0
(0)

This topic describes how to deploy Microsoft Defender for Endpoint on macOS through Intune. A successful deployment requires the completion of all of the following steps:

  1. Download the onboarding package
  2. Client device setup
  3. Approve system extensions
  4. Create System Configuration profiles
  5. Publish application

Prerequisites and system requirements

Before you get started, see the main Microsoft Defender for Endpoint on macOS page for a description of prerequisites and system requirements for the current software version.

Overview

The following table summarizes the steps you would need to take to deploy and manage Microsoft Defender for Endpoint on Macs, via Intune. More detailed steps are available below.


OVERVIEW
Step Sample file names BundleIdentifier
Download the onboarding package WindowsDefenderATPOnboarding__MDATP_wdav.atp.xml com.microsoft.wdav.atp
Approve System Extension for Microsoft Defender for Endpoint MDATP_SysExt.xml N/A
Approve Kernel Extension for Microsoft Defender for Endpoint MDATP_KExt.xml N/A
Grant full disk access to Microsoft Defender for Endpoint MDATP_tcc_Catalina_or_newer.xml com.microsoft.wdav.tcc
Network Extension policy MDATP_NetExt.xml N/A
Configure Microsoft AutoUpdate (MAU) MDATP_Microsoft_AutoUpdate.xml com.microsoft.autoupdate2
Microsoft Defender for Endpoint configuration settingsNote: If you’re planning to run a third-party AV for macOS, set passiveMode to true. MDATP_WDAV_and_exclusion_settings_Preferences.xml com.microsoft.wdav
Configure Microsoft Defender for Endpoint and MS AutoUpdate (MAU) notifications MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig com.microsoft.autoupdate2 or com.microsoft.wdav.tray

Download the onboarding package

Download the onboarding packages from Microsoft 365 Defender portal:

  1. In Microsoft 365 Defender portal, go to Settings > Endpoints > Device management > Onboarding.
  2. Set the operating system to macOS and the deployment method to Mobile Device Management / Microsoft Intune.

    Onboarding settings screenshot.

  3. Select Download onboarding package. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
  4. Extract the contents of the .zip file:
    Bash

    unzip WindowsDefenderATPOnboardingPackage.zip
    
    Output

    Archive:  WindowsDefenderATPOnboardingPackage.zip
    warning:  WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
      inflating: intune/kext.xml
      inflating: intune/WindowsDefenderATPOnboarding.xml
      inflating: jamf/WindowsDefenderATPOnboarding.plist
    

Create System Configuration profiles

The next step is to create system configuration profiles that Microsoft Defender for Endpoint needs. In the Microsoft Endpoint Manager admin center, open Devices > Configuration profiles.

Onboarding blob

This profile contains a license information for Microsoft Defender for Endpoint, without it it will report that it is not licensed.

  1. Select Create Profile under Configuration Profiles.
  2. Select Platform=macOSProfile type=TemplatesTemplate name=Custom. Click Create.

    Custom Configuration Profile creation.

  3. Choose a name for the profile, e.g., “Defender for Cloud or Endpoint onboarding for macOS”. Click Next.

    Custom Configuration Profile - name.

  4. Choose a name for the configuration profile name, e.g., “Defender for Endpoint onboarding for macOS”.
  5. Select intune/WindowsDefenderATPOnboarding.xml that you extracted from the onboarding package above as configuration profile file.

    Import a configuration from a file for Custom Configuration Profile.

  6. Click Next.
  7. Assign devices on the Assignment tab. Click Next.

    Custom Configuration Profile - assignment.

  8. Review and Create.
  9. Open Devices > Configuration profiles, you can see your created profile there.

    Custom Configuration Profile - done.

Approve System Extensions

This profile is needed for macOS 10.15 (Catalina) or newer. It will be ignored on older macOS.

  1. Select Create Profile under Configuration Profiles.
  2. Select Platform=macOSProfile type=TemplatesTemplate name=Extensions. Click Create.
  3. In the Basics tab, give a name to this new profile.
  4. In the Configuration settings tab, expand System Extensions add the following entries in the Allowed system extensions section:
    TABLE 2
    Bundle identifier Team identifier
    com.microsoft.wdav.epsext UBF8T346G9
    com.microsoft.wdav.netext UBF8T346G9

    System extension settings.

  5. In the Assignments tab, assign this profile to All Users & All devices.
  6. Review and create this configuration profile.

Kernel Extensions

This profile is needed for macOS 10.15 (Catalina) or older. It will be ignored on newer macOS.

 Caution

Apple Silicon (M1) devices do not support KEXT. Installation of a configuration profile consisting KEXT policies will fail on these devices.

  1. Select Create Profile under Configuration Profiles.
  2. Select Platform=macOSProfile type=TemplatesTemplate name=Extensions. Click Create.
  3. In the Basics tab, give a name to this new profile.
  4. In the Configuration settings tab, expand Kernel Extensions.
  5. Set Team identifier to UBF8T346G9 and click Next.

    Kernel extension settings.

  6. In the Assignments tab, assign this profile to All Users & All devices.
  7. Review and create this configuration profile.

Full Disk Access

 Caution

macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.

This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Intune, we recommend you update the deployment with this configuration profile.

Download fulldisk.mobileconfig from our GitHub repository.

Follow the instructions for Onboarding blob from above, using “Defender for Endpoint Full Disk Access” as profile name, and downloaded fulldisk.mobileconfig as Configuration profile name.

Network Filter

As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality.

Download netfilter.mobileconfig from our GitHub repository.

Follow the instructions for Onboarding blob from above, using “Defender for Endpoint Network Filter” as profile name, and downloaded netfilter.mobileconfig as Configuration profile name.

Notifications

This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina) or newer.

Download notif.mobileconfig from our GitHub repository.

Follow the instructions for Onboarding blob from above, using “Defender for Endpoint Notifications” as profile name, and downloaded notif.mobileconfig as Configuration profile name.

View Status

Once the Intune changes are propagated to the enrolled devices, you can see them listed under Monitor > Device status:

View of Device Status in Monitor.

Publish application

This step enables deploying Microsoft Defender for Endpoint to enrolled machines.

  1. In the Microsoft Endpoint Manager admin center, open Apps.

    Ready to create application.

  2. Select By platform > macOS > Add.
  3. Choose App type=macOS, click Select.

    Specify application type.

  4. Keep default values, click Next.

    Application properties.

  5. Add assignments, click Next.

    Intune assignments info screenshot.

  6. Review and Create.
  7. You can visit Apps > By platform > macOS to see it on the list of all applications.

    Applications list.

For more information, see Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune.)

 Caution

You have to create all required configuration profiles and push them to all machines, as explained above.

Client device setup

You don’t need any special provisioning for a Mac device beyond a standard Company Portal installation.

  1. Confirm device management.

    Confirm device management screenshot.

    Select Open System Preferences, locate Management Profile on the list, and select Approve…. Your Management Profile would be displayed as Verified:

    Management profile screenshot.

  2. Select Continue and complete the enrollment.

    You may now enroll more devices. You can also enroll them later, after you have finished provisioning system configuration and application packages.

  3. In Intune, open Manage > Devices > All devices. Here you can see your device among those listed:

    Add Devices screenshot.

Verify client device state

  1. After the configuration profiles are deployed to your devices, open System Preferences > Profiles on your Mac device.

    System Preferences screenshot.

    System Preferences Profiles screenshot.

  2. Verify that the following configuration profiles are present and installed. The Management Profile should be the Intune system profile. Wdav-config and wdav-kext are system configuration profiles that were added in Intune:

    Profiles screenshot.

  3. You should also see the Microsoft Defender for Endpoint icon in the top-right corner:

    Microsoft Defender for Endpoint icon in status bar screenshot.

Troubleshooting

Issue: No license found.

Solution: Follow the steps above to create a device profile using WindowsDefenderATPOnboarding.xml.

Logging installation issues

For more information on how to find the automatically generated log that is created by the installer when an error occurs, see Logging installation issues.

Uninstallation

See Uninstalling for details on how to remove Microsoft Defender for Endpoint on macOS from client devices.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 59 times, 1 visits today)