2019-11-05 15:49:44 -08:00

14 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic
JAMF-based deployment for Microsoft Defender ATP for Mac Install Microsoft Defender ATP for Mac, using JAMF. microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra eADQiWindows 10XVcnh met150 w10 deploy library security dansimp dansimp medium dansimp ITPro M365-security-compliance conceptual

JAMF-based deployment for Microsoft Defender ATP for Mac

Applies to:

This topic describes how to deploy Microsoft Defender ATP for Mac through JAMF. A successful deployment requires the completion of all of the following steps:

Prerequisites and system requirements

Before you get started, please see the main Microsoft Defender ATP for Mac page for a description of prerequisites and system requirements for the current software version.

In addition, for JAMF deployment, you need to be familiar with JAMF administration tasks, have a JAMF tenant, and know how to deploy packages. This includes having a properly configured distribution point. JAMF has many ways to complete the same task. These instructions provide an example for most common processes. Your organization might use a different workflow.

Download installation and onboarding packages

Download the installation and onboarding packages from Windows Defender Security Center:

  1. In Windows Defender Security Center, go to Settings > device Management > Onboarding.

  2. In Section 1 of the page, set the operating system to Linux, macOS, iOS or Android and deployment method to Mobile Device Management / Microsoft Intune.

  3. In Section 2 of the page, select Download installation package. Save it as wdav.pkg to a local directory.

  4. In Section 2 of the page, select Download onboarding package. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.

    Windows Defender Security Center screenshot

  5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:

    $ ls -l
    total 721160
    -rw-r--r--  1 test  staff      11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
    -rw-r--r--  1 test  staff  354531845 Mar 13 08:57 wdav.pkg
    $ unzip WindowsDefenderATPOnboardingPackage.zip
    Archive:  WindowsDefenderATPOnboardingPackage.zip
    warning:  WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
    inflating: intune/kext.xml
     inflating: intune/WindowsDefenderATPOnboarding.xml
     inflating: jamf/WindowsDefenderATPOnboarding.plist
    

Create JAMF policies

You need to create a configuration profile and a policy to start deploying Microsoft Defender ATP for Mac to client devices.

Configuration Profile

The configuration profile contains a custom settings payload that includes:

  • Microsoft Defender ATP for Mac onboarding information
  • Approved Kernel Extensions payload, to enable running the Microsoft kernel driver

To set the onboarding information, add a property list file with the name, jamf/WindowsDefenderATPOnboarding.plist, as a custom setting. You can do this by navigating to Computers>Configuration Profiles, selecting New, then choosing Custom Settings>Configure. From there, you can upload the property list.

Important

You must set the Preference Domain as "com.microsoft.wdav.atp"

Configuration profile screenshot

Approved Kernel Extension

To approve the kernel extension:

  1. In Computers > Configuration Profiles select Options > Approved Kernel Extensions.
  2. Use UBF8T346G9 for Team Id.

Approved kernel extensions screenshot

Privacy Preferences Policy Control

Caution

macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.

If you previously configured Microsoft Defender ATP through JAMF, we recommend applying the following configuration.

Add the following JAMF policy to grant Full Disk Access to Microsoft Defender ATP.

  1. Select Options > Privacy Preferences Policy Control.
  2. Use any identifier and identifier type = Bundle.
  3. Set Code Requirement to identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9.
  4. Set app or service to SystemPolicyAllFiles and access to Allow.

Privacy Preferences Policy Control

Configuration Profile's Scope

Configure the appropriate scope to specify the devices that will receive the configuration profile.

Open Computers > Configuration Profiles, and select Scope > Targets. From there, select the devices you want to target.

Configuration profile scope screenshot

Save the Configuration Profile.

Use the Logs tab to monitor deployment status for each enrolled device.

Notification settings

Starting in macOS 10.15 (Catalina) a user must manually allow to display notifications in UI. To auto-enable notifications from Defender and Auto Update, you can import the .mobileconfig below into a separate configuration profile and assign it to all machines with Defender:

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0"><dict><key>PayloadContent</key><array><dict><key>NotificationSettings</key><array><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.autoupdate2</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.wdavtray</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadType</key><string>com.apple.notificationsettings</string><key>PayloadUUID</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadVersion</key><integer>1</integer></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>mdatp - allow notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadRemovalDisallowed</key><false/><key>PayloadScope</key><string>System</string><key>PayloadType</key><string>Configuration</string><key>PayloadUUID</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadVersion</key><integer>1</integer></dict></plist>

Package

  1. Create a package in Settings > Computer Management > Packages.

    Computer management packages screenshot

  2. Upload the package to the Distribution Point.

  3. In the filename field, enter the name of the package. For example, wdav.pkg.

Policy

Your policy should contain a single package for Microsoft Defender.

Microsoft Defender packages screenshot

Configure the appropriate scope to specify the computers that will receive this policy.

After you save the Configuration Profile, you can use the Logs tab to monitor the deployment status for each enrolled device.

Client device setup

You'll need no special provisioning for a macOS computer, beyond the standard JAMF Enrollment.

Note

After a computer is enrolled, it will show up in the Computers inventory (All Computers).

  1. Open Device Profiles, from the General tab, and make sure that User Approved MDM is set to Yes. If it's currently set to No, the user needs to open System Preferences > Profiles and select Approve on the MDM Profile.

MDM approve button screenshot
MDM screenshot

After a moment, the device's User Approved MDM status will change to Yes.

MDM status screenshot

You may now enroll additional devices. You may also enroll them later, after you have finished provisioning system configuration and application packages.

Deployment

Enrolled client devices periodically poll the JAMF Server, and install new configuration profiles and policies as soon as they are detected.

Status on the server

You can monitor deployment status in the Logs tab:

  • Pending means that the deployment is scheduled but has not yet happened
  • Completed means that the deployment succeeded and is no longer scheduled

Status on server screenshot

Status on client device

After the Configuration Profile is deployed, you'll see the profile for the device in System Preferences > Profiles >.

Status on client screenshot

Once the policy is applied, you'll see the Microsoft Defender ATP icon in the macOS status bar in the top-right corner.

Microsoft Defender icon in status bar screenshot

You can monitor policy installation on a device by following the JAMF log file:

    $ tail -f /var/log/jamf.log
    Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
    Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
    Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV
    Thu Feb 21 11:17:02 mavel-mojave jamf[8051]: Installing Microsoft Defender...
    Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Successfully installed Microsoft Defender.
    Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: Checking for patches...
    Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found.

You can also check the onboarding status:

$ mdatp --health
...
licensed                                : true
orgId                                   : "4751b7d4-ea75-4e8f-a1f5-6d640c65bc45"
...
  • licensed: This confirms that the device has an ATP license.

  • orgid: Your Microsoft Defender ATP org id; it will be the same for your organization.

Check onboarding status

You can check that devices have been correctly onboarded by creating a script. For example, the following script checks enrolled devices for onboarding status:

$ mdatp --health healthy

The above command prints "1" if the product is onboarded and functioning as expected.

If the product is not healthy, the exit code (which can be checked through echo $?) indicates the problem:

  • 1 if the device is not yet onboarded
  • 3 if the connection to the daemon cannot be established—for example, if the daemon is not running

Logging installation issues

See Logging installation issues for more information on how to find the automatically generated log that is created by the installer when an error occurs.

Uninstallation

This method is based on the script described in Uninstalling.

Script

Create a script in Settings > Computer Management > Scripts.

This script removes Microsoft Defender ATP from the /Applications directory:

   #!/bin/bash

   echo "Is WDAV installed?"
   ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null

   echo "Uninstalling WDAV..."
   rm -rf '/Applications/Microsoft Defender ATP.app'

   echo "Is WDAV still installed?"
   ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null

   echo "Done!"

Microsoft Defender uninstall screenshot

Policy

Your policy should contain a single script:

Microsoft Defender uninstall script screenshot

Configure the appropriate scope in the Scope tab to specify the machines that will receive this policy.