Microsoft Defender Atp Mac

-->
  1. Microsoft Defender Atp Machine Learning
  2. Microsoft Defender Atp For Mac
  3. Microsoft Defender Atp Mac 2017

米Microsoftは11月8日、セキュリティ企業3社と組んで、法人向けのエンドポイントセキュリティ対策サービス「Windows Defender Advanced Threat Protection(ATP. 2018-11-15  Read more Microsoft Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices. Get started with Microsoft Security. Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place.

Applies to:

This topic describes how to deploy Microsoft Defender ATP for Mac manually. A successful deployment requires the completion of all of the following steps:

Prerequisites and system requirements

Before you get started, see the main Microsoft Defender ATP for Mac page for a description of prerequisites and system requirements for the current software version.

Download installation and onboarding packages

Download the installation and onboarding packages from Microsoft Defender Security Center:

  1. In Microsoft Defender Security Center, go to Settings > Machine Management > Onboarding.

  2. In Section 1 of the page, set operating system to Linux, macOS, iOS, and Android and Deployment method to Local script.

  3. In Section 2 of the page, select Download installation package. Save it as wdav.pkg to a local directory.

  4. In Section 2 of the page, select Download onboarding package. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.

  5. From a command prompt, verify that you have the two files.Extract the contents of the .zip files:

Application installation

To complete this process, you must have admin privileges on the machine.

  1. Navigate to the downloaded wdav.pkg in Finder and open it.

  2. Select Continue, agree with the License terms, and enter the password when prompted.

    Important

    Microsoft office for mac online purchase

    You will be prompted to allow a driver from Microsoft to be installed (either 'System Extension Blocked' or 'Installation is on hold' or both. The driver must be allowed to be installed.

  3. Select Open Security Preferences or Open System Preferences > Security & Privacy. Select Allow:

Microsoft Defender Atp Machine Learning

The installation proceeds.

Caution

If you don't select Allow, the installation will proceed after 5 minutes. Defender ATP will be loaded, but some features, such as real-time protection, will be disabled. See Troubleshoot kernel extension issues for information on how to resolve this.

Note

macOS may request to reboot the machine upon the first installation of Microsoft Defender. Real-time protection will not be available until the machine is rebooted.

Client configuration

  1. Copy wdav.pkg and WindowsDefenderATPOnboarding.py to the machine where you deploy Microsoft Defender ATP for Mac.

    The client machine is not associated with orgId. Note that the orgId attribute is blank.

  2. Run the Python script to install the configuration file:

  3. Verify that the machine is now associated with your organization and reports a valid orgId:

After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.

How to Allow Full Disk Access

Caution

macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender ATP is not able to fully protect your device.

To grant consent, open System Preferences -> Security & Privacy -> Privacy -> Full Disk Access. Click the lock icon to make changes (bottom of the dialog box). Select Microsoft Defender ATP.

Logging installation issues

See Logging installation issues for more information on how to find the automatically generated log that is created by the installer when an error occurs.

Uninstallation

See Uninstalling for details on how to remove Microsoft Defender ATP for Mac from client devices.

-->

Applies to:

Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Microsoft Defender ATP for Mac.

This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on the data events that are collected.

Overview of privacy controls in Microsoft Defender ATP for Mac

This section describes the privacy controls for the different types of data collected by Microsoft Defender ATP for Mac.

Diagnostic data

Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements.

Some diagnostic data is required, while some diagnostic data is optional. We give you the ability to choose whether to send us required or optional diagnostic data through the use of privacy controls, such as policy settings for organizations.

There are two levels of diagnostic data for Microsoft Defender ATP client software that you can choose from:

  • Required: The minimum data necessary to help keep Microsoft Defender ATP secure, up-to-date, and performing as expected on the device it’s installed on.

  • Optional: Additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and remediate issues.

By default, both optional and required diagnostic data are sent to Microsoft.

Cloud delivered protection data

Cloud delivered protection is used to provide increased and faster protection with access to the latest protection data in the cloud.

Enabling the cloud-delivered protection service is optional, however it is highly recommended because it provides important protection against malware on your endpoints and across your network.

Sample data

Sample data is used to improve the protection capabilities of the product, by sending Microsoft suspicious samples so they can be analyzed. Enabling automatic sample submission is optional.

When this feature is enabled and the sample that is collected is likely to contain personal information, the user is prompted for consent.

Manage privacy controls with policy settings

If you're an IT administrator, you might want to configure these controls at the enterprise level.

The privacy controls for the various types of data described in the preceding section are described in detail in Set preferences for Microsoft Defender ATP for Mac.

As with any new policy settings, you should carefully test them out in a limited, controlled environment to ensure the settings that you configure have the desired effect before you implement the policy settings more widely in your organization.

Diagnostic data events

This section describes what is considered required diagnostic data and what is considered optional diagnostic data, along with a description of the events and fields that are collected.

Data fields that are common for all events

There is some information about events that is common to all events, regardless of category or data subtype.

The following fields are considered common for all events:

FieldDescription
platformThe broad classification of the platform on which the app is running. Allows Microsoft to identify on which platforms an issue may be occurring so that it can correctly be prioritized.
machine_guidUnique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.
sense_guidUnique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.
org_idUnique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted.
hostnameLocal machine name (without DNS suffix). Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.
product_guidUnique identifier of the product. Allows Microsoft to differentiate issues impacting different flavors of the product.
app_versionVersion of the Microsoft Defender ATP for Mac application. Allows Microsoft to identify which versions of the product are showing an issue so that it can correctly be prioritized.
sig_versionVersion of security intelligence database. Allows Microsoft to identify which versions of the security intelligence are showing an issue so that it can correctly be prioritized.
supported_compressionsList of compression algorithms supported by the application, for example ['gzip']. Allows Microsoft to understand what types of compressions can be used when it communicates with the application.
release_ringRing that the device is associated with (for example Insider Fast, Insider Slow, Production). Allows Microsoft to identify on which release ring an issue may be occurring so that it can correctly be prioritized.

Required diagnostic data

Required diagnostic data is the minimum data necessary to help keep Microsoft Defender ATP secure, up-to-date, and perform as expected on the device it’s installed on.

Required diagnostic data helps to identify problems with Microsoft Defender ATP that may be related to a device or software configuration. For example, it can help determine if a Microsoft Defender ATP feature crashes more frequently on a particular operating system version, with newly introduced features, or when certain Microsoft Defender ATP features are disabled. Required diagnostic data helps Microsoft detect, diagnose, and fix these problems more quickly so the impact to users or organizations is reduced.

Software setup and inventory data events

Microsoft Defender ATP installation / uninstallation

The following fields are collected:

FieldDescription
correlation_idUnique identifier associated with the installation.
versionVersion of the package.
severitySeverity of the message (for example Informational).
codeCode that describes the operation.
textAdditional information associated with the product installation.

Microsoft Defender ATP configuration

The following fields are collected:

FieldDescription
antivirus_engine.enable_real_time_protectionWhether real-time protection is enabled on the device or not.
antivirus_engine.passive_modeWhether passive mode is enabled on the device or not.
cloud_service.enabledWhether cloud delivered protection is enabled on the device or not.
cloud_service.timeoutTime out when the application communicates with the Microsoft Defender ATP cloud.
cloud_service.heartbeat_intervalInterval between consecutive heartbeats sent by the product to the cloud.
cloud_service.service_uriURI used to communicate with the cloud.
cloud_service.diagnostic_levelDiagnostic level of the device (required, optional).
cloud_service.automatic_sample_submissionWhether automatic sample submission is turned on or not.
edr.early_previewWhether the machine should run EDR early preview features.
edr.group_idGroup identifier used by the detection and response component.
edr.tagsUser-defined tags.
features.[optional feature name]List of preview features, along with whether they are enabled or not.

Product and service performance data events

Kernel extension statistics

The following fields are collected:

FieldDescription
versionVersion of Microsoft Defender ATP for Mac.
instance_idUnique identifier generated on kernel extension startup.
trace_levelTrace level of the kernel extension.
ipc.connectsNumber of connection requests received by the kernel extension.
ipc.rejectsNumber of connection requests rejected by the kernel extension.
ipc.connectedWhether there is any active connection to the kernel extension.

Support data

Diagnostic logs

Diagnostic logs are collected only with the consent of the user as part of the feedback submission feature. The following files are collected as part of the support logs:

  • All files under /Library/Logs/Microsoft/mdatp/
  • Subset of files under /Library/Application Support/Microsoft/Defender/ that are created and used by Microsoft Defender ATP for Mac
  • Subset of files under /Library/Managed Preferences that are used by Microsoft Defender ATP for Mac
  • /Library/Logs/Microsoft/autoupdate.log
  • $HOME/Library/Preferences/com.microsoft.autoupdate2.plist

Optional diagnostic data

Optional diagnostic data is additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and fix issues.

Microsoft Defender Atp For Mac

If you choose to send us optional diagnostic data, required diagnostic data is also included.

Examples of optional diagnostic data include data Microsoft collects about product configuration (for example number of exclusions set on the device) and product performance (aggregate measures about the performance of components of the product).

Software setup and inventory data events

Microsoft Defender ATP configuration

The following fields are collected:

FieldDescription
connection_retry_timeoutConnection retry time out when communication with the cloud.
file_hash_cache_maximumSize of the product cache.
crash_upload_daily_limitLimit of crash logs uploaded daily.
antivirus_engine.exclusions[].is_directoryWhether the exclusion from scanning is a directory or not.
antivirus_engine.exclusions[].pathPath that was excluded from scanning.
antivirus_engine.exclusions[].extensionExtension excluded from scanning.
antivirus_engine.exclusions[].nameName of the file excluded from scanning.
antivirus_engine.scan_cache_maximumSize of the product cache.
antivirus_engine.maximum_scan_threadsMaximum number of threads used for scanning.
antivirus_engine.threat_restoration_exclusion_timeTime out before a file restored from the quarantine can be detected again.
filesystem_scanner.full_scan_directoryFull scan directory.
filesystem_scanner.quick_scan_directoriesList of directories used in quick scan.
edr.latency_modeLatency mode used by the detection and response component.
edr.proxy_addressProxy address used by the detection and response component.

Microsoft Auto-Update configuration

The following fields are collected:

FieldDescription
how_to_checkDetermines how product updates are checked (for example automatic or manual).
channel_nameUpdate channel associated with the device.
manifest_serverServer used for downloading updates.
update_cacheLocation of the cache used to store updates.

Product and service usage

Diagnostic log upload started report

The following fields are collected:

FieldDescription
sha256SHA256 identifier of the support log.
sizeSize of the support log.
original_pathPath to the support log (always under /Library/Application Support/Microsoft/Defender/wdavdiag/).
formatFormat of the support log.

Diagnostic log upload completed report

The following fields are collected:

Microsoft Defender Atp Mac 2017

FieldDescription
request_idCorrelation ID for the support log upload request.
sha256SHA256 identifier of the support log.
blob_sas_uriURI used by the application to upload the support log.

Product and service performance data events

Unexpected application exit (crash)

Unexpected application exits and the state of the application when that happens.

Kernel extension statistics

The following fields are collected:

FieldDescription
pkt_ack_timeoutThe following properties are aggregated numerical values, representing count of events that happened since kernel extension startup.
pkt_ack_conn_timeout
ipc.ack_pkts
ipc.nack_pkts
ipc.send.ack_no_conn
ipc.send.nack_no_conn
ipc.send.ack_no_qsq
ipc.send.nack_no_qsq
ipc.ack.no_space
ipc.ack.timeout
ipc.ack.ackd_fast
ipc.ack.ackd
ipc.recv.bad_pkt_len
ipc.recv.bad_reply_len
ipc.recv.no_waiter
ipc.recv.copy_failed
ipc.kauth.vnode.mask
ipc.kauth.vnode.read
ipc.kauth.vnode.write
ipc.kauth.vnode.exec
ipc.kauth.vnode.del
ipc.kauth.vnode.read_attr
ipc.kauth.vnode.write_attr
ipc.kauth.vnode.read_ex_attr
ipc.kauth.vnode.write_ex_attr
ipc.kauth.vnode.read_sec
ipc.kauth.vnode.write_sec
ipc.kauth.vnode.take_own
ipc.kauth.vnode.denied
ipc.kauth.file_op.mask
ipc.kauth_file_op.open
ipc.kauth.file_op.close
ipc.kauth.file_op.close_modified
ipc.kauth.file_op.move
ipc.kauth.file_op.link
ipc.kauth.file_op.exec
ipc.kauth.file_op.remove
ipc.kauth.file_op.fork
ipc.kauth.file_op.create

Resources