As Mac continues to grow in popularity around the world, you need to to deploy, connect, inventory and secure this influx of devices. Sure, there are many Mac management solutions to choose from. But most lack the functionality for full lifecycle management, connection and state-of-the-art security.

  1. Mac For Enterprises
  2. Mac Os For Enterprise
  3. Mac Enterprises Inc
  4. Quickbooks Enterprise For Mac
  5. Mac Enterprise Connect
  1. Guidance for how to configure the product in enterprise environments is available in Set preferences for Microsoft Defender for Endpoint for Mac. MacOS kernel and system extensions. In alignment with macOS evolution, we are preparing a Microsoft Defender for Endpoint for Mac update that leverages system extensions instead of kernel extensions.
  2. First, the developer or enterprise makes sure it works on the PC, then they think about the Mac. What does this really look like? With my Teams example, it’s a big blank screen.
  3. Apple’s eye not on businesses. Apple has traditionally turned a blind eye when it comes to.

Mac OS X Enterprise Course Outline

  • Mac OS X Overview

    • Installing OS X
    • Configuring OS X clients and servers
    • Establishing requirements for interoperability
    • Setting the stage for the enterprise
  • Navigating the Mac User Interface

    Server operating system features

    • File Sharing Services
    • Client Management
    • Networking Services
    • Directory Services

    Administering the file system

    • Managing the file system with Finder
    • Uncovering the underlying UNIX file system
    • Manipulating advanced file system attributes

    Installing Mac applications

    • Examining installation methodologies
    • Monitoring application health
    • Comparing Mac and Windows application architectures

    Running Windows on the Mac platform

    • Virtualizing OS installations with Vmware
    • Booting Windows natively with Bootcamp
  • Managing OS X Network Integration

    Setting network preferences

    • Establishing appropriate protocols for communication
    • Activating network devices: Ethernet, AirPort
    • Modifying preferences for Internet & Wireless

    User account administration

    • Adding and managing users
    • Defining security settings for user accounts
    • Preparing users for directory integration

    Creating OS X and Windows workgroups

    • Sharing files between Macs
    • Setting permissions on file system objects
    • Connecting Macs with SMB and AFP protocols
    • Introducing SMB for PC connectivity

    Sharing system resources

    • Printer sharing
    • Screen sharing
    • Web sharing
    • FTP
    • Remote Desktop sharing
  • Building Centralized Directory Services

    Integrating OS X into Active Directory (AD)

    • Implementing LDAP services: AD and Open Directory
    • Configuring AD for Mac integration
    • Introducing iOS devices into the enterprise

    Configuring directory services on an OS X client

    • Leveraging Directory Utility for enterprise access
    • Activating AD plug-in and Open Directory components

    Managing OS X clients with Open Directory (OD)

    • Centralizing administration with a Mac server
    • Working with the Server Admin and Workgroup Manager
  • Integrating Mac OS X and Windows

    Administering network resources and clients

    • Building AD Users with the (ADUC) tool
    • Integrating directory services with Workgroup Manager

    Managing Mac desktop preferences

    • Establishing distribution group architectures
    • Pushing preferences with Profile Manager

    Creating directory redundancy

    • Replicating the Open Directory
    • Specifying Master/Replica configuration

    Accessing desktops remotely

    • Microsoft Remote Desktop Connection
    • Apple Remote Desktop
  • Maintaining Enterprise Services

    Building enterprise DNS for AD and OD

    • Establishing the primary DNS architecture
    • Resolving DNS names across platforms

    Synchronizing time services

    • Aligning time services for authentication
    • Configuring W32Time and SNTP

    Authenticating users with Kerberos

    • Establishing Kerberos authentication paths
    • Investigating Kerberized applications

    Ensuring enterprise integrity

    • Leveraging Disk Utility for backups and imaging
    • Centralizing backups to a server
-->

This topic describes how to install, configure, update, and use Defender for Endpoint for Mac.

Caution

Running other third-party endpoint protection products alongside Defender for Endpoint for Mac is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of MDATP for Mac EDR functionality after configuring MDATP for Mac antivirus functionality to run in Passive mode.

What’s new in the latest release

Tip

If you have any feedback that you would like to share, submit it by opening Microsoft Defender for Endpoint for Mac on your device and navigating to Help > Send feedback.

To get the latest features, including preview capabilities (such as endpoint detection and response for your Mac devices), configure your macOS device running Microsoft Defender for Endpoint to be an 'Insider' device.

How to install Microsoft Defender for Endpoint for Mac

Prerequisites

  • A Defender for Endpoint subscription and access to the Microsoft Defender Security Center portal
  • Beginner-level experience in macOS and BASH scripting
  • Administrative privileges on the device (in case of manual deployment)
Mac

Installation instructions

There are several methods and deployment tools that you can use to install and configure Defender for Endpoint for Mac.

  • Third-party management tools:

  • Command-line tool:

System requirements

Enterprise email for mac

The three most recent major releases of macOS are supported.

Important

On macOS 11 (Big Sur), Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on New configuration profiles for macOS Catalina and newer versions of macOS.

Important

Support for macOS 10.13 (High Sierra) will be discontinued on February 15th, 2021.

  • 11 (Big Sur), 10.15 (Catalina), 10.14 (Mojave), 10.13 (High Sierra)
  • Disk space: 1GB

Beta versions of macOS are not supported.

After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.

Licensing requirements

Microsoft Defender for Endpoint for Mac requires one of the following Microsoft Volume Licensing offers:

  • Microsoft 365 E5 (M365 E5)
  • Microsoft 365 E5 Security
  • Microsoft 365 A5 (M365 A5)

Note

Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices.Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). When purchased via a CSP, it does not require Microsoft Volume Licensing offers listed.

Network connections

The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an allow rule specifically for them.

Spreadsheet of domains listDescription

Spreadsheet of specific DNS records for service locations, geographic locations, and OS.
Download the spreadsheet here: mdatp-urls.xlsx.

Microsoft Defender for Endpoint can discover a proxy server by using the following discovery methods:

  • Proxy autoconfig (PAC)
  • Web Proxy Autodiscovery Protocol (WPAD)
  • Manual static proxy configuration

If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.

Mac For Enterprises

Warning

Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used.

Mac For Enterprise

SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint for Mac to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.

To test that a connection is not blocked, open https://x.cp.wd.microsoft.com/api/report and https://cdn.x.cp.wd.microsoft.com/ping in a browser.

If you prefer the command line, you can also check the connection by running the following command in Terminal:

The output from this command should be similar to the following:

OK https://x.cp.wd.microsoft.com/api/report

OK https://cdn.x.cp.wd.microsoft.com/ping

Caution

We recommend that you keep System Integrity Protection (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.

Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:

How to update Microsoft Defender for Endpoint for Mac

Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint for Mac, a program named Microsoft AutoUpdate (MAU) is used. To learn more, see Deploy updates for Microsoft Defender for Endpoint for Mac.

How to configure Microsoft Defender for Endpoint for Mac

Mac Os For Enterprise

Guidance for how to configure the product in enterprise environments is available in Set preferences for Microsoft Defender for Endpoint for Mac.

Mac Enterprises Inc

macOS kernel and system extensions

In alignment with macOS evolution, we are preparing a Microsoft Defender for Endpoint for Mac update that leverages system extensions instead of kernel extensions. For relevant details, see What's new in Microsoft Defender for Endpoint for Mac.

Quickbooks Enterprise For Mac

Resources

Mac Enterprise Connect

  • For more information about logging, uninstalling, or other topics, see Resources for Microsoft Defender for Endpoint for Mac.

  • Privacy for Microsoft Defender for Endpoint for Mac.