- Set preferences for Microsoft Defender for Endpoint on macOS
- Summary
- Configuration profile structure
- Antivirus engine preferences
- Enable / disable real-time protection
- Enable / disable passive mode
- Run a scan after definitions are updated
- Scan archives (on-demand antivirus scans only)
- Degree of parallelism for on-demand scans
- Exclusion merge policy
- Scan exclusions
- Supported exclusion types
- Path type (file / directory)
- File extension excluded from the scan
- Process excluded from the scan
- Allowed threats
- Disallowed threat actions
- Threat type settings
- Threat type settings merge policy
- Antivirus scan history retention (in days)
- Maximum number of items in the antivirus scan history
- Cloud-delivered protection preferences
- Enable / disable cloud-delivered protection
- Diagnostic collection level
- Enable / disable automatic sample submissions
- Enable / disable automatic security intelligence updates
- User interface preferences
- Show / hide status menu icon
- Show / hide option to send feedback
- Endpoint detection and response preferences
- Device tags
- Recommended configuration profile
- Property list for JAMF recommended configuration profile
- Intune recommended profile
- Full configuration profile example
- Property list for JAMF full configuration profile
- Intune full profile
- Property list validation
- Configuration profile deployment
- JAMF deployment
- Intune deployment
Set preferences for Microsoft Defender for Endpoint on macOS
Applies to:
This article contains instructions for how to set preferences for Microsoft Defender for Endpoint on macOS in enterprise organizations. To configure Microsoft Defender for Endpoint on macOS using the command-line interface, see Resources.
Summary
In enterprise organizations, Microsoft Defender for Endpoint on macOS can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. Changing the preferences that are set through the configuration profile requires escalated privileges and is not available for users without administrative permissions.
This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile.
Configuration profile structure
The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.
The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.
The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender for Endpoint, which are explained in more detail in the next sections.
Antivirus engine preferences
The antivirusEngine section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender for Endpoint.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | antivirusEngine |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Enable / disable real-time protection
Specify whether to enable real-time protection, which scans files as they are accessed.
Section | Value | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Domain | com.microsoft.wdav | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Key | enableRealTimeProtection | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Data type | Boolean | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Possible values | true (default) Enable / disable passive modeSpecify whether the antivirus engine runs in passive mode. Passive mode has the following implications:
Run a scan after definitions are updatedSpecifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting will trigger an antivirus scan on the running processes of the device.
Scan archives (on-demand antivirus scans only)Specifies whether to scan archives during on-demand antivirus scans.
Degree of parallelism for on-demand scansSpecifies the degree of parallelism for on-demand scans. This corresponds to the number of threads used to perform the scan and impacts the CPU usage, as well as the duration of the on-demand scan.
Exclusion merge policySpecify the merge policy for exclusions. This can be a combination of administrator-defined and user-defined exclusions ( merge ) or only administrator-defined exclusions ( admin_only ). This setting can be used to restrict local users from defining their own exclusions.
Scan exclusionsSpecify entities excluded from being scanned. Exclusions can be specified by full paths, extensions, or file names. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
Type of exclusionSpecify content excluded from being scanned by type.
Path to excluded contentSpecify content excluded from being scanned by full file path.
Supported exclusion typesThe follow table shows the exclusion types supported by Defender for Endpoint on Mac.
|