## Uninstallation
|
||||||
|
|
||||||
|
See [Uninstalling](microsoft-defender-atp-mac-resources.md#uninstalling) for details on how to remove Microsoft Defender ATP for Mac from client devices.
|
@ -0,0 +1,623 @@
|
|||||||
|
---
|
||||||
|
title: Set preferences for Microsoft Defender ATP for Mac
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to configure Microsoft Defender ATP for Mac in enterprises.
|
||||||
|
keywords: microsoft, defender, atp, mac, management, preferences, enterprise, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Set preferences for Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This topic contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise environments. If you are interested in configuring the product on a device from the command-line, please refer to the [Resources](microsoft-defender-atp-mac-resources.md#configuring-from-the-command-line) page.
|
||||||
|
|
||||||
|
In enterprise environments, Microsoft Defender ATP for Mac can be managed through a configuration profile. This profile is deployed from management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile.
|
||||||
|
|
||||||
|
This topic describes the structure of this profile (including a recommended profile that you can use to get started) and instructions for how to deploy the profile.
|
||||||
|
|
||||||
|
## Configuration profile structure
|
||||||
|
|
||||||
|
The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.
|
||||||
|
|
||||||
|
>[!CAUTION]
|
||||||
|
>The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.
|
||||||
|
|
||||||
|
The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections.
|
||||||
|
|
||||||
|
### Antivirus engine preferences
|
||||||
|
|
||||||
|
The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of the product.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | antivirusEngine |
|
||||||
|
| **Data type** | Dictionary (nested preference) |
|
||||||
|
| **Comments** | See the following sections for a description of the dictionary contents. |
|
||||||
|
|
||||||
|
#### Enable / disable real-time protection
|
||||||
|
|
||||||
|
Whether real-time protection (scan files as they are accessed) is enabled or not.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | enableRealTimeProtection |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | true (default) <br/> false |
|
||||||
|
|
||||||
|
#### Enable / disable passive mode
|
||||||
|
|
||||||
|
Whether the antivirus engine runs in passive mode or not. In passive mode:
|
||||||
|
- Real-time protection is turned off
|
||||||
|
- On-demand scanning is turned on
|
||||||
|
- Automatic threat remediation is turned off
|
||||||
|
- Security intelligence updates are turned on
|
||||||
|
- Status menu icon is hidden
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | passiveMode |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | false (default) <br/> true |
|
||||||
|
| **Comments** | Available in Microsoft Defender ATP version 100.67.60 or higher. |
|
||||||
|
|
||||||
|
#### Scan exclusions
|
||||||
|
|
||||||
|
Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | exclusions |
|
||||||
|
| **Data type** | Dictionary (nested preference) |
|
||||||
|
| **Comments** | See the following sections for a description of the dictionary contents. |
|
||||||
|
|
||||||
|
**Type of exclusion**
|
||||||
|
|
||||||
|
Specifies the type of content excluded from the scan.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | $type |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | excludedPath <br/> excludedFileExtension <br/> excludedFileName |
|
||||||
|
|
||||||
|
**Path to excluded content**
|
||||||
|
|
||||||
|
Used to exclude content from the scan by full file path.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | path |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | valid paths |
|
||||||
|
| **Comments** | Applicable only if *$type* is *excludedPath* |
|
||||||
|
|
||||||
|
**Path type (file / directory)**
|
||||||
|
|
||||||
|
Indicates if the *path* property refers to a file or directory.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | isDirectory |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | false (default) <br/> true |
|
||||||
|
| **Comments** | Applicable only if *$type* is *excludedPath* |
|
||||||
|
|
||||||
|
**File extension excluded from the scan**
|
||||||
|
|
||||||
|
Used to exclude content from the scan by file extension.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | extension |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | valid file extensions |
|
||||||
|
| **Comments** | Applicable only if *$type* is *excludedFileExtension* |
|
||||||
|
|
||||||
|
**Name of excluded content**
|
||||||
|
|
||||||
|
Used to exclude content from the scan by file name.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | name |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | any string |
|
||||||
|
| **Comments** | Applicable only if *$type* is *excludedFileName* |
|
||||||
|
|
||||||
|
#### Allowed threats
|
||||||
|
|
||||||
|
List of threats (identified by their name) that are not blocked by the product and are instead allowed to run.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | allowedThreats |
|
||||||
|
| **Data type** | Array of strings |
|
||||||
|
|
||||||
|
#### Threat type settings
|
||||||
|
|
||||||
|
The *threatTypeSettings* preference in the antivirus engine is used to control how certain threat types are handled by the product.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | threatTypeSettings |
|
||||||
|
| **Data type** | Dictionary (nested preference) |
|
||||||
|
| **Comments** | See the following sections for a description of the dictionary contents. |
|
||||||
|
|
||||||
|
**Threat type**
|
||||||
|
|
||||||
|
Type of the threat for which the behavior is configured.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | key |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | potentially_unwanted_application <br/> archive_bomb |
|
||||||
|
|
||||||
|
**Action to take**
|
||||||
|
|
||||||
|
Action to take when coming across a threat of the type specified in the preceding section. Can be:
|
||||||
|
|
||||||
|
- **Audit**: your device is not protected against this type of threat, but an entry about the threat is logged.
|
||||||
|
- **Block**: your device is protected against this type of threat and you are notified in the user interface and the security console.
|
||||||
|
- **Off**: your device is not protected against this type of threat and nothing is logged.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | value |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | audit (default) <br/> block <br/> off |
|
||||||
|
|
||||||
|
### Cloud delivered protection preferences
|
||||||
|
|
||||||
|
The *cloudService* entry in the configuration profile is used to configure the cloud driven protection feature of the product.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | cloudService |
|
||||||
|
| **Data type** | Dictionary (nested preference) |
|
||||||
|
| **Comments** | See the following sections for a description of the dictionary contents. |
|
||||||
|
|
||||||
|
#### Enable / disable cloud delivered protection
|
||||||
|
|
||||||
|
Whether cloud delivered protection is enabled on the device or not. To improve the security of your services, we recommend keeping this feature turned on.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | enabled |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | true (default) <br/> false |
|
||||||
|
|
||||||
|
#### Diagnostic collection level
|
||||||
|
|
||||||
|
Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | diagnosticLevel |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | optional (default) <br/> required |
|
||||||
|
|
||||||
|
#### Enable / disable automatic sample submissions
|
||||||
|
|
||||||
|
Determines whether suspicious samples (that are likely to contain threats) are sent to Microsoft. You are prompted if the submitted file is likely to contain personal information.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | automaticSampleSubmission |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | true (default) <br/> false |
|
||||||
|
|
||||||
|
### User interface preferences
|
||||||
|
|
||||||
|
The *userInterface* section of the configuration profile is used to manage the preferences of the user interface of the product.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | userInterface |
|
||||||
|
| **Data type** | Dictionary (nested preference) |
|
||||||
|
| **Comments** | See the following sections for a description of the dictionary contents. |
|
||||||
|
|
||||||
|
#### Show / hide status menu icon
|
||||||
|
|
||||||
|
Whether the status menu icon (shown in the top-right corner of the screen) is hidden or not.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.wdav |
|
||||||
|
| **Key** | hideStatusMenuIcon |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | false (default) <br/> true |
|
||||||
|
|
||||||
|
## Recommended configuration profile
|
||||||
|
|
||||||
|
To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides.
|
||||||
|
|
||||||
|
The following configuration profile will:
|
||||||
|
- Enable real-time protection (RTP)
|
||||||
|
- Specify how the following threat types are handled:
|
||||||
|
- **Potentially unwanted applications (PUA)** are blocked
|
||||||
|
- **Archive bombs** (file with a high compression rate) are audited to the product logs
|
||||||
|
- Enable cloud delivered protection
|
||||||
|
- Enable automatic sample submission
|
||||||
|
|
||||||
|
### JAMF profile
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>antivirusEngine</key>
|
||||||
|
<dict>
|
||||||
|
<key>enableRealTimeProtection</key>
|
||||||
|
<true/>
|
||||||
|
<key>threatTypeSettings</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>potentially_unwanted_application</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>block</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>archive_bomb</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>audit</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
<key>cloudService</key>
|
||||||
|
<dict>
|
||||||
|
<key>enabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>automaticSampleSubmission</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Intune profile
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1">
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>Configuration</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.wdav</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft Defender ATP settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string>Microsoft Defender ATP configuration settings</string>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadRemovalDisallowed</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadScope</key>
|
||||||
|
<string>System</string>
|
||||||
|
<key>PayloadContent</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>com.microsoft.wdav</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.wdav</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft Defender ATP configuration settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string/>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>antivirusEngine</key>
|
||||||
|
<dict>
|
||||||
|
<key>enableRealTimeProtection</key>
|
||||||
|
<true/>
|
||||||
|
<key>threatTypeSettings</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>potentially_unwanted_application</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>block</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>archive_bomb</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>audit</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
<key>cloudService</key>
|
||||||
|
<dict>
|
||||||
|
<key>enabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>automaticSampleSubmission</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Full configuration profile example
|
||||||
|
|
||||||
|
The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over the product.
|
||||||
|
|
||||||
|
### JAMF profile
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>antivirusEngine</key>
|
||||||
|
<dict>
|
||||||
|
<key>enableRealTimeProtection</key>
|
||||||
|
<true/>
|
||||||
|
<key>passiveMode</key>
|
||||||
|
<false/>
|
||||||
|
<key>exclusions</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedPath</string>
|
||||||
|
<key>isDirectory</key>
|
||||||
|
<false/>
|
||||||
|
<key>path</key>
|
||||||
|
<string>/var/log/system.log</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedPath</string>
|
||||||
|
<key>isDirectory</key>
|
||||||
|
<true/>
|
||||||
|
<key>path</key>
|
||||||
|
<string>/home</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedFileExtension</string>
|
||||||
|
<key>extension</key>
|
||||||
|
<string>pdf</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
<key>allowedThreats</key>
|
||||||
|
<array>
|
||||||
|
<string>EICAR-Test-File (not a virus)</string>
|
||||||
|
</array>
|
||||||
|
<key>threatTypeSettings</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>potentially_unwanted_application</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>block</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>archive_bomb</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>audit</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
<key>cloudService</key>
|
||||||
|
<dict>
|
||||||
|
<key>enabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>diagnosticLevel</key>
|
||||||
|
<string>optional</string>
|
||||||
|
<key>automaticSampleSubmission</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
<key>userInterface</key>
|
||||||
|
<dict>
|
||||||
|
<key>hideStatusMenuIcon</key>
|
||||||
|
<false/>
|
||||||
|
</dict>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Intune profile
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1">
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>Configuration</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft Defender ATP settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string>Microsoft Defender ATP configuration settings</string>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadRemovalDisallowed</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadScope</key>
|
||||||
|
<string>System</string>
|
||||||
|
<key>PayloadContent</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>com.microsoft.wdav</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft Defender ATP configuration settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string/>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>antivirusEngine</key>
|
||||||
|
<dict>
|
||||||
|
<key>enableRealTimeProtection</key>
|
||||||
|
<true/>
|
||||||
|
<key>passiveMode</key>
|
||||||
|
<false/>
|
||||||
|
<key>exclusions</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedPath</string>
|
||||||
|
<key>isDirectory</key>
|
||||||
|
<false/>
|
||||||
|
<key>path</key>
|
||||||
|
<string>/var/log/system.log</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedPath</string>
|
||||||
|
<key>isDirectory</key>
|
||||||
|
<true/>
|
||||||
|
<key>path</key>
|
||||||
|
<string>/home</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>$type</key>
|
||||||
|
<string>excludedFileExtension</string>
|
||||||
|
<key>extension</key>
|
||||||
|
<string>pdf</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
<key>allowedThreats</key>
|
||||||
|
<array>
|
||||||
|
<string>EICAR-Test-File (not a virus)</string>
|
||||||
|
</array>
|
||||||
|
<key>threatTypeSettings</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>potentially_unwanted_application</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>block</string>
|
||||||
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>key</key>
|
||||||
|
<string>archive_bomb</string>
|
||||||
|
<key>value</key>
|
||||||
|
<string>audit</string>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
<key>cloudService</key>
|
||||||
|
<dict>
|
||||||
|
<key>enabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>diagnosticLevel</key>
|
||||||
|
<string>optional</string>
|
||||||
|
<key>automaticSampleSubmission</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
<key>userInterface</key>
|
||||||
|
<dict>
|
||||||
|
<key>hideStatusMenuIcon</key>
|
||||||
|
<false/>
|
||||||
|
</dict>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Configuration profile deployment
|
||||||
|
|
||||||
|
Once you've built the configuration profile for your enterprise, you can deploy it through the management console that your enterprise is using. The following sections provide instructions on how to deploy this profile using JAMF and Intune.
|
||||||
|
|
||||||
|
### JAMF deployment
|
||||||
|
|
||||||
|
From the JAMF console, open **Computers** > **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with *com.microsoft.wdav* as the preference domain and upload the .plist produced earlier.
|
||||||
|
|
||||||
|
>[!CAUTION]
|
||||||
|
>You must enter the correct preference domain (*com.microsoft.wdav*), otherwise the preferences will not be recognized by the product.
|
||||||
|
|
||||||
|
### Intune deployment
|
||||||
|
|
||||||
|
1. Open **Manage** > **Device configuration**. Select **Manage** > **Profiles** > **Create Profile**.
|
||||||
|
|
||||||
|
2. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select Configure.
|
||||||
|
|
||||||
|
3. Save the .plist produced earlier as **com.microsoft.wdav.xml**.
|
||||||
|
|
||||||
|
4. Enter **com.microsoft.wdav** as the **custom configuration profile name**.
|
||||||
|
|
||||||
|
5. Open the configuration profile and upload **com.microsoft.wdav.xml**. This file was created in step 3.
|
||||||
|
|
||||||
|
6. Select **OK**.
|
||||||
|
|
||||||
|
7. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
|
||||||
|
|
||||||
|
>[!CAUTION]
|
||||||
|
>You must enter the correct custom configuration profile name, otherwise these preferences will not be recognized by the product.
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
- [Configuration Profile Reference (Apple developer documentation)](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf)
|
@ -0,0 +1,277 @@
|
|||||||
|
---
|
||||||
|
title: Privacy for Microsoft Defender ATP for Mac
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes privacy controls, how to configure policy settings that impact privacy and information about the diagnostic data collected in Microsoft Defender ATP for Mac.
|
||||||
|
keywords: microsoft, defender, atp, mac, privacy, diagnostic
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Privacy for Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on the data events that are collected.
|
||||||
|
|
||||||
|
## Overview of privacy controls in Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
This section describes the privacy controls for the different types of data collected by Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
### Diagnostic data
|
||||||
|
|
||||||
|
Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements.
|
||||||
|
|
||||||
|
Some diagnostic data is required, while some diagnostic data is optional. We give you the ability to choose whether to send us required or optional diagnostic data through the use of privacy controls, such as policy settings for organizations.
|
||||||
|
|
||||||
|
There are two levels of diagnostic data for Microsoft Defender ATP client software that you can choose from:
|
||||||
|
|
||||||
|
* **Required**: The minimum data necessary to help keep Microsoft Defender ATP secure, up-to-date, and performing as expected on the device it’s installed on.
|
||||||
|
|
||||||
|
* **Optional**: Additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and remediate issues.
|
||||||
|
|
||||||
|
By default, both optional and required diagnostic data are sent to Microsoft.
|
||||||
|
|
||||||
|
### Cloud delivered protection data
|
||||||
|
|
||||||
|
Cloud delivered protection is used to provide increased and faster protection with access to the latest protection data in the cloud.
|
||||||
|
|
||||||
|
Enabling the cloud-delivered protection service is optional, however it is highly recommended because it provides important protection against malware on your endpoints and across your network.
|
||||||
|
|
||||||
|
### Sample data
|
||||||
|
|
||||||
|
Sample data is used to improve the protection capabilities of the product, by sending Microsoft suspicious samples so they can be analyzed. Enabling automatic sample submission is optional.
|
||||||
|
|
||||||
|
When this feature is enabled and the sample that is collected is likely to contain personal information, the user is prompted for consent.
|
||||||
|
|
||||||
|
## Manage privacy controls with policy settings
|
||||||
|
|
||||||
|
If you're an IT administrator, you might want to configure these controls at the enterprise level.
|
||||||
|
|
||||||
|
The privacy controls for the various types of data described in the preceding section are described in detail in [Set preferences for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-preferences.md).
|
||||||
|
|
||||||
|
As with any new policy settings, you should carefully test them out in a limited, controlled environment to ensure the settings that you configure have the desired effect before you implement the policy settings more widely in your organization.
|
||||||
|
|
||||||
|
## Diagnostic data events
|
||||||
|
|
||||||
|
This section describes what is considered required diagnostic data and what is considered optional diagnostic data, along with a description of the events and fields that are collected.
|
||||||
|
|
||||||
|
### Data fields that are common for all events
|
||||||
|
There is some information about events that is common to all events, regardless of category or data subtype.
|
||||||
|
|
||||||
|
The following fields are considered common for all events:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ----------------------- | ----------- |
|
||||||
|
| platform | The broad classification of the platform on which the app is running. Allows Microsoft to identify on which platforms an issue may be occurring so that it can correctly be prioritized. |
|
||||||
|
| machine_guid | Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted. |
|
||||||
|
| sense_guid | Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted. |
|
||||||
|
| org_id | Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted. |
|
||||||
|
| hostname | Local machine name (without DNS suffix). Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted. |
|
||||||
|
| product_guid | Unique identifier of the product. Allows Microsoft to differentiate issues impacting different flavors of the product. |
|
||||||
|
| app_version | Version of the Microsoft Defender ATP for Mac application. Allows Microsoft to identify which versions of the product are showing an issue so that it can correctly be prioritized.|
|
||||||
|
| sig_version | Version of security intelligence database. Allows Microsoft to identify which versions of the security intelligence are showing an issue so that it can correctly be prioritized. |
|
||||||
|
| supported_compressions | List of compression algorithms supported by the application, for example `['gzip']`. Allows Microsoft to understand what types of compressions can be used when it communicates with the application. |
|
||||||
|
| release_ring | Ring that the device is associated with (for example Insider Fast, Insider Slow, Production). Allows Microsoft to identify on which release ring an issue may be occurring so that it can correctly be prioritized. |
|
||||||
|
|
||||||
|
|
||||||
|
### Required diagnostic data
|
||||||
|
|
||||||
|
**Required diagnostic data** is the minimum data necessary to help keep Microsoft Defender ATP secure, up-to-date, and perform as expected on the device it’s installed on.
|
||||||
|
|
||||||
|
Required diagnostic data helps to identify problems with Microsoft Defender ATP that may be related to a device or software configuration. For example, it can help determine if a Microsoft Defender ATP feature crashes more frequently on a particular operating system version, with newly introduced features, or when certain Microsoft Defender ATP features are disabled. Required diagnostic data helps Microsoft detect, diagnose, and fix these problems more quickly so the impact to users or organizations is reduced.
|
||||||
|
|
||||||
|
#### Software setup and inventory data events
|
||||||
|
|
||||||
|
**Microsoft Defender ATP installation / uninstallation**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ---------------- | ----------- |
|
||||||
|
| correlation_id | Unique identifier associated with the installation. |
|
||||||
|
| version | Version of the package. |
|
||||||
|
| severity | Severity of the message (for example Informational). |
|
||||||
|
| code | Code that describes the operation. |
|
||||||
|
| text | Additional information associated with the product installation. |
|
||||||
|
|
||||||
|
**Microsoft Defender ATP configuration**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| --------------------------------------------------- | ----------- |
|
||||||
|
| antivirus_engine.enable_real_time_protection | Whether real-time protection is enabled on the device or not. |
|
||||||
|
| antivirus_engine.passive_mode | Whether passive mode is enabled on the device or not. |
|
||||||
|
| cloud_service.enabled | Whether cloud delivered protection is enabled on the device or not. |
|
||||||
|
| cloud_service.timeout | Time out when the application communicates with the Microsoft Defender ATP cloud. |
|
||||||
|
| cloud_service.heartbeat_interval | Interval between consecutive heartbeats sent by the product to the cloud. |
|
||||||
|
| cloud_service.service_uri | URI used to communicate with the cloud. |
|
||||||
|
| cloud_service.diagnostic_level | Diagnostic level of the device (required, optional). |
|
||||||
|
| cloud_service.automatic_sample_submission | Whether automatic sample submission is turned on or not. |
|
||||||
|
| edr.early_preview | Whether the machine should run EDR early preview features. |
|
||||||
|
| edr.group_id | Group identifier used by the detection and response component. |
|
||||||
|
| edr.tags | User-defined tags. |
|
||||||
|
| features.\[optional feature name\] | List of preview features, along with whether they are enabled or not. |
|
||||||
|
|
||||||
|
#### Product and service performance data events
|
||||||
|
|
||||||
|
**Kernel extension statistics**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ---------------- | ----------- |
|
||||||
|
| version | Version of Microsoft Defender ATP for Mac. |
|
||||||
|
| instance_id | Unique identifier generated on kernel extension startup. |
|
||||||
|
| trace_level | Trace level of the kernel extension. |
|
||||||
|
| ipc.connects | Number of connection requests received by the kernel extension. |
|
||||||
|
| ipc.rejects | Number of connection requests rejected by the kernel extension. |
|
||||||
|
| ipc.connected | Whether there is any active connection to the kernel extension. |
|
||||||
|
|
||||||
|
#### Support data
|
||||||
|
|
||||||
|
**Diagnostic logs**
|
||||||
|
|
||||||
|
Diagnostic logs are collected only with the consent of the user as part of the feedback submission feature. The following files are collected as part of the support logs:
|
||||||
|
|
||||||
|
- All files under */Library/Logs/Microsoft/mdatp/*
|
||||||
|
- Subset of files under */Library/Application Support/Microsoft/Defender/* that are created and used by Microsoft Defender ATP for Mac
|
||||||
|
- Subset of files under */Library/Managed Preferences* that are used by Microsoft Defender ATP for Mac
|
||||||
|
- /Library/Logs/Microsoft/autoupdate.log
|
||||||
|
- $HOME/Library/Preferences/com.microsoft.autoupdate2.plist
|
||||||
|
|
||||||
|
### Optional diagnostic data
|
||||||
|
|
||||||
|
**Optional diagnostic data** is additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and fix issues.
|
||||||
|
|
||||||
|
If you choose to send us optional diagnostic data, required diagnostic data is also included.
|
||||||
|
|
||||||
|
Examples of optional diagnostic data include data Microsoft collects about product configuration (for example number of exclusions set on the device) and product performance (aggregate measures about the performance of components of the product).
|
||||||
|
|
||||||
|
#### Software setup and inventory data events
|
||||||
|
|
||||||
|
**Microsoft Defender ATP configuration**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| -------------------------------------------------- | ----------- |
|
||||||
|
| connection_retry_timeout | Connection retry time out when communication with the cloud. |
|
||||||
|
| file_hash_cache_maximum | Size of the product cache. |
|
||||||
|
| crash_upload_daily_limit | Limit of crash logs uploaded daily. |
|
||||||
|
| antivirus_engine.exclusions[].is_directory | Whether the exclusion from scanning is a directory or not. |
|
||||||
|
| antivirus_engine.exclusions[].path | Path that was excluded from scanning. |
|
||||||
|
| antivirus_engine.exclusions[].extension | Extension excluded from scanning. |
|
||||||
|
| antivirus_engine.exclusions[].name | Name of the file excluded from scanning. |
|
||||||
|
| antivirus_engine.scan_cache_maximum | Size of the product cache. |
|
||||||
|
| antivirus_engine.maximum_scan_threads | Maximum number of threads used for scanning. |
|
||||||
|
| antivirus_engine.threat_restoration_exclusion_time | Time out before a file restored from the quarantine can be detected again. |
|
||||||
|
| filesystem_scanner.full_scan_directory | Full scan directory. |
|
||||||
|
| filesystem_scanner.quick_scan_directories | List of directories used in quick scan. |
|
||||||
|
| edr.latency_mode | Latency mode used by the detection and response component. |
|
||||||
|
| edr.proxy_address | Proxy address used by the detection and response component. |
|
||||||
|
|
||||||
|
**Microsoft Auto-Update configuration**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| --------------------------- | ----------- |
|
||||||
|
| how_to_check | Determines how product updates are checked (for example automatic or manual). |
|
||||||
|
| channel_name | Update channel associated with the device. |
|
||||||
|
| manifest_server | Server used for downloading updates. |
|
||||||
|
| update_cache | Location of the cache used to store updates. |
|
||||||
|
|
||||||
|
### Product and service usage
|
||||||
|
|
||||||
|
#### Diagnostic log upload started report
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ---------------- | ----------- |
|
||||||
|
| sha256 | SHA256 identifier of the support log. |
|
||||||
|
| size | Size of the support log. |
|
||||||
|
| original_path | Path to the support log (always under */Library/Application Support/Microsoft/Defender/wdavdiag/*). |
|
||||||
|
| format | Format of the support log. |
|
||||||
|
|
||||||
|
#### Diagnostic log upload completed report
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ---------------- | ----------- |
|
||||||
|
| request_id | Correlation ID for the support log upload request. |
|
||||||
|
| sha256 | SHA256 identifier of the support log. |
|
||||||
|
| blob_sas_uri | URI used by the application to upload the support log. |
|
||||||
|
|
||||||
|
#### Product and service performance data events
|
||||||
|
|
||||||
|
**Unexpected application exit (crash)**
|
||||||
|
|
||||||
|
Unexpected application exits and the state of the application when that happens.
|
||||||
|
|
||||||
|
**Kernel extension statistics**
|
||||||
|
|
||||||
|
The following fields are collected:
|
||||||
|
|
||||||
|
| Field | Description |
|
||||||
|
| ------------------------------ | ----------- |
|
||||||
|
| pkt_ack_timeout | The following properties are aggregated numerical values, representing count of events that happened since kernel extension startup. |
|
||||||
|
| pkt_ack_conn_timeout | |
|
||||||
|
| ipc.ack_pkts | |
|
||||||
|
| ipc.nack_pkts | |
|
||||||
|
| ipc.send.ack_no_conn | |
|
||||||
|
| ipc.send.nack_no_conn | |
|
||||||
|
| ipc.send.ack_no_qsq | |
|
||||||
|
| ipc.send.nack_no_qsq | |
|
||||||
|
| ipc.ack.no_space | |
|
||||||
|
| ipc.ack.timeout | |
|
||||||
|
| ipc.ack.ackd_fast | |
|
||||||
|
| ipc.ack.ackd | |
|
||||||
|
| ipc.recv.bad_pkt_len | |
|
||||||
|
| ipc.recv.bad_reply_len | |
|
||||||
|
| ipc.recv.no_waiter | |
|
||||||
|
| ipc.recv.copy_failed | |
|
||||||
|
| ipc.kauth.vnode.mask | |
|
||||||
|
| ipc.kauth.vnode.read | |
|
||||||
|
| ipc.kauth.vnode.write | |
|
||||||
|
| ipc.kauth.vnode.exec | |
|
||||||
|
| ipc.kauth.vnode.del | |
|
||||||
|
| ipc.kauth.vnode.read_attr | |
|
||||||
|
| ipc.kauth.vnode.write_attr | |
|
||||||
|
| ipc.kauth.vnode.read_ex_attr | |
|
||||||
|
| ipc.kauth.vnode.write_ex_attr | |
|
||||||
|
| ipc.kauth.vnode.read_sec | |
|
||||||
|
| ipc.kauth.vnode.write_sec | |
|
||||||
|
| ipc.kauth.vnode.take_own | |
|
||||||
|
| ipc.kauth.vnode.denied | |
|
||||||
|
| ipc.kauth.file_op.mask | |
|
||||||
|
| ipc.kauth_file_op.open | |
|
||||||
|
| ipc.kauth.file_op.close | |
|
||||||
|
| ipc.kauth.file_op.close_modified | |
|
||||||
|
| ipc.kauth.file_op.move | |
|
||||||
|
| ipc.kauth.file_op.link | |
|
||||||
|
| ipc.kauth.file_op.exec | |
|
||||||
|
| ipc.kauth.file_op.remove | |
|
||||||
|
| ipc.kauth.file_op.fork | |
|
||||||
|
| ipc.kauth.file_op.create | |
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
- [Privacy at Microsoft](https://privacy.microsoft.com/)
|
@ -0,0 +1,66 @@
|
|||||||
|
---
|
||||||
|
title: Detect and block potentially unwanted applications
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to detect and block Potentially Unwanted Applications (PUA) using Microsoft Defender ATP for Mac.
|
||||||
|
keywords: microsoft, defender, atp, mac, pua, pus
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Detect and block potentially unwanted applications
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
The potentially unwanted application (PUA) protection feature in Microsoft Defender ATP for Mac can detect and block PUA files on endpoints in your network.
|
||||||
|
|
||||||
|
These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation.
|
||||||
|
|
||||||
|
These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
|
||||||
|
|
||||||
|
## How it works
|
||||||
|
|
||||||
|
Microsoft Defender ATP for Mac can detect and report PUA files. When configured in blocking mode, PUA files are moved to the quarantine.
|
||||||
|
|
||||||
|
When a PUA is detected on an endpoint, Microsoft Defender ATP for Mac presents a notification to the user, unless notifications have been disabled. The threat name will contain the word "Application".
|
||||||
|
|
||||||
|
## Configure PUA protection
|
||||||
|
|
||||||
|
PUA protection in Microsoft Defender ATP for Mac can be configured in one of the following ways:
|
||||||
|
|
||||||
|
- **Off**: PUA protection is disabled.
|
||||||
|
- **Audit**: PUA files are reported in the product logs, but not in Microsoft Defender Security Center. No notification is presented to the user and no action is taken by the product.
|
||||||
|
- **Block**: PUA files are reported in the product logs and in Microsoft Defender Security Center. The user is presented with a notification and action is taken by the product.
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
>By default, PUA protection is configured in **Audit** mode.
|
||||||
|
|
||||||
|
You can configure how PUA files are handled from the command line or from the management console.
|
||||||
|
|
||||||
|
### Use the command-line tool to configure PUA protection:
|
||||||
|
|
||||||
|
In Terminal, execute the following command to configure PUA protection:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --threat --type-handling potentially_unwanted_application [off|audit|block]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Use the management console to configure PUA protection:
|
||||||
|
|
||||||
|
In your enterprise, you can configure PUA protection from a management console, such as JAMF or Intune, similarly to how other product settings are configured. For more information, see the [Threat type settings](microsoft-defender-atp-mac-preferences.md#threat-type-settings) section of the [Set preferences for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-preferences.md) topic.
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [Set preferences for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-preferences.md)
|
@ -0,0 +1,118 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Defender ATP for Mac Resources
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes resources for Microsoft Defender ATP for Mac, including how to uninstall it, how to collect diagnostic logs, CLI commands, and known issues with the product.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Resources
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
## Collecting diagnostic information
|
||||||
|
|
||||||
|
If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default.
|
||||||
|
|
||||||
|
1. Increase logging level:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --log-level verbose
|
||||||
|
Creating connection to daemon
|
||||||
|
Connection established
|
||||||
|
Operation succeeded
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Reproduce the problem
|
||||||
|
|
||||||
|
3. Run `sudo mdatp --diagnostic --create` to backup Microsoft Defender ATP's logs. The files will be stored inside of a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ sudo mdatp --diagnostic --create
|
||||||
|
Creating connection to daemon
|
||||||
|
Connection established
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Restore logging level:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ mdatp --log-level info
|
||||||
|
Creating connection to daemon
|
||||||
|
Connection established
|
||||||
|
Operation succeeded
|
||||||
|
```
|
||||||
|
|
||||||
|
## Logging installation issues
|
||||||
|
|
||||||
|
If an error occurs during installation, the installer will only report a general failure.
|
||||||
|
|
||||||
|
The detailed log will be saved to /Library/Logs/Microsoft/mdatp/install.log. If you experience issues during installation, send us this file so we can help diagnose the cause.
|
||||||
|
|
||||||
|
## Uninstalling
|
||||||
|
|
||||||
|
There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune.
|
||||||
|
|
||||||
|
### Interactive uninstallation
|
||||||
|
|
||||||
|
- Open **Finder > Applications**. Right click on **Microsoft Defender ATP > Move to Trash**.
|
||||||
|
|
||||||
|
### From the command line
|
||||||
|
|
||||||
|
- ```sudo rm -rf '/Applications/Microsoft Defender ATP'```
|
||||||
|
|
||||||
|
## Configuring from the command line
|
||||||
|
|
||||||
|
Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line:
|
||||||
|
|
||||||
|
|Group |Scenario |Command |
|
||||||
|
|-------------|-------------------------------------------|-----------------------------------------------------------------------|
|
||||||
|
|Configuration|Turn on/off real-time protection |`mdatp --config realTimeProtectionEnabled [true/false]` |
|
||||||
|
|Configuration|Turn on/off cloud protection |`mdatp --config cloudEnabled [true/false]` |
|
||||||
|
|Configuration|Turn on/off product diagnostics |`mdatp --config cloudDiagnosticEnabled [true/false]` |
|
||||||
|
|Configuration|Turn on/off automatic sample submission |`mdatp --config cloudAutomaticSampleSubmission [true/false]` |
|
||||||
|
|Configuration|Turn on PUA protection |`mdatp --threat --type-handling potentially_unwanted_application block`|
|
||||||
|
|Configuration|Turn off PUA protection |`mdatp --threat --type-handling potentially_unwanted_application off` |
|
||||||
|
|Configuration|Turn on audit mode for PUA protection |`mdatp --threat --type-handling potentially_unwanted_application audit`|
|
||||||
|
|Diagnostics |Change the log level |`mdatp --log-level [error/warning/info/verbose]` |
|
||||||
|
|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic --create` |
|
||||||
|
|Health |Check the product's health |`mdatp --health` |
|
||||||
|
|Protection |Scan a path |`mdatp --scan --path [path]` |
|
||||||
|
|Protection |Do a quick scan |`mdatp --scan --quick` |
|
||||||
|
|Protection |Do a full scan |`mdatp --scan --full` |
|
||||||
|
|Protection |Cancel an ongoing on-demand scan |`mdatp --scan --cancel` |
|
||||||
|
|Protection |Request a security intelligence update |`mdatp --definition-update` |
|
||||||
|
|
||||||
|
## Microsoft Defender ATP portal information
|
||||||
|
|
||||||
|
In the Microsoft Defender ATP portal, you'll see two categories of information:
|
||||||
|
|
||||||
|
- Antivirus alerts, including:
|
||||||
|
- Severity
|
||||||
|
- Scan type
|
||||||
|
- Device information (hostname, machine identifier, tenant identifier, app version, and OS type)
|
||||||
|
- File information (name, path, size, and hash)
|
||||||
|
- Threat information (name, type, and state)
|
||||||
|
- Device information, including:
|
||||||
|
- Machine identifier
|
||||||
|
- Tenant identifier
|
||||||
|
- App version
|
||||||
|
- Hostname
|
||||||
|
- OS type
|
||||||
|
- OS version
|
||||||
|
- Computer model
|
||||||
|
- Processor architecture
|
||||||
|
- Whether the device is a virtual machine
|
@ -0,0 +1,219 @@
|
|||||||
|
---
|
||||||
|
title: Deploy updates for Microsoft Defender ATP for Mac
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to control updates for Microsoft Defender ATP for Mac in enterprise environments.
|
||||||
|
keywords: microsoft, defender, atp, mac, updates, deploy
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Deploy updates for Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md)
|
||||||
|
|
||||||
|
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features.
|
||||||
|
|
||||||
|
To update Microsoft Defender ATP for Mac, a program named Microsoft AutoUpdate (MAU) is used. By default, MAU automatically checks for updates daily, but you can change that to weekly, monthly, or manually.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
If you decide to deploy updates by using your software distribution tools, you should configure MAU to manually check for software updates. You can deploy preferences to configure how and when MAU checks for updates for the Macs in your organization.
|
||||||
|
|
||||||
|
## Use msupdate
|
||||||
|
|
||||||
|
MAU includes a command-line tool, called *msupdate*, that is designed for IT administrators so that they have more precise control over when updates are applied. Instructions for how to use this tool can be found in [Update Office for Mac by using msupdate](https://docs.microsoft.com/deployoffice/mac/update-office-for-mac-using-msupdate).
|
||||||
|
|
||||||
|
In MAU, the application identifier for Microsoft Defender ATP for Mac is *WDAV00*. To download and install the latest updates for Microsoft Defender ATP for Mac, execute the following command from a Terminal window:
|
||||||
|
|
||||||
|
```
|
||||||
|
./msupdate --install --apps wdav00
|
||||||
|
```
|
||||||
|
|
||||||
|
## Set preferences for Microsoft AutoUpdate
|
||||||
|
|
||||||
|
This section describes the most common preferences that can be used to configure MAU. These settings can be deployed as a configuration profile through the management console that your enterprise is using. An example of a configuration profile is shown in the following sections.
|
||||||
|
|
||||||
|
### Set the channel name
|
||||||
|
|
||||||
|
The channel determines the type and frequency of updates that are offered through MAU. Devices in `InsiderFast` (corresponding to the Insider Fast channel) can try out new features before devices in `External` (corresponding to the Insider Slow channel) and `Production`.
|
||||||
|
|
||||||
|
The `Production` channel contains the most stable version of the product.
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>In order to preview new features and provide early feedback, it is recommended that you configure some devices in your enterprise to `InsiderFast` or `External`.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | ChannelName |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | InsiderFast <br/> External <br/> Production |
|
||||||
|
|
||||||
|
### Set update check frequency
|
||||||
|
|
||||||
|
Change how often MAU searches for updates.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | UpdateCheckFrequency |
|
||||||
|
| **Data type** | Integer |
|
||||||
|
| **Default value** | 720 (minutes) |
|
||||||
|
| **Comment** | This value is set in minutes. |
|
||||||
|
|
||||||
|
### Change how MAU interacts with updates
|
||||||
|
|
||||||
|
Change how MAU searches for updates.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | HowToCheck |
|
||||||
|
| **Data type** | String |
|
||||||
|
| **Possible values** | Manual <br/> AutomaticCheck <br/> AutomaticDownload |
|
||||||
|
| **Comment** | Note that AutomaticDownload will do a download and install silently if possible. |
|
||||||
|
|
||||||
|
### Change whether the "Check for Updates" button is enabled
|
||||||
|
|
||||||
|
Change whether local users will be able to click the "Check for Updates" option in the Microsoft AutoUpdate user interface.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | EnableCheckForUpdatesButton |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | True (default) <br/> False |
|
||||||
|
|
||||||
|
### Disable Insider checkbox
|
||||||
|
|
||||||
|
Set to true to make the "Join the Office Insider Program..." checkbox unavailable / greyed out to users.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | DisableInsiderCheckbox |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | False (default) <br/> True |
|
||||||
|
|
||||||
|
### Limit the telemetry that is sent from MAU
|
||||||
|
|
||||||
|
Set to false to send minimal heartbeat data, no application usage, and no environment details.
|
||||||
|
|
||||||
|
|||
|
||||||
|
|:---|:---|
|
||||||
|
| **Domain** | com.microsoft.autoupdate2 |
|
||||||
|
| **Key** | SendAllTelemetryEnabled |
|
||||||
|
| **Data type** | Boolean |
|
||||||
|
| **Possible values** | True (default) <br/> False |
|
||||||
|
|
||||||
|
## Example configuration profile
|
||||||
|
|
||||||
|
The following configuration profile is used to:
|
||||||
|
- Place the device in the Insider Fast channel
|
||||||
|
- Automatically download and install updates
|
||||||
|
- Enable the "Check for updates" button in the user interface
|
||||||
|
- Allow users on the device to enroll into the Insider channels
|
||||||
|
|
||||||
|
### JAMF
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1.0">
|
||||||
|
<dict>
|
||||||
|
<key>ChannelName</key>
|
||||||
|
<string>InsiderFast</string>
|
||||||
|
<key>HowToCheck</key>
|
||||||
|
<string>AutomaticDownload</string>
|
||||||
|
<key>EnableCheckForUpdatesButton</key>
|
||||||
|
<true/>
|
||||||
|
<key>DisableInsiderCheckbox</key>
|
||||||
|
<false/>
|
||||||
|
<key>SendAllTelemetryEnabled</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Intune
|
||||||
|
|
||||||
|
```XML
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
|
<plist version="1">
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>B762FF60-6ACB-4A72-9E72-459D00C936F3</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>Configuration</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.autoupdate2</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft AutoUpdate settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string>Microsoft AutoUpdate configuration settings</string>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadRemovalDisallowed</key>
|
||||||
|
<true/>
|
||||||
|
<key>PayloadScope</key>
|
||||||
|
<string>System</string>
|
||||||
|
<key>PayloadContent</key>
|
||||||
|
<array>
|
||||||
|
<dict>
|
||||||
|
<key>PayloadUUID</key>
|
||||||
|
<string>5A6F350A-CC2C-440B-A074-68E3F34EBAE9</string>
|
||||||
|
<key>PayloadType</key>
|
||||||
|
<string>com.microsoft.autoupdate2</string>
|
||||||
|
<key>PayloadOrganization</key>
|
||||||
|
<string>Microsoft</string>
|
||||||
|
<key>PayloadIdentifier</key>
|
||||||
|
<string>com.microsoft.autoupdate2</string>
|
||||||
|
<key>PayloadDisplayName</key>
|
||||||
|
<string>Microsoft AutoUpdate configuration settings</string>
|
||||||
|
<key>PayloadDescription</key>
|
||||||
|
<string/>
|
||||||
|
<key>PayloadVersion</key>
|
||||||
|
<integer>1</integer>
|
||||||
|
<key>PayloadEnabled</key>
|
||||||
|
<true/>
|
||||||
|
<key>ChannelName</key>
|
||||||
|
<string>InsiderFast</string>
|
||||||
|
<key>HowToCheck</key>
|
||||||
|
<string>AutomaticDownload</string>
|
||||||
|
<key>EnableCheckForUpdatesButton</key>
|
||||||
|
<true/>
|
||||||
|
<key>DisableInsiderCheckbox</key>
|
||||||
|
<false/>
|
||||||
|
<key>SendAllTelemetryEnabled</key>
|
||||||
|
<true/>
|
||||||
|
</dict>
|
||||||
|
</array>
|
||||||
|
</dict>
|
||||||
|
</plist>
|
||||||
|
```
|
||||||
|
|
||||||
|
To configure MAU, you can deploy this configuration profile from the management tool that your enterprise is using:
|
||||||
|
- From JAMF, upload this configuration profile and set the Preference Domain to *com.microsoft.autoupdate2*.
|
||||||
|
- From Intune, upload this configuration profile and set the custom configuration profile name to *com.microsoft.autoupdate2*.
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
- [msupdate reference](https://docs.microsoft.com/deployoffice/mac/update-office-for-mac-using-msupdate)
|
@ -0,0 +1,113 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Defender ATP for Mac
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes how to install and use Microsoft Defender ATP for Mac.
|
||||||
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, mojave, high sierra, sierra
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: dansimp
|
||||||
|
author: dansimp
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Defender Advanced Threat Protection for Mac
|
||||||
|
|
||||||
|
This topic describes how to install, configure, update, and use Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> Running other third-party endpoint protection products alongside Microsoft Defender ATP for Mac is likely to lead to performance problems and unpredictable side effects.
|
||||||
|
|
||||||
|
## What’s new in the latest release
|
||||||
|
|
||||||
|
[What's new](microsoft-defender-atp-mac-whatsnew.md)
|
||||||
|
|
||||||
|
If you have any feedback that you would like to share, submit it by opening Microsoft Defender ATP for Mac on your device and navigating to **Help** > **Send feedback**.
|
||||||
|
|
||||||
|
## How to install Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
### Prerequisites
|
||||||
|
|
||||||
|
- Access to the Microsoft Defender Security Center portal
|
||||||
|
- Beginner-level experience in macOS and BASH scripting
|
||||||
|
- Administrative privileges on the device (in case of manual deployment)
|
||||||
|
|
||||||
|
### System requirements
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> The three most recent major releases of macOS are supported. Beta versions of macOS are not supported.
|
||||||
|
|
||||||
|
- Supported macOS versions: 10.14 (Mojave), 10.13 (High Sierra), 10.12 (Sierra)
|
||||||
|
- Disk space: 650 MB
|
||||||
|
|
||||||
|
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
|
||||||
|
|
||||||
|
The following table lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
|
||||||
|
|
||||||
|
| Service location | DNS record |
|
||||||
|
| ---------------------------------------- | ----------------------- |
|
||||||
|
| Common URLs for all locations | x.cp.wd.microsoft.com <br/> cdn.x.cp.wd.microsoft.com <br/> eu-cdn.x.cp.wd.microsoft.com <br/> wu-cdn.x.cp.wd.microsoft.com <br/> *.blob.core.windows.net <br/> officecdn-microsoft-com.akamaized.net |
|
||||||
|
| European Union | europe.x.cp.wd.microsoft.com |
|
||||||
|
| United Kingdom | unitedkingdom.x.cp.wd.microsoft.com |
|
||||||
|
| United States | unitedstates.x.cp.wd.microsoft.com |
|
||||||
|
|
||||||
|
Microsoft Defender ATP can discover a proxy server by using the following discovery methods:
|
||||||
|
- Web Proxy Auto-discovery Protocol (WPAD)
|
||||||
|
- Manual static proxy configuration
|
||||||
|
|
||||||
|
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.
|
||||||
|
|
||||||
|
To test that a connection is not blocked, open [https://x.cp.wd.microsoft.com/api/report](https://x.cp.wd.microsoft.com/api/report) and [https://cdn.x.cp.wd.microsoft.com/ping](https://cdn.x.cp.wd.microsoft.com/ping) in a browser.
|
||||||
|
|
||||||
|
If you prefer the command line, you can also check the connection by running the following command in Terminal:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
|
||||||
|
```
|
||||||
|
|
||||||
|
The output from this command should be similar to the following:
|
||||||
|
|
||||||
|
> `OK https://x.cp.wd.microsoft.com/api/report`
|
||||||
|
>
|
||||||
|
> `OK https://cdn.x.cp.wd.microsoft.com/ping`
|
||||||
|
|
||||||
|
> [!CAUTION]
|
||||||
|
> We recommend that you keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) (SIP) enabled on client machines. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.
|
||||||
|
|
||||||
|
### Installation instructions
|
||||||
|
|
||||||
|
There are several methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
||||||
|
|
||||||
|
In general you need to take the following steps:
|
||||||
|
|
||||||
|
- Ensure that you have a Microsoft Defender ATP subscription and have access to the Microsoft Defender ATP Portal
|
||||||
|
- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods:
|
||||||
|
- Via third-party management tools:
|
||||||
|
- [Microsoft Intune-based deployment](microsoft-defender-atp-mac-install-with-intune.md)
|
||||||
|
- [JAMF-based deployment](microsoft-defender-atp-mac-install-with-jamf.md)
|
||||||
|
- [Other MDM products](microsoft-defender-atp-mac-install-with-other-mdm.md)
|
||||||
|
- Via the command-line tool:
|
||||||
|
- [Manual deployment](microsoft-defender-atp-mac-install-manually.md)
|
||||||
|
|
||||||
|
## How to update Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender ATP for Mac, a program named Microsoft AutoUpdate (MAU) is used.
|
||||||
|
|
||||||
|
To read more on how to configure MAU in enterprise environments, refer to [Deploy updates for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-updates.md)
|
||||||
|
|
||||||
|
## How to configure Microsoft Defender ATP for Mac
|
||||||
|
|
||||||
|
Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-preferences.md).
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
- For more information about logging, uninstalling, or other topics, see the [Resources](microsoft-defender-atp-mac-resources.md) page.
|
||||||
|
|
||||||
|
- [Privacy for Microsoft Defender ATP for Mac](microsoft-defender-atp-mac-privacy.md)
|
Loading…
x
Reference in New Issue
Block a user