Blog Post

Microsoft Defender for Endpoint Blog
3 MIN READ

Tamper Protection is now available on macOS

mmkholy's avatar
mmkholy
Copper Contributor
May 11, 2022

As we continue to invest in Microsoft Defender for Endpoint capabilities for macOS, we are thrilled to announce the public preview of Tamper Protection for macOS devices.

 

Tamper Protection brings an additional layer of protection in Microsoft Defender for Endpoint to elevate the endpoint security posture of organizations. Reliably securing endpoints is crucial for any organization. Enhanced tamper resilience across prevalent platforms is a great advantage for organizations seeking to continuously enhance their endpoint security.

 

What is the Tamper Protection scope and prerequisites?

 

High level scope of Tamper Protection for macOS is:

  • Prevention of unauthorized removal of Microsoft Defender for Endpoint on macOS
  • Prevention of tampering with Microsoft Defender for Endpoint files, processes, and configuration
  • Tamper protection for macOS can be set to “disabled”, “audit”, “block”
  • Tamper protection setting applies at device level (across all users of a device).

 

When planning to roll out this feature, there are some key considerations and requirements to follow to ensure a successful implementation.

To experience the Tamper Protection for macOS capability in public preview, you’ll need to have preview features turned on in the Microsoft 365 Defender portal. If you have not yet opted into previews, we encourage you to https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/preview in the Microsoft 365 Defender portal today.

 

IMPORTANT: While Tamper Protection capability is still in preview, ensure to only enable Tamper Protection on a designated testing group (devices, profiles, smart groups).

 

Know before you start:

  • Supported macOS versions: Monterey (12), Big Sur (11), Catalina (10.15+)
  • Minimum required version for Defender for Endpoint: 101.49.25
  • Familiarity with https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac?view=o365-worldwide#how-to-install-microsoft-defender-for-endpoint-on-mac
  • Ensure that you have https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/preview?view=o365-worldwide on the portal

Requirements:

  • System Integrity Protection (SIP) enabled
  • Mobile device management (MDM) solution to configure Microsoft Defender for Endpoint on Mac

 

How to enable Tamper Protection for macOS?

 

There are several tools and methods you can use to enable the Tamper Protection feature. The common Mac MDM solutions can be used to deploy a remote configuration that controls Tamper Protection mode. The remote configuration takes precedence over any conflicting local on-device configuration.

https://docs.microsoft.com/en-us/mem/endpoint-manager-overview and Jamf Pro are the two most used solutions when it comes to remotely configuring macOS devices.  

Figure 1- How to enable tamper protection using MDM

 

If you are using Microsoft Endpoint Manager (formerly Intune), refer to our documented profile example to configure Tamper Protection via Microsoft Endpoint Manager: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/mac-preferences?view=o365-worldwide

 

Figure 2- MEM configuration profile example

 

If you are using Jamf to configure your macOS devices, refer to our Jamf guidance https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/mac-jamfpro-policies?view=o365-worldwide#legacy-method

 

Figure 3- Jamf configuration profile example

 

To enable a high degree of flexibility when configuring Tamper Protection for macOS, different modes can be applied to different groups.

There are 3 available modes in Tamper Protection:

Disabled

Tamper protection is completely off (default mode at the start of the public preview)

Audit

Tampering operations are logged, but not blocked

Block (recommended)

Tamper protection is on, tampering operations are blocked

 

To check which mode is enabled on a device, you can run the following command in the terminal to check the status of Tamper protection:

 

 

mdatp health ––field tamper_protection

 

 

The current Tamper Protection mode will be displayed in the tamper protection field. In the following example, the mode is set to “block”.

Figure 4- Tamper protection enabled on block mode

 

 

Where do I see Tamper Protection signals?


Tamper protection signals can be seen in Microsoft 365 Defender portal, via advanced hunting, and in local device logs.

 

Here are several examples of tamper protection in action:

  • Defender for Endpoint agent uninstall is logged (audited)
  • Editing/modification of Defender for Endpoint files are logged (audited)
  • Creation of new files under Defender for Endpoint location is logged (audited)
  • Deletion of Defender for Endpoint files is logged (audited)
  • Renaming of Defender for Endpoint files is logged (audited)
  • Commands to stop the agent failing

 

Figure 5: The following screenshot demonstrates querying for Tampering events via advanced hunting

 

Figure 6: This example shows an integrated Tampering alert in the M365 Defender Security Center portal

 

The logs can also be found locally on the device. Tampering events are logged in the following area: “Library/Logs/Microsoft/mdatp/microsoft_defender_core*.log”


Based on the logs, you can check the status of Tamper Protection using this command:

 

 

sudo grep -F '[{tamperProtection}]: Feature state:' /Library/Logs/Microsoft/mdatp/microsoft_defender_core.log | tail -n 1 

 

 

 

 

 

 

 

Let us know what you think!  

We're excited to hear your feedback on your experience with Tamper Protection on macOS. Feel free to drop a comment if you have any questions or have additional improvement suggestions!

Updated May 19, 2022
Version 2.0

17 Comments

  • mmkholy's avatar
    mmkholy
    Copper Contributor

    giladkeidar Thank you so much for your feedback!
    Are you adding the Tamper protection settings to an existing profile or that's a new profile? the pre-requisites are always the same as explained in the docs, I'd start by creating a new profile for Tamper protection and check again on the endpoint. 

  • giladkeidar's avatar
    giladkeidar
    Brass Contributor

    mmkholy thanks for this article, how ever I was following yours and also https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tamperprotection-macos?view=o365-worldwide#intune and still tamper is disabled (also was able to remove MDE from Mac).

     

    I did found an error in the XML you show in this https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tamperprotection-macos?view=o365-worldwide#intune

    As you see it lack of "<" at the being of first line, I fixed it, policy now show as "success" in Intune but on the device tamper is still disable.

     

    any suggestions? could be that some missing requirements in https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tamperprotection-macos?view=o365-worldwide#before-you-begin? maybe it works only for ABM enrolled devices, or a specific profile-name is needed (as with MDE update profile for Mac)?

     

  • mmkholy's avatar
    mmkholy
    Copper Contributor

    BrechtMo Thank you for your feedback!
    Enabling Tamper Protection on macOS is now available through an MDM solution such as MEM or JAMF, so when activating it through "Advanced Features" will enable it only on Windows devices.

  • mmkholy's avatar
    mmkholy
    Copper Contributor

    wlawn001 Thank you so much for your feedback, and that's a great point that you've brought, indeed we are working on enabling SCID on Tamper Protection for macOS.

  • Reza_Ameri's avatar
    Reza_Ameri
    Silver Contributor

    This is very valuable feature in Windows and glad to see it in the MacOS too.

    However, I still advise end users to consider Windows for better in depth protection.

  • BrechtMo's avatar
    BrechtMo
    Copper Contributor

    What happens if you have "Tamper protection" enabled tenant-wide in "Advanced features"? Will it be enforced automatically?

  • wlawn001's avatar
    wlawn001
    Copper Contributor

    Thanks for a great article.  I have a question concerning tamper protection on a Mac and advanced hunting.  Is there a SCID associated with enabling tamper protection on a Mac?  I believe that SCID-2003 - Turn on Tamper Protection - is only for Windows devices.  Will a new SCID be added for tamper protection on the Mac?