16 KiB
title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title | description | keywords | search.product | search.appverid | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Intune-based deployment for Microsoft Defender ATP for Mac | Install Microsoft Defender ATP for Mac, using Microsoft Intune. | microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra | eADQiWindows 10XVcnh | met150 | w10 | deploy | library | security | dansimp | dansimp | medium | dansimp | ITPro | M365-security-compliance | conceptual |
Intune-based deployment for Microsoft Defender ATP for Mac
Applies to:
This topic describes how to deploy Microsoft Defender ATP for Mac through Intune. A successful deployment requires the completion of all of the following steps:
- Download installation and onboarding packages
- Client device setup
- Create System Configuration profiles
- Publish application
Prerequisites and system requirements
Before you get started, see the main Microsoft Defender ATP for Mac page for a description of prerequisites and system requirements for the current software version.
Download installation and onboarding packages
Download the installation and onboarding packages from Microsoft Defender Security Center:
-
In Microsoft Defender Security Center, go to Settings > Device Management > Onboarding.
-
In Section 1 of the page, set the operating system to Linux, macOS, iOS, or Android and the deployment method to Mobile Device Management / Microsoft Intune.
-
In Section 2 of the page, select Download installation package. Save it as wdav.pkg to a local directory.
-
In Section 2 of the page, select Download onboarding package. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
-
Download IntuneAppUtil from https://docs.microsoft.com/intune/lob-apps-macos.
-
From a command prompt, verify that you have the three files. Extract the contents of the .zip files:
$ ls -l total 721688 -rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil -rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip -rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg $ unzip WindowsDefenderATPOnboardingPackage.zip Archive: WindowsDefenderATPOnboardingPackage.zip warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators inflating: intune/kext.xml inflating: intune/WindowsDefenderATPOnboarding.xml inflating: jamf/WindowsDefenderATPOnboarding.plist
-
Make IntuneAppUtil an executable:
$ chmod +x IntuneAppUtil
-
Create the wdav.pkg.intunemac package from wdav.pkg:
$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0" Microsoft Intune Application Utility for Mac OS X Version: 1.0.0.0 Copyright 2018 Microsoft Corporation Creating intunemac file for /Users/test/Downloads/wdav.pkg Composing the intunemac file output Output written to ./wdav.pkg.intunemac. IntuneAppUtil successfully processed "wdav.pkg", to deploy refer to the product documentation.
Client device setup
You need no special provisioning for a Mac device beyond a standard Company Portal installation.
- You are asked to confirm device management.
Select Open System Preferences, locate Management Profile on the list, and select Approve.... Your Management Profile would be displayed as Verified:
- Select Continue and complete the enrollment.
You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.
- In Intune, open Manage > Devices > All devices. Here you can see your device among those listed:
Create System Configuration profiles
-
In Intune, open Manage > Device configuration. Select Manage > Profiles > Create Profile.
-
Choose a name for the profile. Change Platform=macOS to Profile type=Custom. Select Configure.
-
Open the configuration profile and upload intune/kext.xml. This file was created in one of the preceding sections.
-
Select OK.
-
Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.
-
Repeat steps 1 through 5 for more profiles.
-
Create another profile, give it a name, and upload the intune/WindowsDefenderATPOnboarding.xml file.
-
Create tcc.xml file with content below. Create another profile, give it any name and upload this file to it.
Caution
macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.
The following configuration profile grants Full Disk Access to Microsoft Defender ATP. If you previously configured Microsoft Defender ATP through Intune, we recommend you update the deployment with this configuration profile.
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>PayloadDescription</key> <string>Allows Microsoft Defender to access all files on Catalina+</string> <key>PayloadDisplayName</key> <string>TCC - Microsoft Defender</string> <key>PayloadIdentifier</key> <string>com.microsoft.wdav.tcc</string> <key>PayloadOrganization</key> <string>Microsoft Corp.</string> <key>PayloadRemovalDisallowed</key> <false/> <key>PayloadScope</key> <string>system</string> <key>PayloadType</key> <string>Configuration</string> <key>PayloadUUID</key> <string>C234DF2E-DFF6-11E9-B279-001C4299FB44</string> <key>PayloadVersion</key> <integer>1</integer> <key>PayloadContent</key> <array> <dict> <key>PayloadDescription</key> <string>Allows Microsoft Defender to access all files on Catalina+</string> <key>PayloadDisplayName</key> <string>TCC - Microsoft Defender</string> <key>PayloadIdentifier</key> <string>com.microsoft.wdav.tcc.C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string> <key>PayloadOrganization</key> <string>Microsoft Corp.</string> <key>PayloadType</key> <string>com.apple.TCC.configuration-profile-policy</string> <key>PayloadUUID</key> <string>C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string> <key>PayloadVersion</key> <integer>1</integer> <key>Services</key> <dict> <key>SystemPolicyAllFiles</key> <array> <dict> <key>Allowed</key> <true/> <key>CodeRequirement</key> <string>identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string> <key>Comment</key> <string>Allow SystemPolicyAllFiles control for Microsoft Defender ATP</string> <key>Identifier</key> <string>com.microsoft.wdav</string> <key>IdentifierType</key> <string>bundleID</string> </dict> </array> </dict> </dict> </array> </dict> </plist>
-
To whitelist Defender and Auto Update for displaying notifications in UI on macOS 10.15 (Catalina), import the following .mobileconfig as a custom payload:
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>PayloadContent</key> <array> <dict> <key>NotificationSettings</key> <array> <dict> <key>AlertType</key> <integer>2</integer> <key>BadgesEnabled</key> <true/> <key>BundleIdentifier</key> <string>com.microsoft.autoupdate2</string> <key>CriticalAlertEnabled</key> <false/> <key>GroupingType</key> <integer>0</integer> <key>NotificationsEnabled</key> <true/> <key>ShowInLockScreen</key> <false/> <key>ShowInNotificationCenter</key> <true/> <key>SoundsEnabled</key> <true/> </dict> <dict> <key>AlertType</key> <integer>2</integer> <key>BadgesEnabled</key> <true/> <key>BundleIdentifier</key> <string>com.microsoft.wdavtray</string> <key>CriticalAlertEnabled</key> <false/> <key>GroupingType</key> <integer>0</integer> <key>NotificationsEnabled</key> <true/> <key>ShowInLockScreen</key> <false/> <key>ShowInNotificationCenter</key> <true/> <key>SoundsEnabled</key> <true/> </dict> </array> <key>PayloadDescription</key> <string/> <key>PayloadDisplayName</key> <string>notifications</string> <key>PayloadEnabled</key> <true/> <key>PayloadIdentifier</key> <string>BB977315-E4CB-4915-90C7-8334C75A7C64</string> <key>PayloadOrganization</key> <string>Microsoft</string> <key>PayloadType</key> <string>com.apple.notificationsettings</string> <key>PayloadUUID</key> <string>BB977315-E4CB-4915-90C7-8334C75A7C64</string> <key>PayloadVersion</key> <integer>1</integer> </dict> </array> <key>PayloadDescription</key> <string/> <key>PayloadDisplayName</key> <string>mdatp - allow notifications</string> <key>PayloadEnabled</key> <true/> <key>PayloadIdentifier</key> <string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string> <key>PayloadOrganization</key> <string>Microsoft</string> <key>PayloadRemovalDisallowed</key> <false/> <key>PayloadScope</key> <string>System</string> <key>PayloadType</key> <string>Configuration</string> <key>PayloadUUID</key> <string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string> <key>PayloadVersion</key> <integer>1</integer> </dict> </plist>
-
Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.
Once the Intune changes are propagated to the enrolled devices, you can see them listed under Monitor > Device status:
Publish application
-
In Intune, open the Manage > Client apps blade. Select Apps > Add.
-
Select App type=Other/Line-of-business app.
-
Select file=wdav.pkg.intunemac. Select OK to upload.
-
Select Configure and add the required information.
-
Use macOS High Sierra 10.13 as the minimum OS and set Ignore app version to Yes. Other settings can be any arbitrary value.
Caution
Failure to set Ignore app version to Yes impacts the ability of the application to receive updates through Microsoft AutoUpdate. See Deploy updates for Microsoft Defender ATP for Mac for additional information about how the product is updated.
-
Select OK and Add.
-
It may take a few moments to upload the package. After it's done, select the package from the list and go to Assignments and Add group.
-
Change Assignment type to Required.
-
Select Included Groups. Select Make this app required for all devices=Yes. Click Select group to include and add a group that contains the users you want to target. Select OK and Save.
-
After some time the application will be published to all enrolled devices. You can see it listed in Monitor > Device, under Device install status:
Verify client device state
-
After the configuration profiles are deployed to your devices, open System Preferences > Profiles on your Mac device.
-
Verify that the following configuration profiles are present and installed. The Management Profile should be the Intune system profile. Wdav-config and wdav-kext are system configuration profiles that were added in Intune:
-
You should also see the Microsoft Defender icon in the top-right corner:
Troubleshooting
Issue: No license found
Solution: Follow the steps above to create a device profile using WindowsDefenderATPOnboarding.xml
Logging installation issues
For more information on how to find the automatically generated log that is created by the installer when an error occurs, see Logging installation issues .
Uninstallation
See Uninstalling for details on how to remove Microsoft Defender ATP for Mac from client devices.