From f5a01c0e7080b56f0c62cc44bb53f61e4928e863 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:34:34 -0800 Subject: [PATCH] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 9facca590f..ae1408a475 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -26,9 +26,11 @@ ms.topic: conceptual >[!IMPORTANT] >This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise organizations. To configure Microsoft Defender ATP for Mac using the command-line interface, see the [Resources](mac-resources.md#configuring-from-the-command-line) page. -In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. +## Summary -This article describes the structure of the configuration profile and includes a recommended profile that you can use to get started, along with instructions on how to deploy the profile. +In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. + +This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile. ## Configuration profile structure