Microsoft Av For Mac

  
Microsoft Av For Mac Average ratng: 9,1/10 4048 reviews
-->
  1. Free Av For Mac
  2. Microsoft Applications For Mac
  3. Microsoft Virus Mac
  • Fixes or workarounds for recent issues in Word for Mac. Word 2016 for Mac Word for Mac 2011 More. Last updated: February 2020. Users may see issues with fonts when using version 16.9 of Microsoft Word, Excel, Outlook, OneNote and Microsoft PowerPoint on macOS. In Office 2016 for Mac, click the smiley icon in the upper-right corner.
  • Nov 08, 2017  Microsoft extends Windows Defender ATP across macOS, Linux, iOS, and Android. Microsoft is extending Windows Defender Advanced Threat Protection (ATP) across even more platforms. As part of a partnership with Bitdefender, Lookout, and Ziften, Windows Defender ATP will soon be able to detect threats across macOS, Linux, iOS, and Android.

Applies to:

Mar 04, 2020  Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac Collecting diagnostic information If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default.

Collecting diagnostic information

If you can reproduce a problem, please increase the logging level, run the system for some time, and restore the logging level to the default.

  1. Increase logging level:

  2. Reproduce the problem

  3. Run sudo mdatp --diagnostic --create to backup Microsoft Defender ATP's logs. The files will be stored inside of a .zip archive. This command will also print out the file path to the backup after the operation succeeds.

  4. Restore logging level:

Logging installation issues

If an error occurs during installation, the installer will only report a general failure.

The detailed log will be saved to /Library/Logs/Microsoft/mdatp/install.log. If you experience issues during installation, send us this file so we can help diagnose the cause.

Uninstalling

There are several ways to uninstall Microsoft Defender ATP for Mac. Please note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune.

Interactive uninstallation

  • Open Finder > Applications. Right click on Microsoft Defender ATP > Move to Trash.

From the command line

  • sudo rm -rf '/Applications/Microsoft Defender ATP.app'
  • sudo rm -rf '/Library/Application Support/Microsoft/Defender/'

Configuring from the command line

Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line:

GroupScenarioCommand
ConfigurationTurn on/off real-time protectionmdatp --config realTimeProtectionEnabled [true/false]
ConfigurationTurn on/off cloud protectionmdatp --config cloudEnabled [true/false]
ConfigurationTurn on/off product diagnosticsmdatp --config cloudDiagnosticEnabled [true/false]
ConfigurationTurn on/off automatic sample submissionmdatp --config cloudAutomaticSampleSubmission [true/false]
ConfigurationTurn on PUA protectionmdatp --threat --type-handling potentially_unwanted_application block
ConfigurationTurn off PUA protectionmdatp --threat --type-handling potentially_unwanted_application off
ConfigurationTurn on audit mode for PUA protectionmdatp --threat --type-handling potentially_unwanted_application audit
DiagnosticsChange the log levelmdatp --log-level [error/warning/info/verbose]
DiagnosticsGenerate diagnostic logsmdatp --diagnostic --create
HealthCheck the product's healthmdatp --health
ProtectionScan a pathmdatp --scan --path [path]
ProtectionDo a quick scanmdatp --scan --quick
ProtectionDo a full scanmdatp --scan --full
ProtectionCancel an ongoing on-demand scanmdatp --scan --cancel
ProtectionRequest a security intelligence updatemdatp --definition-update
EDRTurn on/off EDR preview for Macmdatp --edr --early-preview [true/false] OR mdatp --edr --earlyPreview [true/false] for versions earlier than 100.78.0
EDRAdd group tag to machine. EDR tags are used for managing machine groups. For more information, please visit https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groupsmdatp --edr --set-tag GROUP [name]
EDRRemove group tag from machinemdatp --edr --remove-tag [name]

Client Microsoft Defender ATP quarantine directory

/Library/Application Support/Microsoft/Defender/quarantine/ contains the files quarantined by mdatp. The files are named after the threat trackingId. The current trackingIds is shown with mdatp --threat --list --pretty.

Microsoft Defender ATP portal information

This blog provides detailed guidance on what to expect in Microsoft Defender ATP Security Center.

-->

Applies to:

Important

This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise organizations. To configure Microsoft Defender ATP for Mac using the command-line interface, see Resources.

Summary

Free Av For Mac

In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. Users in your organization are not able to change preferences that are set through the configuration profile.

This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile.

Configuration profile structure

The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.

Caution

The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.

The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender ATP, which are explained in more detail in the next sections.

Microsoft Applications For Mac

Antivirus engine preferences

The antivirusEngine section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender ATP.

Domaincom.microsoft.wdav
KeyantivirusEngine
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

Enable / disable real-time protection

Specify whether to enable real-time protection, which scans files as they are accessed. Microsoft internet explorer for mac high sierra.

Domaincom.microsoft.wdav
KeyenableRealTimeProtection
Data typeBoolean
Possible valuestrue (default)
false

Enable / disable passive mode

Specify whether the antivirus engine runs in passive mode. Passive mode has the following implications:

  • Real-time protection is turned off
  • On-demand scanning is turned on
  • Automatic threat remediation is turned off
  • Security intelligence updates are turned on
  • Status menu icon is hidden
Domaincom.microsoft.wdav
KeypassiveMode
Data typeBoolean
Possible valuesfalse (default)
true
CommentsAvailable in Microsoft Defender ATP version 100.67.60 or higher.

Exclusion merge policy

Specify the merge policy for exclusions. This can be a combination of administrator-defined and user-defined exclusions (merge) or only administrator-defined exclusions (admin_only). This setting can be used to restrict local users from defining their own exclusions.

Microsoft Virus Mac

Domaincom.microsoft.wdav
KeyexclusionsMergePolicy
Data typeString
Possible valuesmerge (default)
admin_only
CommentsAvailable in Microsoft Defender ATP version 100.83.73 or higher.

Scan exclusions

Specify entities excluded from being scanned. Exclusions can be specified by full paths, extensions, or file names.

Domaincom.microsoft.wdav
Keyexclusions
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.
Type of exclusion

Specify content excluded from being scanned by type.

Domaincom.microsoft.wdav
Key$type
Data typeString
Possible valuesexcludedPath
excludedFileExtension
excludedFileName
Path to excluded content

Specify content excluded from being scanned by full file path.

Domaincom.microsoft.wdav
Keypath
Data typeString
Possible valuesvalid paths
CommentsApplicable only if $type is excludedPath
Path type (file / directory)

Indicate if the path property refers to a file or directory.

Domaincom.microsoft.wdav
KeyisDirectory
Data typeBoolean
Possible valuesfalse (default)
true
CommentsApplicable only if $type is excludedPath
File extension excluded from the scan

Specify content excluded from being scanned by file extension.

Domaincom.microsoft.wdav
Keyextension
Data typeString
Possible valuesvalid file extensions
CommentsApplicable only if $type is excludedFileExtension
Process excluded from the scan

Specify a process for which all file activity is excluded from scanning. The process can be specified either by its name (e.g. cat) or full path (e.g. /bin/cat).

Domaincom.microsoft.wdav
Keyname
Data typeString
Possible valuesany string
CommentsApplicable only if $type is excludedFileName

Allowed threats

Specify threats by name that are not blocked by Microsoft Defender ATP for Mac. These threats will be allowed to run.

Domaincom.microsoft.wdav
KeyallowedThreats
Data typeArray of strings

Disallowed threat actions

Restricts the actions that the local user of a device can take when threats are detected. The actions included in this list are not displayed in the user interface.

Domaincom.microsoft.wdav
KeydisallowedThreatActions
Data typeArray of strings
Possible valuesallow (restricts users from allowing threats)
restore (restricts users from restoring threats from the quarantine)
CommentsAvailable in Microsoft Defender ATP version 100.83.73 or higher.

Threat type settings

Specify how certain threat types are handled by Microsoft Defender ATP for Mac.

Domaincom.microsoft.wdav
KeythreatTypeSettings
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.
Threat type

Specify threat types.

Domaincom.microsoft.wdav
Keykey
Data typeString
Possible valuespotentially_unwanted_application
archive_bomb
Action to take

Specify what action to take when a threat of the type specified in the preceding section is detected. Choose from the following options:

  • Audit: your device is not protected against this type of threat, but an entry about the threat is logged.
  • Block: your device is protected against this type of threat and you are notified in the user interface and the security console.
  • Off: your device is not protected against this type of threat and nothing is logged.
Domaincom.microsoft.wdav
Keyvalue
Data typeString
Possible valuesaudit (default)
block
off

Threat type settings merge policy

Specify the merge policy for threat type settings. This can be a combination of administrator-defined and user-defined settings (merge) or only administrator-defined settings (admin_only). This setting can be used to restrict local users from defining their own settings for different threat types.

Buy microsoft for mac
Domaincom.microsoft.wdav
KeythreatTypeSettingsMergePolicy
Data typeString
Possible valuesmerge (default)
admin_only
CommentsAvailable in Microsoft Defender ATP version 100.83.73 or higher.

Cloud-delivered protection preferences

Configure the cloud-driven protection features of Microsoft Defender ATP for Mac.

Domaincom.microsoft.wdav
KeycloudService
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

Enable / disable cloud-delivered protection

Specify whether to enable cloud-delivered protection the device or not. To improve the security of your services, we recommend keeping this feature turned on.

Domaincom.microsoft.wdav
Keyenabled
Data typeBoolean
Possible valuestrue (default)
false

Diagnostic collection level

Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by Microsoft Defender ATP to Microsoft.

Domaincom.microsoft.wdav
KeydiagnosticLevel
Data typeString
Possible valuesoptional (default)
required

Enable / disable automatic sample submissions

Determines whether suspicious samples (that are likely to contain threats) are sent to Microsoft. You are prompted if the submitted file is likely to contain personal information.

Domaincom.microsoft.wdav
KeyautomaticSampleSubmission
Data typeBoolean
Possible valuestrue (default)
false

User interface preferences

Manage the preferences for the user interface of Microsoft Defender ATP for Mac.

Domaincom.microsoft.wdav
KeyuserInterface
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

Show / hide status menu icon

Specify whether to show or hide the status menu icon in the top-right corner of the screen.

Domaincom.microsoft.wdav
KeyhideStatusMenuIcon
Data typeBoolean
Possible valuesfalse (default)
true

Endpoint detection and response preferences

Manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender ATP for Mac.

Domaincom.microsoft.wdav
Keyedr
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

Device tags

Specify a tag name and its value.

  • The GROUP tag, tags the machine with the specified value. The tag is reflected in the portal under the machine page and can be used for filtering and grouping machines.
Domaincom.microsoft.wdav
Keytags
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.
Type of tag

Specifies the type of tag

Domaincom.microsoft.wdav
Keykey
Data typeString
Possible valuesGROUP
Value of tag

Specifies the value of tag

Domaincom.microsoft.wdav
Keyvalue
Data typeString
Possible valuesany string

Important

  • Only one value per tag type can be set.
  • Type of tags are unique, and should not be repeated in the same configuration profile.

Recommended configuration profile

To get started, we recommend the following configuration for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides.

The following configuration profile (or, in case of JAMF, a property list that could be uploaded into the custom settings configuration profile) will:

  • Enable real-time protection (RTP)
  • Specify how the following threat types are handled:
    • Potentially unwanted applications (PUA) are blocked
    • Archive bombs (file with a high compression rate) are audited to Microsoft Defender ATP logs
  • Enable cloud-delivered protection
  • Enable automatic sample submission

Property list for JAMF configuration profile

Intune profile

Full configuration profile example

The following templates contain entries for all settings described in this document and can be used for more advanced scenarios where you want more control over Microsoft Defender ATP for Mac.

Property list for JAMF configuration profile

Intune profile

Property list validation

The property list must be a valid .plist file. This can be checked by executing:

If the file is well-formed, the above command outputs OK and returns an exit code of 0. Otherwise, an error that describes the issue is displayed and the command returns an exit code of 1.

Configuration profile deployment

Once you've built the configuration profile for your enterprise, you can deploy it through the management console that your enterprise is using. The following sections provide instructions on how to deploy this profile using JAMF and Intune.

Microsoft office 365 mac version. OneNote for Mac is available for the first time and for free. People frequently asked us for OneNote on Mac, and for more ways to capture content.Today we’re excited to complete that story with three major developments:. We’ve already made a lot of progress in that direction with our mobile, tablet and online web experiences. But there was still a gap.

JAMF deployment

From the JAMF console, open Computers > Configuration Profiles, navigate to the configuration profile you'd like to use, then select Custom Settings. Create an entry with com.microsoft.wdav as the preference domain and upload the .plist produced earlier.

Caution

You must enter the correct preference domain (com.microsoft.wdav); otherwise, the preferences will not be recognized by Microsoft Defender ATP.

Intune deployment

  1. Open Manage > Device configuration. Select Manage > Profiles > Create Profile.

  2. Choose a name for the profile. Change Platform=macOS to Profile type=Custom. Select Configure.

  3. Save the .plist produced earlier as com.microsoft.wdav.xml.

  4. Enter com.microsoft.wdav as the custom configuration profile name.

  5. Open the configuration profile and upload the com.microsoft.wdav.xml file. (This file was created in step 3.)

  6. Select OK.

  7. Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.

Caution

You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by Microsoft Defender ATP.

Resources