2019-11-05 15:49:44 -08:00

16 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic
Intune-based deployment for Microsoft Defender ATP for Mac Install Microsoft Defender ATP for Mac, using Microsoft Intune. microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra eADQiWindows 10XVcnh met150 w10 deploy library security dansimp dansimp medium dansimp ITPro M365-security-compliance conceptual

Intune-based deployment for Microsoft Defender ATP for Mac

Applies to:

This topic describes how to deploy Microsoft Defender ATP for Mac through Intune. A successful deployment requires the completion of all of the following steps:

Prerequisites and system requirements

Before you get started, see the main Microsoft Defender ATP for Mac page for a description of prerequisites and system requirements for the current software version.

Download installation and onboarding packages

Download the installation and onboarding packages from Microsoft Defender Security Center:

  1. In Microsoft Defender Security Center, go to Settings > Device Management > Onboarding.

  2. In Section 1 of the page, set the operating system to Linux, macOS, iOS, or Android and the deployment method to Mobile Device Management / Microsoft Intune.

  3. In Section 2 of the page, select Download installation package. Save it as wdav.pkg to a local directory.

  4. In Section 2 of the page, select Download onboarding package. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.

  5. Download IntuneAppUtil from https://docs.microsoft.com/intune/lob-apps-macos.

    Windows Defender Security Center screenshot

  6. From a command prompt, verify that you have the three files. Extract the contents of the .zip files:

    $ ls -l
    total 721688
    -rw-r--r--  1 test  staff     269280 Mar 15 11:25 IntuneAppUtil
    -rw-r--r--  1 test  staff      11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
    -rw-r--r--  1 test  staff  354531845 Mar 13 08:57 wdav.pkg
    $ unzip WindowsDefenderATPOnboardingPackage.zip
    Archive:  WindowsDefenderATPOnboardingPackage.zip
    warning:  WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
      inflating: intune/kext.xml
      inflating: intune/WindowsDefenderATPOnboarding.xml
      inflating: jamf/WindowsDefenderATPOnboarding.plist
    
  7. Make IntuneAppUtil an executable:

    $ chmod +x IntuneAppUtil
    
  8. Create the wdav.pkg.intunemac package from wdav.pkg:

    $ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
    Microsoft Intune Application Utility for Mac OS X
    Version: 1.0.0.0
    Copyright 2018 Microsoft Corporation
    
    Creating intunemac file for /Users/test/Downloads/wdav.pkg
    Composing the intunemac file output
    Output written to ./wdav.pkg.intunemac.
    
    IntuneAppUtil successfully processed "wdav.pkg",
    to deploy refer to the product documentation.
    

Client device setup

You need no special provisioning for a Mac device beyond a standard Company Portal installation.

  1. You are asked to confirm device management.

Confirm device management screenshot

Select Open System Preferences, locate Management Profile on the list, and select Approve.... Your Management Profile would be displayed as Verified:

Management profile screenshot

  1. Select Continue and complete the enrollment.

You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.

  1. In Intune, open Manage > Devices > All devices. Here you can see your device among those listed:

Add Devices screenshot

Create System Configuration profiles

  1. In Intune, open Manage > Device configuration. Select Manage > Profiles > Create Profile.

  2. Choose a name for the profile. Change Platform=macOS to Profile type=Custom. Select Configure.

  3. Open the configuration profile and upload intune/kext.xml. This file was created in one of the preceding sections.

  4. Select OK.

    System configuration profiles screenshot

  5. Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.

  6. Repeat steps 1 through 5 for more profiles.

  7. Create another profile, give it a name, and upload the intune/WindowsDefenderATPOnboarding.xml file.

  8. Create tcc.xml file with content below. Create another profile, give it any name and upload this file to it.

    Caution

    macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.

    The following configuration profile grants Full Disk Access to Microsoft Defender ATP. If you previously configured Microsoft Defender ATP through Intune, we recommend you update the deployment with this configuration profile.

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
        <key>PayloadDescription</key>
        <string>Allows Microsoft Defender to access all files on Catalina+</string>
        <key>PayloadDisplayName</key>
        <string>TCC - Microsoft Defender</string>
        <key>PayloadIdentifier</key>
        <string>com.microsoft.wdav.tcc</string>
        <key>PayloadOrganization</key>
        <string>Microsoft Corp.</string>
        <key>PayloadRemovalDisallowed</key>
        <false/>
        <key>PayloadScope</key>
        <string>system</string>
        <key>PayloadType</key>
        <string>Configuration</string>
        <key>PayloadUUID</key>
        <string>C234DF2E-DFF6-11E9-B279-001C4299FB44</string>
        <key>PayloadVersion</key>
        <integer>1</integer>
        <key>PayloadContent</key>
        <array>
        <dict>
            <key>PayloadDescription</key>
            <string>Allows Microsoft Defender to access all files on Catalina+</string>
            <key>PayloadDisplayName</key>
            <string>TCC - Microsoft Defender</string>
            <key>PayloadIdentifier</key>
            <string>com.microsoft.wdav.tcc.C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string>
            <key>PayloadOrganization</key>
            <string>Microsoft Corp.</string>
            <key>PayloadType</key>
            <string>com.apple.TCC.configuration-profile-policy</string>
            <key>PayloadUUID</key>
            <string>C233A5E6-DFF6-11E9-BDAD-001C4299FB44</string>
            <key>PayloadVersion</key>
            <integer>1</integer>
            <key>Services</key>
            <dict>
                <key>SystemPolicyAllFiles</key>
                <array>
                <dict>
                    <key>Allowed</key>
                    <true/>
                    <key>CodeRequirement</key>
                    <string>identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
                    <key>Comment</key>
                    <string>Allow SystemPolicyAllFiles control for Microsoft Defender ATP</string>
                    <key>Identifier</key>
                    <string>com.microsoft.wdav</string>
                    <key>IdentifierType</key>
                    <string>bundleID</string>
                </dict>
                </array>
            </dict>
        </dict>
        </array>
    </dict>
    </plist>
    
  9. To whitelist Defender and Auto Update for displaying notifications in UI on macOS 10.15 (Catalina), import the following .mobileconfig as a custom payload:

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
      <dict>
        <key>PayloadContent</key>
        <array>
          <dict>
            <key>NotificationSettings</key>
            <array>
              <dict>
                <key>AlertType</key>
                <integer>2</integer>
                <key>BadgesEnabled</key>
                <true/>
                <key>BundleIdentifier</key>
                <string>com.microsoft.autoupdate2</string>
                <key>CriticalAlertEnabled</key>
                <false/>
                <key>GroupingType</key>
                <integer>0</integer>
                <key>NotificationsEnabled</key>
                <true/>
                <key>ShowInLockScreen</key>
                <false/>
                <key>ShowInNotificationCenter</key>
                <true/>
                <key>SoundsEnabled</key>
                <true/>
              </dict>
              <dict>
                <key>AlertType</key>
                <integer>2</integer>
                <key>BadgesEnabled</key>
                <true/>
                <key>BundleIdentifier</key>
                <string>com.microsoft.wdavtray</string>
                <key>CriticalAlertEnabled</key>
                <false/>
                <key>GroupingType</key>
                <integer>0</integer>
                <key>NotificationsEnabled</key>
                <true/>
                <key>ShowInLockScreen</key>
                <false/>
                <key>ShowInNotificationCenter</key>
                <true/>
                <key>SoundsEnabled</key>
                <true/>
              </dict>
            </array>
            <key>PayloadDescription</key>
            <string/>
            <key>PayloadDisplayName</key>
            <string>notifications</string>
            <key>PayloadEnabled</key>
            <true/>
            <key>PayloadIdentifier</key>
            <string>BB977315-E4CB-4915-90C7-8334C75A7C64</string>
            <key>PayloadOrganization</key>
            <string>Microsoft</string>
            <key>PayloadType</key>
            <string>com.apple.notificationsettings</string>
            <key>PayloadUUID</key>
            <string>BB977315-E4CB-4915-90C7-8334C75A7C64</string>
            <key>PayloadVersion</key>
            <integer>1</integer>
          </dict>
        </array>
        <key>PayloadDescription</key>
        <string/>
        <key>PayloadDisplayName</key>
        <string>mdatp - allow notifications</string>
        <key>PayloadEnabled</key>
        <true/>
        <key>PayloadIdentifier</key>
        <string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string>
        <key>PayloadOrganization</key>
        <string>Microsoft</string>
        <key>PayloadRemovalDisallowed</key>
        <false/>
        <key>PayloadScope</key>
        <string>System</string>
        <key>PayloadType</key>
        <string>Configuration</string>
        <key>PayloadUUID</key>
        <string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string>
        <key>PayloadVersion</key>
        <integer>1</integer>
      </dict>
    </plist>
    
  10. Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.

Once the Intune changes are propagated to the enrolled devices, you can see them listed under Monitor > Device status:

System configuration profiles screenshot

Publish application

  1. In Intune, open the Manage > Client apps blade. Select Apps > Add.

  2. Select App type=Other/Line-of-business app.

  3. Select file=wdav.pkg.intunemac. Select OK to upload.

  4. Select Configure and add the required information.

  5. Use macOS High Sierra 10.13 as the minimum OS and set Ignore app version to Yes. Other settings can be any arbitrary value.

    Caution

    Failure to set Ignore app version to Yes impacts the ability of the application to receive updates through Microsoft AutoUpdate. See Deploy updates for Microsoft Defender ATP for Mac for additional information about how the product is updated.

    Device status blade screenshot

  6. Select OK and Add.

    Device status blade screenshot

  7. It may take a few moments to upload the package. After it's done, select the package from the list and go to Assignments and Add group.

    Client apps screenshot

  8. Change Assignment type to Required.

  9. Select Included Groups. Select Make this app required for all devices=Yes. Click Select group to include and add a group that contains the users you want to target. Select OK and Save.

    Intune assignments info screenshot

  10. After some time the application will be published to all enrolled devices. You can see it listed in Monitor > Device, under Device install status:

    Intune device status screenshot

Verify client device state

  1. After the configuration profiles are deployed to your devices, open System Preferences > Profiles on your Mac device.

    System Preferences screenshot
    System Preferences Profiles screenshot

  2. Verify that the following configuration profiles are present and installed. The Management Profile should be the Intune system profile. Wdav-config and wdav-kext are system configuration profiles that were added in Intune: Profiles screenshot

  3. You should also see the Microsoft Defender icon in the top-right corner:

    Microsoft Defender icon in status bar screenshot

Troubleshooting

Issue: No license found

Solution: Follow the steps above to create a device profile using WindowsDefenderATPOnboarding.xml

Logging installation issues

For more information on how to find the automatically generated log that is created by the installer when an error occurs, see Logging installation issues .

Uninstallation

See Uninstalling for details on how to remove Microsoft Defender ATP for Mac from client devices.