Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
You can use any mobile device management (MDM) solution to onboard macOS devices into Microsoft Purview solutions such as Endpoint data loss prevention (DLP).
Important
Use this procedure if you do not have Microsoft Defender for Endpoint (MDE) deployed to your macOS devices.
Applies to:
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview trials hub. Learn details about signing up and trial terms.
Before you begin
- OPTIONAL: Install the v95+ Microsoft Edge browser on your macOS devices for native Endpoint DLP support on Microsoft Edge.
Note
The three most recent major releases of macOS are supported.
Onboard devices into Microsoft Purview solutions using any MDM
Prerequisites
- You must have Microsoft Defender Antimalware client version 101.25012.0005 or newer installed on the device.
- Download the following files.
File | Description |
---|---|
mdatp.mobileconfig | This is the bundled file. |
schema.json | This is the MDE preference file. |
Tip
We recommend downloading the bundled mdatp.mobileconfig file, rather than the individual .mobileconfig files. The bundled file includes the following required files:
- accessibility.mobileconfig
- fulldisk.mobileconfig
- netfilter.mobileconfig
- sysext.mobileconfig
If any of these files are updated, you need to either download the updated bundle, or download each updated file individually.
Get the device onboarding and installation packages
In the Microsoft Purview portal, open Settings > Device Onboarding and then choose Onboarding.
For the Select operating system to start onboarding process value, choose macOS.
For Deployment method, choose Mobile Device Management/Microsoft Intune.
Choose Download onboarding package and then extract the contents of the device onboarding package. the DeviceComplianceOnboarding.plist file is downloaded to the JAMF folder.
Choose Download installation package.
Deploy onboarding packages
- Create a new configuration profile in your MDM. Use the following values (if applicable):
- Name: MDATP onboarding for macOS
- Description: *MDATP EDR onboarding for macOS
- Category: none
- Distribution method: *`install automatically
- Level: computer level
- Upload DeviceComplianceOnboarding.plist as a custom settings
- Enter
com.microsoft.wdav.atp
as the Preference Domain, - Choose Save. Refer to your MDM documentation on creating configuration profile.
Configure application preferences
Important
You must use com.microsoft.wdav as the Preference Domain value. Microsoft Defender for Endpoint uses this name and com.microsoft.wdav.ext to load the managed settings.
For information about how to create a new configuration profile, refer to your MDM documentation.
- Create a new configuration profile. Use these values (if applicable):
- Name: MDATP MDAV configuration settings
- Description: Leave this blank
- Category: none
- Distribution method: install automatically
- Level: computer level
Add the
schema.json
as a custom schema in the configuration profile.Under Preference Domain Properties, locate Data Loss Prevention and select
enabled
.Save the profile after adjusting other MDE settings (if necessary).
Deploy system configuration profiles
For information about how to deploy system configuration profiles, refer to your MDM documentation.
- Create a new configuration profile by uploading the
mdatp.mobileconfig
file into your MDM.
Register Identity
Depending on your configuration, you register the Microsoft Entra identity of the using one of these two methods.
Method 1: Register without the Microsoft Intune Company Portal
- Install any Microsoft application such as Microsoft Office, or Teams, or Microsoft Edge. When the user logs in using valid Microsoft Entra account, that account is registered as the UPN for DLP policy evaluation. Personal Microsoft accounts aren't considered as valid. The device may need to restart to complete the registration.
Method 2: Register with the Microsoft Intune Company Portal
This method is for users whose macOS devices don't use Microsoft apps.
You can Get the Microsoft Intune Company Portal if you don't already have it.
- Deploy Microsoft Enterprise SSO plug-in for Apple devices to their managed macOS devices using your MDM solution. The Microsoft Intune Company Portal for macOS provides the SSO plugin for smooth user experience. So, the Microsoft Intune Company Portal must be installed on the macOS device, but the user doesn't need to be signed into the Intune Company portal. When the user signs-in to any non-Microsoft Authentication Library (MSAL) application, like Safari browser, the SSO plugin is enabled to register the UPN. The device may need to restart to complete the registration.
For information on troubleshooting the Microsoft Enterprise SSO Extension, go to Troubleshooting the Microsoft Enterprise SSO Extension plugin on Apple devices.
Offboard macOS devices using any MDM
Important
Offboarding causes the device to stop sending sensor data to the portal. However, data from the device, including references to any alerts it has had, will be retained for up to six months.
If you aren't using MDE, uninstall the application. Refer to your MDM documentation for any MDM specific instructions for uninstallation.
Restart the macOS device. (Some applications may lose printing functionality until they're restarted.)