Редагувати

Поділитися через


Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro

Applies to:

Use this article to set up policies for Defender for Endpoint on Mac using Jamf Pro.

Step 1: Get the Microsoft Defender for Endpoint onboarding package

Important

You must have an appropriate role assigned to view, manage, and onboard devices. For more information, see Manage access to Microsoft Defender XDR with Microsoft Entra global roles.

  1. In the Microsoft Defender Portal, navigate to Settings > Endpoints > Onboarding.

  2. Select macOS as the operating system and Mobile Device Management / Microsoft Intune as the deployment method.

    The Settings page.

  3. Select Download onboarding package (WindowsDefenderATPOnboardingPackage.zip).

  4. Extract WindowsDefenderATPOnboardingPackage.zip.

  5. Copy the file to your preferred location. For example, C:\Users\JaneDoe_or_JohnDoe.contoso\Downloads\WindowsDefenderATPOnboardingPackage_macOS_MDM_contoso\Jamf\WindowsDefenderATPOnboarding.plist.

Step 2: Create a configuration profile in Jamf Pro using the onboarding package

  1. Locate the file WindowsDefenderATPOnboarding.plist from the previous section.

    The  Windows Defender ATP Onboarding file.

  2. Sign in to Jamf Pro, navigate to Computers > Configuration Profiles, and select New.

    The page on which you create a new Jamf Pro dashboard.

  3. On the General tab, specify the following details:

    • Name: MDE onboarding for macOS
    • Description: MDE EDR onboarding for macOS
    • Category: None
    • Distribution Method: Install Automatically
    • Level: Computer Level
  4. Navigate to the Application & Custom Settings page, select Upload, and then select Add.

    The configuration app and custom settings.

  5. Select Upload File (PLIST file) then in Preference Domain, type com.microsoft.wdav.atp.

    The jamfpro plist upload file.

    The upload file property List file.

  6. Select Open and select the onboarding file.

    The onboarding file.

  7. Select Upload.

    The uploading plist file.

  8. Select the Scope tab.

    The Scope tab.

  9. Select the target computers.

    The target computers.

    The targets.

  10. Select Save.

    The deployment of target computers.

    The selection of target computers.

  11. Select Done.

    The computers of a target group.

    The list of configuration profiles.

Step 3: Configure Microsoft Defender for Endpoint settings

In this step, we go over Preferences so you can configure anti-malware and EDR policies using Microsoft Defender XDR portal (https://security.microsoft.com) or Jamf.

Important

Microsoft Defender for Endpoint Security Settings Management policies take precedence over Jamf set (and other 3rd party MDM) policies.

3a. Set policies using Microsoft Defender portal

  1. Follow the guidance in Configure Microsoft Defender for Endpoint in Intune before setting the security policies using Microsoft Defender.

  2. In the Microsoft Defender portal, go to Configuration management > Endpoint security policies > Mac policies > Create new policy.

  3. Under Select Platform, select macOS.

  4. Under Select Template, choose a template and select Create Policy.

  5. Specify a name and description for the policy, and then select Next.

  6. On the Assignments tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.

For more information about managing security settings, see the following articles:

3b. Set policies using Jamf

You can either use Jamf Pro GUI to edit individual settings of the Microsoft Defender for Endpoint configuration, or use the legacy method by creating a configuration Plist in a text editor, and uploading it to Jamf Pro.

You must use exact com.microsoft.wdav as the Preference Domain. Microsoft Defender for Endpoint uses only this name and com.microsoft.wdav.ext to load its managed settings. (The com.microsoft.wdav.ext version can be used in rare cases when you prefer to use GUI method, but also need to configure a setting that hasn't been added to the schema yet.)

GUI method

  1. Download the schema.json file from Defender's GitHub repository and save it to a local file:

    curl -o ~/Documents/schema.json https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/schema/schema.json
    
  2. Create a new configuration profile. Under Computers, go to Configuration Profiles, and then, on the General tab, specify the following details:

    A new profile.

    • Name: MDATP MDAV configuration settings
    • Description: <blank\>
    • Category: None (default)
    • Level: Computer Level (default)
    • Distribution Method: Install Automatically (default)
  3. Scroll down to the Application & Custom Settings tab, select External Applications, select Add, and then use Custom Schema as the source for the preference domain.

    Add custom schema.

  4. Type com.microsoft.wdav for the Preference Domain, select Add Schema and then upload the schema.json file downloaded on Step 1. Select Save.

    Upload schema.

  5. You can see all supported Microsoft Defender for Endpoint configuration settings under Preference Domain Properties. Select Add/Remove properties to select the settings that you want to be managed, and then select OK to save your changes. (Settings left unselected aren't included into the managed configuration, an end user can configure those settings on their machines.)

    The chosen managed settings.

  6. Change values of the settings to desired values. You can select More information to get documentation for a particular setting. (You can select Plist preview to inspect what the configuration plist. Select Form editor to return to the visual editor.)

    The page on which you change the settings values.

  7. Select the Scope tab.

    The Configuration profile scope.

  8. Select Contoso's Machine Group. Select Add, then select Save.

    The page on which you can add the Configuration settings.

    The page on which you can save the Configuration settings.

  9. Select Done. You see the new Configuration profile.

    The page on which you complete the Configuration settings.

Microsoft Defender for Endpoint adds new settings over time. These new settings are added to the schema, and a new version is published to GitHub. To get updates, download an updated schema and edit your existing configuration profile. On the Application & Custom Settings tab, select Edit schema.

Legacy method

  1. Use the following Microsoft Defender for Endpoint configuration settings:

    • enableRealTimeProtection
    • passiveMode (This setting isn't turned on by default. If you're planning to run non-Microsoft antivirus software on Mac, set it to true.)
    • exclusions
    • excludedPath
    • excludedFileExtension
    • excludedFileName
    • exclusionsMergePolicy
    • allowedThreats (EICAR is on the sample. If you're going through a proof-of-concept, remove it especially if you're testing EICAR.)
    • disallowedThreatActions
    • potentially_unwanted_application
    • archive_bomb
    • cloudService
    • automaticSampleSubmission
    • tags
    • hideStatusMenuIcon

    For more information, see Property list for Jamf full configuration profile.

      <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
      <plist version="1.0">
      <dict>
          <key>antivirusEngine</key>
          <dict>
              <key>enableRealTimeProtection</key>
              <true/>
              <key>passiveMode</key>
              <false/>
              <key>exclusions</key>
              <array>
                  <dict>
                      <key>$type</key>
                      <string>excludedPath</string>
                      <key>isDirectory</key>
                      <false/>
                      <key>path</key>
                      <string>/var/log/system.log</string>
                  </dict>
                  <dict>
                      <key>$type</key>
                      <string>excludedPath</string>
                      <key>isDirectory</key>
                      <true/>
                      <key>path</key>
                      <string>/home</string>
                  </dict>
                  <dict>
                      <key>$type</key>
                      <string>excludedFileExtension</string>
                      <key>extension</key>
                      <string>pdf</string>
                  </dict>
                  <dict>
                      <key>$type</key>
                      <string>excludedFileName</string>
                      <key>name</key>
                      <string>cat</string>
                  </dict>
              </array>
              <key>exclusionsMergePolicy</key>
              <string>merge</string>
              <key>allowedThreats</key>
              <array>
                  <string>EICAR-Test-File (not a virus)</string>
              </array>
              <key>disallowedThreatActions</key>
              <array>
                  <string>allow</string>
                  <string>restore</string>
              </array>
              <key>threatTypeSettings</key>
              <array>
                  <dict>
                      <key>key</key>
                      <string>potentially_unwanted_application</string>
                      <key>value</key>
                      <string>block</string>
                  </dict>
                  <dict>
                      <key>key</key>
                      <string>archive_bomb</string>
                      <key>value</key>
                      <string>audit</string>
                  </dict>
              </array>
              <key>threatTypeSettingsMergePolicy</key>
              <string>merge</string>
          </dict>
          <key>cloudService</key>
          <dict>
              <key>enabled</key>
              <true/>
              <key>diagnosticLevel</key>
              <string>optional</string>
              <key>automaticSampleSubmission</key>
              <true/>
          </dict>
          <key>edr</key>
          <dict>
              <key>tags</key>
              <array>
                  <dict>
                      <key>key</key>
                      <string>GROUP</string>
                      <key>value</key>
                      <string>ExampleTag</string>
                  </dict>
              </array>
          </dict>
          <key>userInterface</key>
          <dict>
              <key>hideStatusMenuIcon</key>
              <false/>
          </dict>
      </dict>
      </plist>
    
  2. Save the file as MDATP_MDAV_configuration_settings.plist.

  3. In the Jamf Pro dashboard, open Computers, and their Configuration Profiles. Select New and switch to the General tab.

    The page displaying a new profile.

  4. On the General tab, specify the following details:

    • Name: MDATP MDAV configuration settings
    • Description: <blank>
    • Category: None (default)
    • Distribution Method: Install Automatically (default)
    • Level: Computer Level (default)
  5. In Application & Custom Settings, select Configure.

    The MDATP MDAV configuration settings.

    The application and custom settings.

  6. Select Upload File (PLIST file).

    The configuration settings plist file.

  7. In Preferences Domain, type com.microsoft.wdav, and then select Upload PLIST File.

    The configuration settings preferences domain.

  8. Select Choose File.

    The prompt to choose the plist file.

  9. Select the MDATP_MDAV_configuration_settings.plist, and then select Open.

    The mdatpmdav configuration settings.

  10. Select Upload.

    The configuration setting upload.

    The prompt to upload the image related to the configuration settings.

    Note

    If you happen to upload the Intune file, you'll get the following error:

    The prompt to upload the intune file related to the configuration settings.

  11. Select Save.

    The option to save the image related to the configuration settings.

  12. The file is uploaded.

    The uploaded file related to the configuration settings.

    The configuration settings page.

  13. Select the Scope tab.

    The scope for the configuration settings.

  14. Select Contoso's Machine Group. Select Add, then select Save.

    The configuration settings addsav.

    The notification of configuration settings.

  15. Select Done. You see the new Configuration profile.

Image of configuration settings config profile image.

Step 4: Configure notifications settings

Note

These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.

  1. In the Jamf Pro dashboard, select Computers, then Configuration Profiles.

  2. Select New, and then, on the General tab, for Options, specify the following details:

    • Name: MDATP MDAV Notification settings

    • Description: macOS 11 (Big Sur) or later

    • Category: None *(default)*

    • Distribution Method: Install Automatically *(default)*

    • Level: Computer Level *(default)*

      The new macOS configuration profile page.

  3. On the Notifications tab, select Add, and specify the following values:

    • Bundle ID: com.microsoft.wdav.tray
    • Critical Alerts: Select Disable
    • Notifications: Select Enable
    • Banner alert type: Select Include and Temporary (default)
    • Notifications on lock screen: Select Hide
    • Notifications in Notification Center: Select Display
    • Badge app icon: Select Display

    The configuration settings mdatpmdav notifications tray.

  4. On the Notifications tab, select Add one more time, and then scroll down to New Notifications Settings.

    • Bundle ID: com.microsoft.autoupdate.fba
  5. Configure the rest of the settings to the same values mentioned earlier

    The configuration settings mdatpmdav notifications mau.

    Note that now you have two tables with notification configurations, one for Bundle ID: com.microsoft.wdav.tray, and another for Bundle ID: com.microsoft.autoupdate.fba. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and Include switch must be On for Notifications.

  6. Select the Scope tab, and then select Add.

    The page on which you can add values for the configuration settings.

  7. Select Contoso's Machine Group. Select Add, and then select Save.

    The page on which you can save values for the configuration settings contoso machine group.

    The page that displays the completion notification of the configuration settings.

  8. Select Done. You should see the new Configuration profile.

    The completed configuration settings.

Step 5: Configure Microsoft AutoUpdate (MAU)

  1. Use the following Microsoft Defender for Endpoint configuration settings:

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
     <key>ChannelName</key>
     <string>Current</string>
     <key>HowToCheck</key>
     <string>AutomaticDownload</string>
     <key>EnableCheckForUpdatesButton</key>
     <true/>
     <key>DisableInsiderCheckbox</key>
     <false/>
     <key>SendAllTelemetryEnabled</key>
     <true/>
    </dict>
    </plist>
    
  2. Save it as MDATP_MDAV_MAU_settings.plist.

  3. In the Jamf Pro dashboard, select General.

    The configuration settings.

  4. On the General tab, specify the following details:

    • Name: MDATP MDAV MAU settings
    • Description: Microsoft AutoUpdate settings for MDATP for macOS
    • Category: None (default)
    • Distribution Method: Install Automatically (default)
    • Level: Computer Level (default)
  5. In Application & Custom Settings select Configure.

    The configuration setting application and custom settings.

  6. Select Upload File (PLIST file).

  7. In Preference Domain type com.microsoft.autoupdate2, and then select Upload PLIST File.

    The configuration setting preference domain.

  8. Select Choose File.

    The prompt to choose the file regarding configuration setting.

  9. Select MDATP_MDAV_MAU_settings.plist.

    The mdatpmdavmau settings.

  10. Select Upload. The upload of the file regarding configuration setting.

    The page displaying the upload option for the file regarding configuration setting.

  11. Select Save.

    The page displaying the save option for the file regarding configuration setting.

  12. Select the Scope tab.

    The Scope tab for the configuration settings.

  13. Select Add.

    The option to add deployment targets.

    The page on which you add more values to the configuration settings.

    The page on which you can add more values to the configuration settings.

  14. Select Done.

    The completion notification regarding the configuration settings.

Step 6: Grant full disk access to Microsoft Defender for Endpoint

  1. In the Jamf Pro dashboard, select Configuration Profiles.

    The profile for which settings are to be configured.

  2. Select + New.

  3. On the General tab, specify the following details:

    • Name: MDATP MDAV - grant Full Disk Access to EDR and AV
    • Description: On macOS 11 (Big Sur) or later, the new Privacy Preferences Policy Control
    • Category: None
    • Distribution method: Install Automatically
    • Level: Computer level

    The configuration setting in general.

  4. In Configure Privacy Preferences Policy Control select Configure.

    The configuration privacy policy control.

  5. In Privacy Preferences Policy Control, enter the following details:

    • Identifier: com.microsoft.wdav
    • Identifier Type: Bundle ID
    • Code Requirement: identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9

    The configuration setting privacy preference policy control details.

  6. Select + Add.

    The configuration setting add system policy all files option.

    • Under App or service, select SystemPolicyAllFiles.
    • Under access, select Allow.
  7. Select Save (not the one at the bottom right).

    The save operation for the configuration setting.

  8. Select the + sign next to App Access to add a new entry.

    The save operation relating to the configuration setting.

  9. Enter the following details:

    • Identifier: com.microsoft.wdav.epsext
    • Identifier Type: Bundle ID
    • Code Requirement: identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
  10. Select + Add.

    The configuration setting tcc epsext entry.

  • Under App or service, select SystemPolicyAllFiles.
  • Under access, select Allow.
  1. Select Save (not the one at the bottom right).

The other instance of configuration setting tcc epsext.

  1. Select the Scope tab.

The page depicting the scope for the configuration setting.

  1. Select + Add.

The page depicting the configuration setting.

  1. Select Computer Groups, and under Group Name, select Contoso's MachineGroup.

The configuration setting contoso machine group.

  1. Select Add. Then select Save.

  2. Select Done.

    The configuration setting contoso machine-group.

    The configuration setting illustration.

Alternatively, you can download fulldisk.mobileconfig and upload it to Jamf Configuration Profiles as described in Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro.

Note

Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.

Step 7: Approve System extensions for Microsoft Defender for Endpoint

  1. In the Configuration Profiles, select + New.

    The automatically generated social media post's description.

  2. On the General tab, specify the following details:

    • Name: MDATP MDAV System Extensions
    • Description: MDATP system extensions
    • Category: None
    • Distribution Method: Install Automatically
    • Level: Computer Level

    The configuration settings sysext new profile.

  3. In System Extensions select Configure.

    The pane with the Configure option for the system extensions.

  4. In System Extensions, enter the following details:

    • Display Name: Microsoft Corp. System Extensions
    • System Extension Types: Allowed System Extensions
    • Team Identifier: UBF8T346G9
    • Allowed System Extensions:
      • com.microsoft.wdav.epsext
      • com.microsoft.wdav.netext

    The MDATP MDAV system extensions pane.

  5. Select the Scope tab.

    The Target Computers selection pane.

  6. Select + Add.

  7. Select Computer Groups > under Group Name > select Contoso's Machine Group.

  8. Select + Add.

    The New macOS Configuration Profile pane.

  9. Select Save.

    The display of options regarding MDATP MDAV System Extensions.

  10. Select Done.

    The configuration settings sysext - final.

Step 8: Configure Network Extension

As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal.

Note

These steps are applicable on macOS 11 (Big Sur) or later. Even though Jamf supports notifications on macOS version 10.15 or later, Defender for Endpoint on Mac requires macOS 11 or later.

  1. In the Jamf Pro dashboard, select Computers, then Configuration Profiles.

  2. Select New, and enter the following details for Options:

  3. On the General tab, specify the following values:

    • Name: Microsoft Defender Network Extension
    • Description: macOS 11 (Big Sur) or later
    • Category: None *(default)*
    • Distribution Method: Install Automatically *(default)*
    • Level: Computer Level *(default)*
  4. On the Content Filter tab, specify the following values:

    • Filter Name: Microsoft Defender Content Filter
    • Identifier: com.microsoft.wdav
    • Leave Service Address, Organization, User Name, Password, Certificate blank (Include is not selected)
    • Filter Order: Inspector
    • Socket Filter: com.microsoft.wdav.netext
    • Socket Filter Designated Requirement: identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
    • Leave Network Filter fields blank (Include is not selected)

    Note that Identifier, Socket Filter and Socket Filter Designated Requirement exact values as specified earlier.

    The mdatpmdav configuration setting.

  5. Select the Scope tab.

    The configuration settings sco tab.

  6. Select + Add. Select Computer Groups, and then under Group Name, select Contoso's Machine Group. Then select + Add.

    The configuration settings adim.

  7. Select Save.

    The Content Filter pane.

  8. Select Done.

    The configuration settings netext - final.

Alternatively, you can download netfilter.mobileconfig and upload it to Jamf Configuration Profiles as described in Deploying Custom Configuration Profiles using Jamf Pro|

Step 9: Configure Background Services

Caution

macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.

This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Jamf, we recommend you update the deployment with this configuration profile.

Download background_services.mobileconfig from our GitHub repository.

Upload downloaded mobileconfig to Jamf Configuration Profiles as described in Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro.

Step 10: Grant Bluetooth Permissions

Caution

macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.

Download bluetooth.mobileconfig from GitHub repository.

Warning

Current version of Jamf Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, Jamf Pro will remove unsupported payload, and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that Jamf Pro will consider it "sealed" and will not tamper with it. See instructions below:

  • You need to have at least one signing certificate installed into your KeyChain, even a self-signed certificate works. You can inspect what you have with:

    > /usr/bin/security find-identity -p codesigning -v
    
      1) 70E46A47F552EA8D58521DAC1E7F5144BA3012BC "DevCert"
      2) 67FC43F3FAB77662BB7688C114585BAA37CA8175 "Mac Developer: John Doe (1234XX234)"
      3) E142DFD879E5EB60FA249FB5B24CEAE3B370394A "Apple Development: Jane Doe 7XX7778888)"
      4) 21DE31645BBF1D9F5C46E82E87A6968111E41C75 "Apple Development: me@example.com (8745XX123)"
         4 valid identities found
    

Choose any of them, and provide the quoted text as the -N parameter:

/usr/bin/security cms -S -N "DevCert" -i bluetooth.mobileconfig -o bluetooth-signed.mobileconfig

Now you can upload the generated bluetooth-signed.mobileconfig to Jamf Pro as described in Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro.

Note

Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.

Step 11: Schedule scans with Microsoft Defender for Endpoint on macOS

Follow the instructions in Schedule scans with Microsoft Defender for Endpoint on macOS.

Step 12: Deploy Microsoft Defender for Endpoint on macOS

Note

In the steps that follow, the name of the .pkg file and the Display Name values are examples. In these examples, 200329 represents the date on which the package and policy were created (in yymmdd format), and v100.86.92 represents the version of the Microsoft Defender application that is being deployed. These values should be updated to conform with the naming convention you use in your environment for Packages and Policies.

  1. Navigate to where you saved wdav.pkg.

    The file explorer wdav package.

  2. Rename it to wdav_MDM_Contoso_200329.pkg.

    The file explorer1 wdavmdm package.

  3. Open the Jamf Pro dashboard.

    The configuration settings for Jamf pro.

  4. Select your computer and select the gear icon at the top, and then select Computer Management.

    The configuration settings - computer management.

  5. In Packages, select + New.

    The bird Description for an automatically generated package.

  6. On the General tab, in New Package, specify the following details:

    • Display Name: Leave it blank for now. Because it is reset when you choose your pkg.
    • Category: None (default)
    • Filename: Choose File

    The General tab for configuration settings.

  7. Open the file and point it to wdav.pkg or wdav_MDM_Contoso_200329.pkg.

    The computer screen displaying the description for an automatically generated package.

  8. Select Open. Set the Display Name to Microsoft Defender Advanced Threat Protection and Microsoft Defender Antivirus.

    • Manifest File isn't required. Microsoft Defender for Endpoint works without Manifest File.
    • Options tab: Keep default values.
    • Limitations tab: Keep default values.

    The limitation tab for the configuration settings.

  9. Select Save. The package is uploaded to Jamf Pro.

    The configuration settings pack uploading process for the package related to the configuration settings.

    It can take a few minutes for the package to be available for deployment.

    An instance of uploading the package for configuration settings.

  10. Navigate to the Policies page.

The configuration settings policies.

  1. Select + New to create a new policy.

    The configuration settings new policy.

  2. In General, for the Display name, use MDATP Onboarding Contoso 200329 v100.86.92 or later.

    The configuration settings - MDATP onboard.

  3. Select Recurring Check-in.

    The recurring check-in for the configuration settings.

  4. Select Save. Then select Packages, and then selectConfigure.

    The option to configure packages.

  5. Select the Add button next to Microsoft Defender Advanced Threat Protection and Microsoft Defender Antivirus.

    The option to add more settings to MDATP MDA.

  6. Select Save.

    The save option for the configuration settings.

Create a smart group for machines with Microsoft Defender profiles.

For a better user experience, configuration profiles to enrolled machines must be installed before Microsoft Defender's package. In most cases JamF Pro pushes configuration profiles immediately, and those policies are executed after some time (that is, during check-in). However, in some cases, configuration profiles deployment can be deployed with a significant delay (that is, if a user's machine is locked).

Jamf Pro provides a way to ensure the correct order. You can create a smart group for machines that already received Microsoft Defender's configuration profile, and install Microsoft Defender's package only to those machines (and as soon as they receive this profile).

Follow these steps:

  1. Create a smart group. In a new browser window, open Smart Computers Groups.

  2. Select New, and give your group a name.

  3. On the Criteria tab, select Add, and then select Show Advanced Criteria.

  4. Select Profile Name as a criterion, and use the name of a previously created configuration profile as the value:

    Creating a smart group.

  5. Select Save.

  6. Go back to the window where you configure a package policy.

  7. Select the Scope tab.

    The Scope tab related to the configuration settings.

  8. Select the target computers.

    The option to add computer groups.

  9. Under Scope, select Add.

    The configuration settings - ad1.

  10. Switch to the Computer Groups tab. Find the smart group you created, and then select Add.

The configuration settings - ad2.

  1. If you want users to install Defender for Endpoint voluntarily (or on demand), select Self-Service.

The Self Service tab for configuration settings.

  1. Select Done.

The Contoso onboarding status with an option to complete it.

The policies page.

Configuration profile scope

Jamf requires you to define a set of machines for a configuration profile. You need to make sure that all machines receiving Defender's package, also receive all configuration profiles listed above.

Warning

Jamf supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically. It is a powerful concept that is widely used for configuration profiles distribution.

However, keep in mind that these criteria should not include presence of Defender on a machine. While using this criterion may sound logical, it creates problems that are difficult to diagnose.

Defender relies on all these profiles at the moment of its installation.

Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles.Deploying a policy with Microsoft Defender's package after deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.