From bc81ed8bd926c5b37735cb44d16afff15b38887a Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 15 Oct 2020 22:13:19 +0500 Subject: [PATCH 01/52] Note addition As suggested by the user, I have added a note for the user to route to a relevant information page. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8264 --- .../microsoft-defender-atp/mac-install-with-jamf.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md index b02fdd72d5..543ff95c79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md @@ -30,6 +30,9 @@ ms.topic: conceptual Learn how to deploy Microsoft Defender ATP for macOS with Jamf Pro. +> [!NOTE] +> If you are using macOS Catalina (10.15.4) and newer versions of macOS see [New configuration profiles for macOS Catalina and newer versions of macOS](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies). + This is a multi step process. You'll need to complete all of the following steps: - [Login to the Jamf Portal](mac-install-jamfpro-login.md) From 7044abeed904b35d670678a53ad9eb086de01118 Mon Sep 17 00:00:00 2001 From: Thomas Garrity <31856350+poortom1004@users.noreply.github.com> Date: Thu, 15 Oct 2020 13:56:19 -0500 Subject: [PATCH 02/52] Case sensitivity, re-ordering and other small corrections -Normalized the casing from BuiltIn Local to Builtin Local for group types -Corrected some other group types -Corrected typo for references of Group Policy Creators Owners to Group Policy Creator Owners -Re-ordered the Read-Only Domain Controllers group to be higher in the list to be correctly alphabetized so that it matches the order in the first table -Corrected Guests group membership details -Added missing SID info on a few groups -Changed group types from Domain Global to Global -Replaced "No" with "None" for default membership to be consistent with other groups -RDS Endpoint Servers had an incorrect reference to the domain SID -Users group incorrectly said it's a member of Domain users via primary group membership. This is incorrect because groups do not have primary groups, only users have primary groups. --- .../active-directory-security-groups.md | 235 +++++++++--------- 1 file changed, 117 insertions(+), 118 deletions(-) diff --git a/windows/security/identity-protection/access-control/active-directory-security-groups.md b/windows/security/identity-protection/access-control/active-directory-security-groups.md index 61198672fc..6522607d9d 100644 --- a/windows/security/identity-protection/access-control/active-directory-security-groups.md +++ b/windows/security/identity-protection/access-control/active-directory-security-groups.md @@ -576,7 +576,7 @@ This security group has not changed since Windows Server 2008.
Type
BuiltIn Local
Builtin Local
Default container
Type
BuiltIn Local
Builtin Local
Default container
Type
BuiltIn Local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Well-Known SID/RID
S-1-5-<domain>-517
S-1-5-21-<domain>-517
Type
Type
Builtin local
Builtin Local
Default container
Type
BuiltIn Local
Builtin Local
Default container
Type
Domain local
Builtin Local
Default container
Type
Domain Global
Global
Default container
Well-Known SID/RID
S-1-5-<domain>-515
S-1-5-21-<domain>-515
Type
Well-Known SID/RID
S-1-5-<domain>-516
S-1-5-21-<domain>-516
Type
Well-Known SID/RID
S-1-5-<domain>-514
S-1-5-21-<domain>-514
Type
Well-Known SID/RID
S-1-5-<domain>-513
S-1-5-21-<domain>-513
Type
Domain Global
Global
Default container
Type
Builtin local
Domain local
Default container
Well-Known SID/RID
S-1-5-<domain>-520
S-1-5-21-<domain>-520
Type
Default members
Guest
Guest
Default member of
Guest
None
Protected by ADMINSDHOLDER?
Type
Builtin local
Builtin Local
Default container
Default member of
No
None
Protected by ADMINSDHOLDER?
Type
BuiltIn Local
Builtin Local
Default container
Type
BuiltIn local
Builtin Local
Default container
Type
BuiltIn local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Domain Global
Global
Default container
Type
Domain local
Builtin Local
Default container
Well-Known SID/RID
S-1-5-32-<domain>-576
S-1-5-32-576
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Attribute | +Value | +
---|---|
Well-Known SID/RID |
+S-1-5-21-<domain>-521 |
+
Type |
+Global |
+
Default container |
+CN=Users, DC=<domain>, DC= |
+
Default members |
+None |
+
Default member of |
++ |
Protected by ADMINSDHOLDER? |
+Yes |
+
Safe to move out of default container? |
+Yes |
+
Safe to delegate management of this group to non-Service admins? |
++ |
Default User Rights |
++ |
Attribute | -Value | -
---|---|
Well-Known SID/RID |
-S-1-5-21-<domain>-521 |
-
Type |
-- |
Default container |
-CN=Users, DC=<domain>, DC= |
-
Default members |
-None |
-
Default member of |
-- |
Protected by ADMINSDHOLDER? |
-Yes |
-
Safe to move out of default container? |
-Yes |
-
Safe to delegate management of this group to non-Service admins? |
-- |
Default User Rights |
-- |
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Well-Known SID/RID
S-1-5-<root domain>-518
S-1-5-21-<root domain>-518
Type
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Type
Builtin local
Builtin Local
Default container
Default member of
Domain Users (this membership is due to the fact that the Primary Group ID of all user accounts is Domain Users.)
None
Protected by ADMINSDHOLDER?
Type
Builtin local
Builtin Local
Default container
K
z3+i jGh4Olyr@}V7{#+5hdrm429YgM*VVmz-B6)P6mrYU8Ap-vJSttA&UMy~_8xA(qu7
z%~Rhr+^aiPIGsf7hVN~SGQc6JBxE8#=#DsHy=l%g8KPQq&d|~231ykgihZvie( Gd_32ah{q8NGK=L*Ed*$
z9b%c{Y90%dv-x=pXsKeho1x^u0Apu=xGLXc;boW>ngcD
zPYovUIQ>a9A{v}02M&wi-PbRDY-_=7q?TC*j7x;`J@aX#HeDuSlOrYMn6z~FshS@-
z2GJ3ESP+~kwDmVW7zxN=pnXsOtf$8di<+L!hW(J&8G=?761ybF?7ztBAK}K*!Fu{3
zJtNfKB-Eh4c>6Kx<9<>pK{Y3qx#raOP7Nh|tre5mSrRwg!Veu4pA{@nFEX{z$aED_
zS9y(psRw;{I-Dm(#y%(&&q67-mBV1W>6M7Yn1b}4G2`d)Jrnx#0Tx?7TRAb18M@Njvw9rrXtFj~jQ+D|hMJyBitL1nrMzr=Rtk93`iD
zl*0qSs|TNC@(4h-63Yq-k=u6WS-!{guEk|c(
VqtQ3ZFDMSo%Mt-sTduWaUP$ZHebDKp-$B-J&{?1a}a(g;VtJCu)=bwl#2Tq!e
zPQO>R(RJJ0VV|g@V_Ad|unS69s57CL)D6mpbxXl6d1Y1lWkzmpznCpLO2|+sr<3mj
zi(~u_iAYGI&bu)ak@_z4%uUPAMC59LSusICb2Pjy#|Q)rSXvPqh`YGqUEmHxlg4r9
z{t`zyJ0l}ugF&K$rId*Ii;zV!6B434T~B2AiSZttfu@P?xE;}w`1MK)+qocle;19h
z1uXwg
0FJJSaf4`gdy4-#!E}pTjTk1$eR`UgqRO*{6qVTG({N
z9XN^YWqn89jeh|)=dD)BX3Cn}!a0Z6CsMFv7L6R