mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 21:03:42 +00:00
Update microsoft-defender-atp-mac-install-with-jamf.md
image links
This commit is contained in:
@ -46,7 +46,7 @@ Download the installation and onboarding packages from Windows Defender Security
|
||||
3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory.
|
||||
4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
|
||||
|
||||

|
||||

|
||||
|
||||
5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
|
||||
|
||||
@ -79,7 +79,7 @@ To set the onboarding information, add a property list file with the name, _jamf
|
||||
>[!IMPORTANT]
|
||||
> You must set the Preference Domain as "com.microsoft.wdav.atp"
|
||||
|
||||

|
||||

|
||||
|
||||
### Approved Kernel Extension
|
||||
|
||||
@ -88,7 +88,7 @@ To approve the kernel extension:
|
||||
1. In **Computers > Configuration Profiles** select **Options > Approved Kernel Extensions**.
|
||||
2. Use **UBF8T346G9** for Team Id.
|
||||
|
||||

|
||||

|
||||
|
||||
### Privacy Preferences Policy Control
|
||||
|
||||
@ -104,7 +104,7 @@ Add the following JAMF policy to grant Full Disk Access to Microsoft Defender AT
|
||||
3. Set Code Requirement to `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`.
|
||||
4. Set app or service to SystemPolicyAllFiles and access to Allow.
|
||||
|
||||

|
||||

|
||||
|
||||
#### Configuration Profile's Scope
|
||||
|
||||
@ -112,7 +112,7 @@ Configure the appropriate scope to specify the devices that will receive the con
|
||||
|
||||
Open **Computers** > **Configuration Profiles**, and select **Scope > Targets**. From there, select the devices you want to target.
|
||||
|
||||

|
||||

|
||||
|
||||
Save the **Configuration Profile**.
|
||||
|
||||
@ -132,7 +132,7 @@ Starting in macOS 10.15 (Catalina) a user must manually allow to display notific
|
||||
|
||||
1. Create a package in **Settings > Computer Management > Packages**.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Upload the package to the Distribution Point.
|
||||
3. In the **filename** field, enter the name of the package. For example, _wdav.pkg_.
|
||||
@ -141,7 +141,7 @@ Starting in macOS 10.15 (Catalina) a user must manually allow to display notific
|
||||
|
||||
Your policy should contain a single package for Microsoft Defender.
|
||||
|
||||

|
||||

|
||||
|
||||
Configure the appropriate scope to specify the computers that will receive this policy.
|
||||
|
||||
@ -156,12 +156,12 @@ You'll need no special provisioning for a macOS computer, beyond the standard JA
|
||||
|
||||
1. Open **Device Profiles**, from the **General** tab, and make sure that **User Approved MDM** is set to **Yes**. If it's currently set to No, the user needs to open **System Preferences > Profiles** and select **Approve** on the MDM Profile.
|
||||
|
||||

|
||||

|
||||
<br/>
|
||||

|
||||
|
||||
After a moment, the device's User Approved MDM status will change to **Yes**.
|
||||
|
||||

|
||||

|
||||
|
||||
You may now enroll additional devices. You may also enroll them later, after you have finished provisioning system configuration and application packages.
|
||||
|
||||
@ -176,17 +176,17 @@ You can monitor deployment status in the **Logs** tab:
|
||||
- **Pending** means that the deployment is scheduled but has not yet happened
|
||||
- **Completed** means that the deployment succeeded and is no longer scheduled
|
||||
|
||||

|
||||

|
||||
|
||||
### Status on client device
|
||||
|
||||
After the Configuration Profile is deployed, you'll see the profile for the device in **System Preferences** > **Profiles >**.
|
||||
|
||||

|
||||

|
||||
|
||||
Once the policy is applied, you'll see the Microsoft Defender ATP icon in the macOS status bar in the top-right corner.
|
||||
|
||||

|
||||

|
||||
|
||||
You can monitor policy installation on a device by following the JAMF log file:
|
||||
|
||||
@ -258,12 +258,12 @@ This script removes Microsoft Defender ATP from the /Applications directory:
|
||||
echo "Done!"
|
||||
```
|
||||
|
||||

|
||||

|
||||
|
||||
### Policy
|
||||
|
||||
Your policy should contain a single script:
|
||||
|
||||

|
||||

|
||||
|
||||
Configure the appropriate scope in the **Scope** tab to specify the machines that will receive this policy.
|
||||
|
Reference in New Issue
Block a user