Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint for Mac
Prerequisites and system requirements
Before you get started, see the main Microsoft Defender for Endpoint for Mac page for a description of prerequisites and system requirements for the current software version.
Currently, Microsoft oficially supports only Intune and JAMF for the deployment and management of Microsoft Defender for Endpoint for Mac. Microsoft makes no warranties, express or implied, with respect to the information provided below.
If your organization uses a Mobile Device Management (MDM) solution that is not officially supported, this does not mean you are unable to deploy or run Microsoft Defender for Endpoint for Mac.
Microsoft Defender for Endpoint for Mac does not depend on any vendor-specific features. It can be used with any MDM solution that supports the following features:
- Deploy a macOS .pkg to managed devices.
- Deploy macOS system configuration profiles to managed devices.
- Run an arbitrary admin-configured tool/script on managed devices.
Most modern MDM solutions include these features, however, they may call them differently.
You can deploy Defender without the last requirement from the preceding list, however:
- You will not be able to collect status in a centralized way
- If you decide to uninstall Defender, you will need to log on to the client device locally as an administrator
Most MDM solutions use the same model for managing macOS devices, with similar terminology. Use JAMF-based deployment as a template.
In order to deploy the package to your enterprise, use the instructions associated with your MDM solution.
Set up a system configuration profile. Your MDM solution may call it something like "Custom Settings Profile", as Microsoft Defender for Endpoint for Mac is not part of macOS.
Use the property list, jamf/WindowsDefenderATPOnboarding.plist, which can be extracted from an onboarding package downloaded from Microsoft Defender Security Center. Your system may support an arbitrary property list in XML format. You can upload the jamf/WindowsDefenderATPOnboarding.plist file as-is in that case. Alternatively, it may require you to convert the property list to a different format first.
Typically, your custom profile has an ID, name, or domain attribute. You must use exactly "com.microsoft.wdav.atp" for this value. MDM uses it to deploy the settings file to /Library/Managed Preferences/com.microsoft.wdav.atp.plist on a client device, and Defender uses this file for loading the onboarding information.
Kernel extension policy
Set up a KEXT or kernel extension policy. Use team identifier UBF8T346G9 to allow kernel extensions provided by Microsoft.
System extension policy
Set up a system extension policy. Use team identifier UBF8T346G9 and approve the following bundle identifiers:
Full disk access policy
Grant Full Disk Access to the following components:
Microsoft Defender for Endpoint
- Identifier Type: Bundle ID
- Code Requirement: identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113622.214.171.124.6] /* exists */ and certificate leaf[field.1.2.840.1136126.96.36.199.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9
Microsoft Defender for Endpoint Endpoint Security Extension
- Identifier Type: Bundle ID
- Code Requirement: identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.1136188.8.131.52.6] /* exists / and certificate leaf[field.1.2.840.1136184.108.40.206.13] / exists */ and certificate leaf[subject.OU] = UBF8T346G9
Network extension policy
As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. The following policy allows the network extension to perform this functionality.
- Filter type: Plugin
- Plugin bundle identifier:
- Filter data provider bundle identifier:
- Filter data provider designated requirement: identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.1136220.127.116.11.6] /* exists / and certificate leaf[field.1.2.840.113618.104.22.168.13] / exists */ and certificate leaf[subject.OU] = UBF8T346G9
- Filter sockets:
Check installation status
Run Microsoft Defender for Endpoint on a client device to check the onboarding status.