House Defender Mac OS

-->
  • Select the disk where you want to install the Bitdefender software, then click on Continue. After that, select Install. When prompted, type your username and password, then click Install Software. A small window will appear and Bitdefender Antivirus for Mac will automatically download and install on your Mac.
  • The infamously legendary Mac Defender is one of the programs which proved that Mac OS isn’t invulnerable to virus attacks at all. The very first contamination instances were noticed in 2011 and, interestingly enough, this malware is still around.

Applies to:

Want to experience Microsoft Defender for Endpoint? Sign up for a free trial.

Oct 17, 2019 It’s even being trialled for macOS under the name Microsoft Defender Advanced Threat Protection (ATP) for Mac, although the focus there is primarily to serve mixed-OS business environments. If you are connected to the Internet and Bitdefender Shield is enabled, Bitdefender Antivirus for Mac checks for updates every hour. If an update is detected, it is automatically downloaded and installed on your Mac. You can also perform manual updates at any time. In macOS High Sierra (10.13), Mojave (10.14) and Catalina (10.15), Bitdefender Endpoint Security for Mac uses system extensions (also known as kernel extensions) to ensure protection cannot be tampered with and to provide Content Control and Device Control functionality.

Important

Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

Requirements

House

Device control for macOS has the following prerequisites:

  • Microsoft Defender for Endpoint entitlement (can be trial)

  • Minimum OS version: macOS 10.15.4 or higher

  • Minimum product version: 101.24.59

  • Your device must be running with system extensions (this is the default on macOS 11 Big Sur).

    You can check if your device is running on system extensions by running the following command and verify that it is printing endpoint_security_extension to the console:

  • Your device must be in Beta (previously called InsiderFast) Microsoft AutoUpdate update channel. For more information, see Deploy updates for Microsoft Defender for Endpoint on Mac.

    You can check the update channel using the following command:

    If the above command does not print either Beta or InsiderFast, execute the following command from the Terminal. The channel update takes effect next time the product starts (when the next product update is installed or when the device is rebooted).

    Alternatively, if you are in a managed environment (JAMF or Intune), you can configure the update channel remotely. For more information, see Deploy updates for Microsoft Defender for Endpoint on Mac.

Device control policy

To configure device control for macOS, you must create a policy that describes the restrictions you want to put in place within your organization.

The device control policy is included in the configuration profile used to configure all other product settings. For more information, see Configuration profile structure.

Within the configuration profile, the device control policy is defined in the following section:

SectionValue
Domaincom.microsoft.wdav
KeydeviceControl
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

The device control policy can be used to:

Customize URL target for notifications raised by device control

When the device control policy that you have put in place is enforced on a device (for example, access to a removable media device is restricted), a notification is displayed to the user.

When end users click this notification, a web page is opened in the default browser. You can configure the URL that is opened when end users click the notification.

SectionValue
Domaincom.microsoft.wdav
KeynavigationTarget
Data typeString
CommentsIf not defined, the product uses a default URL pointing to a generic page explaining the action taken by the product.

Allow or block removable devices

The removable media section of the device control policy is used to restrict access to removable media.

Note

The following types of removable media are currently supported and can be included in the policy: USB storage devices.

SectionValue
Domaincom.microsoft.wdav
KeyremovableMediaPolicy
Data typeDictionary (nested preference)
CommentsSee the following sections for a description of the dictionary contents.

This section of the policy is hierarchical, allowing for maximum flexibility and covering a wide range of use cases. At the top level are vendors, identified by a vendor ID. For each vendor, there are products, identified by a product ID. Finally, for each product there are serial numbers denoting specific devices.

For information on how to find the device identifiers, see Look up device identifiers.

The policy is evaluated from the most specific entry to the most general one. Meaning, when a device is plugged in, the product tries to find the most specific match in the policy for each removable media device and apply the permissions at that level. If there is no match, then the next best match is applied, all the way to the permission specified at the top level, which is the default when a device does not match any other entry in the policy.

Policy enforcement level

Under the removable media section, there is an option to set the enforcement level, which can take one of the following values:

  • audit - Under this enforcement level, if access to a device is restricted, a notification is displayed to the user, however the device can still be used. This enforcement level can be useful to evaluate the effectiveness of a policy.
  • block - Under this enforcement level, the operations that the user can perform on the device are limited to what is defined in the policy. Furthermore, a notification is raised to the user.
SectionValue
Domaincom.microsoft.wdav
KeyenforcementLevel
Data typeString
Possible valuesaudit (default)
block

Default permission level

At the top level of the removable media section, you can configure the default permission level for devices that do not match anything else in the policy.

This setting can be set to:

  • none - No operations can be performed on the device
  • A combination of the following values:
    • read - Read operations are permitted on the device
    • write - Write operations are permitted on the device
    • execute - Execute operations are permitted on the device

Note

If none is present in the permission level, any other permissions (read, write, or execute) will be ignored.

Note

The execute permission only refers to execution of Mach-O binaries. It does not include execution of scripts or other types of payloads.

SectionValue
Domaincom.microsoft.wdav
Keypermission
Data typeArray of strings
Possible valuesnone
read
write
execute

Restrict removable media by vendor, product, and serial number

As described in Allow or block removable devices, removable media such as USB devices can be identified by the vendor ID, product ID, and serial number.

At the top level of the removable media policy, you can optionally define more granular restrictions at the vendor level.

The vendors dictionary contains one or more entries, with each entry being identified by the vendor ID.

SectionValue
Domaincom.microsoft.wdav
Keyvendors
Data typeDictionary (nested preference)

For each vendor, you can specify the desired permission level for devices from that vendor.

SectionValue
Domaincom.microsoft.wdav
Keypermission
Data typeArray of strings
Possible valuesSame as Default permission level

Furthermore, you can optionally specify the set of products belonging to that vendor for which more granular permissions are defined. The products dictionary contains one or more entries, with each entry being identified by the product ID.

SectionValue
Domaincom.microsoft.wdav
Keyproducts
Data typeDictionary (nested preference)

For each product, you can specify the desired permission level for that product.

SectionValue
Domaincom.microsoft.wdav
Keypermission
Data typeArray of strings
Possible valuesSame as Default permission level

Furthermore, you can specify an optional set of serial numbers for which more granular permissions are defined.

The serialNumbers dictionary contains one or more entries, with each entry being identified by the serial number.

SectionValue
Domaincom.microsoft.wdav
KeyserialNumbers
Data typeDictionary (nested preference)

For each serial number, you can specify the desired permission level.

SectionValue
Domaincom.microsoft.wdav
Keypermission
Data typeArray of strings
Possible valuesSame as Default permission level

Example device control policy

The following example shows how all of the above concepts can be combined into a device control policy. In the following example, note the hierarchical nature of the removable media policy.

We have included more examples of device control policies in the following documents:

Look up device identifiers

To find the vendor ID, product ID, and serial number of a USB device:

  1. Log into a Mac device.

  2. Plug in the USB device for which you want to look up the identifiers.

  3. In the top-level menu of macOS, select About This Mac.

  4. Select System Report.

  5. From the left column, select USB.

  6. Under USB Device Tree, navigate to the USB device that you plugged in.

  7. The vendor ID, product ID, and serial number are displayed. When adding the vendor ID and product ID to the removable media policy, you must only add the part after 0x. For example, in the below image, vendor ID is 1000 and product ID is 090c.

Discover USB devices in your organization

You can view mount, unmount, and volume change events originating from USB devices in Microsoft Defender for Endpoint advanced hunting. These events can be helpful to identify suspicious usage activity or perform internal investigations.

Device control policy deployment

The device control policy must be included next to the other product settings, as described in Set preferences for Microsoft Defender for Endpoint on macOS.

This profile can be deployed using the instructions listed in Configuration profile deployment.

Troubleshooting tips

After pushing the configuration profile through Intune or JAMF, you can check if it was successfully picked up by the product by running the following command from the Terminal:

This command will print to standard output the device control policy that the product is using. In case this prints Policy is empty, make sure that (a) the configuration profile has indeed been pushed to your device from the management console, and (b) it is a valid device control policy, as described in this document.

On a device where the policy has been delivered successfully and where there are one or more devices plugged in, you can run the following command to list all devices and the effective permissions applied to them.

Example of output:

In the above example, there is only one removable media device plugged in and it has read and execute permissions, according to the device control policy that was delivered to the device.

Related topics

-->

Applies to:

Want to experience Microsoft Defender for Endpoint? Sign up for a free trial.

Important

On macOS 11 (Big Sur), Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on this page.

101.27.50 (20.121022.12750.0)

  • Fix to accommodate for Apple certificate expiration for macOS Catalina and earlier. This fix restores Threat & Vulnerability Management (TVM) functionality.

101.25.69 (20.121022.12569.0)

  • Microsoft Defender for Endpoint on macOS is now available in preview for US Government customers. For more information, see Microsoft Defender for Endpoint for US Government customers.
  • Performance improvements (specifically for the situation when the XCode Simulator app is used) & bug fixes.

101.23.64 (20.121021.12364.0)

  • Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, run mdatp health --details antivirus
  • Performance improvements & bug fixes

101.22.79 (20.121012.12279.0)

  • Performance improvements & bug fixes

101.19.88 (20.121011.11988.0)

  • Performance improvements & bug fixes

101.19.48 (20.120121.11948.0)

Note

The old command-line tool syntax has been deprecated with this release. For information on the new syntax, see Resources.

  • Added a new command-line switch to disable the network extension: mdatp system-extension network-filter disable. This command can be useful to troubleshoot networking issues that could be related to Microsoft Defender for Endpoint on Mac
  • Performance improvements & bug fixes

101.19.21 (20.120101.11921.0)

  • Bug fixes

101.15.26 (20.120102.11526.0)

Defender
  • Improved the reliability of the agent when running on macOS 11 Big Sur
  • Added a new command-line switch (--ignore-exclusions) to ignore AV exclusions during custom scans (mdatp scan custom)
  • Performance improvements & bug fixes

101.13.75 (20.120101.11375.0)

  • Removed conditions when Microsoft Defender for Endpoint was triggering a macOS 11 (Big Sur) bug that manifests into a kernel panic
  • Fixed a memory leak in the Endpoint Security system extension when running on mac 11 (Big Sur)
  • Bug fixes

101.10.72

  • Bug fixes

101.09.61

  • Added a new managed preference for disabling the option to send feedback
  • Status menu icon now shows a healthy state when the product settings are managed. Previously, the status menu icon was displaying a warning or error state, even though the product settings were managed by the administrator
  • Performance improvements & bug fixes

101.09.50

  • This product version has been validated on macOS Big Sur 11 beta 9

  • The new syntax for the mdatp command-line tool is now the default one. For more information on the new syntax, see Resources for Microsoft Defender for Endpoint on macOS

    Note

    The old command-line tool syntax will be removed from the product on January 1st, 2021.

  • Extended mdatp diagnostic create with a new parameter (--path [directory]) that allows the diagnostic logs to be saved to a different directory

  • Performance improvements & bug fixes

101.09.49

  • User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user
  • Improved CPU utilization during on-demand scans
  • Performance improvements & bug fixes

101.07.23

  • Added new fields to the output of mdatp --health for checking the status of passive mode and the EDR group ID

    Note

    mdatp --health will be replaced with mdatp health in a future product update.

  • Fixed a bug where automatic sample submission was not marked as managed in the user interface

  • Added new settings for controlling the retention of items in the antivirus scan history. You can now specify the number of days to retain items in the scan history and specify the maximum number of items in the scan history

  • Bug fixes

101.06.63

  • Addressed a performance regression introduced in version 101.05.17. The regression was introduced with the fix to eliminate the kernel panics some customers have observed when accessing SMB shares. We have reverted this code change and are investigating alternative ways to eliminate the kernel panics.

101.05.17

Important

We are working on a new and enhanced syntax for the mdatp command-line tool. The new syntax is currently the default in the Insider Fast and Insider Slow update channels. We encourage you to famliliarize yourself with this new syntax.

We will continue supporting the old syntax in parallel with the new syntax and will provide more communication around the deprecation plan for the old syntax in the upcoming months.

  • Addressed a kernel panic that occurred sometimes when accessing SMB file shares
  • Performance improvements & bug fixes

101.05.16

  • Improvements to quick scan logic to significantly reduce the number of scanned files
  • Added autocompletion support for the command-line tool
  • Bug fixes

101.03.12

  • Performance improvements & bug fixes

101.01.54

  • Improvements around compatibility with Time Machine
  • Accessibility improvements
  • Performance improvements & bug fixes

101.00.31

  • Improved product onboarding experience for Intune users
  • Antivirus exclusions now support wildcards
  • Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select Scan with Microsoft Defender for Endpoint
  • In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device
  • Other performance improvements & bug fixes

100.90.27

  • You can now set an update channel for Microsoft Defender for Endpoint on macOS that is different from the system-wide update channel
  • New product icon
  • Other user experience improvements
  • Bug fixes

100.86.92

  • Improvements around compatibility with Time Machine
  • Addressed an issue where the product was sometimes not cleaning all files under /Library/Application Support/Microsoft/Defender during uninstallation
  • Reduced the CPU utilization of the product when Microsoft products are updated through Microsoft AutoUpdate
  • Other performance improvements & bug fixes

100.86.91

Caution

To ensure the most complete protection for your macOS devices and in alignment with Apple stopping delivery of macOS native security updates to OS versions older than [current – 2], MDATP for Mac deployment and updates will no longer be supported on macOS Sierra [10.12]. MDATP for Mac updates and enhancements will be delivered to devices running versions Catalina [10.15], Mojave [10.14], and High Sierra [10.13].

If you already have MDATP for Mac deployed to your Sierra [10.12] devices, please upgrade to the latest macOS version to eliminate risks of losing protection.

  • Performance improvements & bug fixes

100.83.73

  • Added more controls for IT administrators around management of exclusions, management of threat type settings, and disallowed threat actions
  • When Full Disk Access is not enabled on the device, a warning is now displayed in the status menu
  • Performance improvements & bug fixes

100.82.60

  • Addressed an issue where the product fails to start following a definition update.

100.80.42

  • Bug fixes

100.79.42

  • Fixed an issue where Microsoft Defender for Endpoint on Mac was sometimes interfering with Time Machine
  • Added a new switch to the command-line utility for testing the connectivity with the backend service
  • Added ability to view the full threat history in the user interface (can be accessed from the Protection history view)
  • Performance improvements & bug fixes

100.72.15

  • Bug fixes

100.70.99

  • Addressed an issue that impacts the ability of some users to upgrade to macOS Catalina when real-time protection is enabled. This sporadic issue was caused by Microsoft Defender for Endpoint locking files within Catalina upgrade package while scanning them for threats, which led to failures in the upgrade sequence.

100.68.99

  • Added the ability to configure the antivirus functionality to run in passive mode
  • Performance improvements & bug fixes

Mac Os Download

100.65.28

House Defender Mac Os Catalina

  • Added support for macOS Catalina

    Caution

    macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.

    The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:

    • For manual deployments, see the updated instructions in the Manual deployment topic.
    • For managed deployments, see the updated instructions in the JAMF-based deployment and Microsoft Intune-based deployment topics.
  • Performance improvements & bug fixes