Edit

Share via


Microsoft Defender for Endpoint on macOS prerequisites

This article lists the prerequisites for installing and configuring Microsoft Defender for Endpoint on macOS. It also includes links to additional resources for more information.

Applies to:

Want to experience Microsoft Defender for Endpoint? Sign up for a free trial.

Important

If you want to run multiple security solutions side by side, see Considerations for performance, configuration, and support.

You might have already configured mutual security exclusions for devices onboarded to Microsoft Defender for Endpoint. If you still need to set mutual exclusions to avoid conflicts, see Add Microsoft Defender for Endpoint to the exclusion list for your existing solution.

Prerequisites, installation, and configuration instructions

Prerequisites

System requirements

These three most recent major releases of macOS are supported.

  • 15.0.1 (Sequoia)
  • 14 (Sonoma)
  • 13 (Ventura)

Note

Beta versions of macOS aren't supported, but new releases of macOS are supported from day 1.

  • Supported processors: x64 and ARM64
  • Disk space: 1 GB

Caution

We recommend that you keep System Integrity Protection (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.

Enterprise deployment requirements

There are several methods and deployment tools that you can use to centrally install and configure Defender for Endpoint on macOS across your devices:

Manual deployment requirements

You can also configure Defender for Endpoint on macOS locally

Licensing requirements

Microsoft Defender for Endpoint on macOS requires one of the following Microsoft Volume Licensing offers:

  • Microsoft 365 E5
  • Microsoft 365 E5 Security
  • Microsoft 365 A5
  • Windows 10 Enterprise E5
  • Microsoft 365 Business Premium
  • Windows 11 Enterprise E5
  • Microsoft Defender for Endpoint P2 (included in Microsoft 365 E5 and E5 Security)
  • Microsoft Defender for Endpoint P1 (included in Microsoft 365 E3)

Note

Eligible licensed users might use Microsoft Defender for Endpoint on up to five concurrent devices. Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). When purchased via a CSP, it doesn't require Microsoft Volume Licensing offers listed.

Network connectivity

Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, reference STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service.

Microsoft Defender for Endpoint can connect through a proxy server by using the following methods:

  • Proxy autoconfig (PAC)
  • Web Proxy Autodiscovery Protocol (WPAD)
  • Manual static proxy configuration

If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.

Warning

Authenticated proxies aren't supported. Ensure that only PAC, WPAD, or a static proxy is being used. SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store doesn't allow for interception.

Next steps

Onboard client devices to Microsoft Defender for Endpoint

Onboarding Microsoft Defender for Endpoint for macOS requires the following steps:

  • First, ensure that the device meets the system requirements and network connectivity requirements.
  • Next, install the .pkg containing the software
  • Next, install the required system extensions
  • Finally, on-board the device to Microsoft Defender for Endpoint

See Onboard client devices running macOS to Microsoft Defender for Endpoint for details.

Test network connectivity

To test that a connection isn't blocked, open https://x.cp.wd.microsoft.com/api/report and https://cdn.x.cp.wd.microsoft.com/ping in a browser.

If you prefer the command line, you can also check the connection by running the following command in Terminal:

curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'

The output from this command should be similar to the following:

OK https://x.cp.wd.microsoft.com/api/report

OK https://cdn.x.cp.wd.microsoft.com/ping

Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:

mdatp connectivity test

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.