Microsoft Defender ATP for Mac - EDR in Public Preview

Published 11-06-2019 11:39 AM 23.1K Views
Microsoft

EDR capabilities in Microsoft Defender ATP for Mac now available for preview

 

Update: EDR capabilities for macOS are generally available as of December 2019. 

 

At Microsoft, we’re committed to building security solutions not just for Microsoft but also from Microsoft. We know that customers have complex and heterogenous environments running multiple applications, multiple clouds, and multiple platforms. Today, the Microsoft Defender ATP team is proud to announce the public preview availability of endpoint detection and response (EDR) capabilities on macOS devices.

 

Microsoft Defender ATP for Mac currently includes preventive antivirus capabilities and reporting via Microsoft Defender Security Center. With the new EDR capabilities, Microsoft Defender ATP customers will have the ability to detect advanced attacks that involve macOS devices, utilize rich investigation experiences, and quickly remediate threats.

 

EDR-Mac Public 1.png

 

 

 

We’ve been working closely with design partners and several customers on this post-breach component of the platform in private preview. Today, we invite you to experience the new capability, with these benefits:

 

  1. Rich investigation experience – including machine timeline, process creation, file creation, network connections and, of course, the popular Advanced Hunting.
  2. Optimized performance – enhanced CPU utilization in compilation procedures and large software deployments.
  3. In-context AV detections – just like with Windows, get insight into where a threat came from and how the malicious process or activity was created.

If you’re already running Microsoft Defender ATP for Mac, we recommend that you configure some of your macOS machines to Insider Mode and try the suggested simple scenario below. If this is the first time you deploy Microsoft Defender ATP for Mac, learn how to install and configure, and then enable the Insider Mode.  

 

Experience Microsoft Defender ATP for Mac EDR with simulated attack

The following steps simulate a detection scenario on a macOs machine. Follow the steps, try to investigate the case, and give us feedback.

  1. Verify that the onboarded macOS machine appears in Microsoft Defender Security Center. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears. 
  2. Download and extract the file from here (filename: MDATP MacOS DIY.zip) to an onboarded macOS machine. Note: If the device is running macOS Catalina and was onboarded manually, you may need to take a few more steps. In macOS Catalina you must explicitly allow full disk access to monitor built-in directories. To enable access, follow instructions here.
  3. After a few minutes, the following alert should be raised in Microsoft Defender Security Center.
  4.  Look at the alert details, machine timeline, and perform the regular investigation steps.

EDR-Mac Public 2.png

 

Note: A prerequisite for this scenario in macOS Catalina is to enable full disk access. Learn how to do it here.

 

Performance

We have optimized CPU utilization in compilation procedures and large software deployments, and we invite customers to give us feedback on performance. Please refer to the Performance measurement documentation [PDF] for more details.

 

Help us innovate Microsoft Defender ATP for Mac

We are extremely excited to deliver this new milestone today. We value customer feedback. Join us as we continue to enhance Microsoft Defender ATP for Mac. Try out the EDR capabilities and use the feedback mechanism in the Microsoft Defender Security Center or join the discussion below to share your thoughts.

 

 

 

 
 
8 Comments
Contributor

You guys are amazing to introduce new capabilities in security layer for all EUC device (Including MacBook!).

Any idea to release antivirus solution(ATP for Mobile !!) for iOS from Microsoft! 

Microsoft

Thanks!

 

We will update regarding cross-platform support plans here too.

 

 

Visitor

hi, could you tell the date of stable version? 

Microsoft

@pepe26262 ,

 

Well, the Mac AV support was announced as Generally Available on June 2019 and the EDR support was announced on December 2019.

 

Thanks,

Dan

 

 

New Contributor

For EDR is Insider channel and "enabled preview features" still required to enabled the feature?

Microsoft

@Tsachev - EDR capabilities for macOS are now generally available, so you don't need to enable preview features (unless you would like to so that you can have access to other preview capabilities). 

New Contributor

Thanks, seems KB is outdated in this case.

New Contributor

Ref. KB  would like to see the updated command syntax

EDRTurn on/off EDR preview for Macmdatp edr early-preview [enabled/disabled]
%3CLINGO-SUB%20id%3D%22lingo-sub-1000623%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1000623%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20guys%20are%20amazing%20to%20introduce%20new%20capabilities%20in%20security%20layer%20for%20all%20EUC%20device%20(Including%20MacBook!).%3C%2FP%3E%3CP%3EAny%20idea%20to%20release%20antivirus%20solution(ATP%20for%20Mobile%20!!)%20for%20iOS%20from%20Microsoft!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1001213%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1001213%22%20slang%3D%22en-US%22%3E%3CP%3EThanks!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20will%20update%20regarding%20cross-platform%20support%20plans%20here%20too.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1473620%22%20slang%3D%22fr-FR%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1473620%22%20slang%3D%22fr-FR%22%3E%3CP%3Ehi%2C%20could%20you%20tell%20the%20date%20of%20stable%20version%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1479233%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1479233%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F510381%22%20target%3D%22_blank%22%3E%40pepe26262%3C%2FA%3E%26nbsp%3B%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWell%2C%20the%20Mac%20AV%20support%20was%20announced%20as%20Generally%20Available%20on%20June%202019%20and%20the%20EDR%20support%20was%20announced%20on%20December%202019.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%2C%3C%2FP%3E%0A%3CP%3EDan%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-985879%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-985879%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20size%3D%226%22%3EEDR%20capabilities%20in%20Microsoft%20Defender%20ATP%20for%20Mac%3CSTRONG%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3Enow%20available%20for%20preview%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAt%20Microsoft%2C%20we%E2%80%99re%20committed%20to%20building%20security%20solutions%20not%20just%20%3CEM%3Efor%3C%2FEM%3E%20Microsoft%20but%20also%20%3CEM%3Efrom%3C%2FEM%3E%20Microsoft.%20We%20know%20that%20customers%20have%20complex%20and%20heterogenous%20environments%20running%20multiple%20applications%2C%20multiple%20clouds%2C%20and%20multiple%20platforms.%20Today%2C%20the%20Microsoft%20Defender%20ATP%20team%20is%20proud%20to%20announce%20the%20public%20preview%20availability%20of%20endpoint%20detection%20and%20response%20(EDR)%20capabilities%20on%20macOS%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20for%20Mac%20currently%20includes%20%3CU%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Defender-ATP%2FAnnouncing-Microsoft-Defender-ATP-for-Mac%2Fba-p%2F378010%22%20target%3D%22_blank%22%3Epreventive%20antivirus%20capabilities%3C%2FA%3E%3C%2FU%3E%20and%20reporting%20via%20Microsoft%20Defender%20Security%20Center.%20With%20the%20new%20EDR%20capabilities%2C%20Microsoft%20Defender%20ATP%20customers%20will%20have%20the%20ability%20to%20detect%20advanced%20attacks%20that%20involve%20macOS%20devices%2C%20utilize%20rich%20investigation%20experiences%2C%20and%20quickly%20remediate%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22EDR-Mac%20Public%201.png%22%20style%3D%22width%3A%20939px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155384i9C00C20A46DFD7CB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22EDR-Mac%20Public%201.png%22%20alt%3D%22EDR-Mac%20Public%201.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99ve%20been%20working%20closely%20with%20design%20partners%20and%20several%20customers%20on%20this%20post-breach%20component%20of%20the%20platform%20in%20private%20preview.%20Today%2C%20we%20invite%20you%20to%20experience%20the%20new%20capability%2C%20with%20these%20benefits%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CU%3ERich%20investigation%20experience%3C%2FU%3E%26nbsp%3B%E2%80%93%20including%20machine%20timeline%2C%20process%20creation%2C%20file%20creation%2C%20network%20connections%20and%2C%20of%20course%2C%20the%20popular%20Advanced%20Hunting.%3C%2FLI%3E%0A%3CLI%3E%3CU%3EOptimized%20performance%3C%2FU%3E%26nbsp%3B%E2%80%93%20enhanced%20CPU%20utilization%20in%20compilation%20procedures%20and%20large%20software%20deployments.%3C%2FLI%3E%0A%3CLI%3E%3CU%3EIn-context%20AV%20detections%20%3C%2FU%3E%E2%80%93%20just%20like%20with%20Windows%2C%20get%20insight%20into%20where%20a%20threat%20came%20from%20and%20how%20the%20malicious%20process%20or%20activity%20was%20created%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%3EIf%20you%E2%80%99re%20already%20running%20Microsoft%20Defender%20ATP%20for%20Mac%2C%20we%20recommend%20that%20you%20configure%20some%20of%20your%20macOS%20machines%20to%20%3CA%20title%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%22%20href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20data-cke-saved-href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%26amp%3Bclcid%3D0x409%22%3EInsider%20Mode%3C%2FA%3E%20and%20try%20the%20suggested%20simple%20scenario%20below.%20If%20this%20is%20the%20first%20time%20you%20deploy%20Microsoft%20Defender%20ATP%20for%20Mac%2C%20learn%20how%20to%20%3CU%3E%3CA%20title%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110362%22%20href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110362%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%20data-cke-saved-href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110362%22%3Einstall%20and%20configure%3C%2FA%3E%3C%2FU%3E%2C%20and%20then%20enable%20the%20%3CU%3E%3CA%20title%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%22%20href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20data-cke-saved-href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2110173%26amp%3Bclcid%3D0x409%22%3EInsider%20Mode%3C%2FA%3E%3C%2FU%3E.%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1852531108%22%20id%3D%22toc-hId-1852531108%22%20id%3D%22toc-hId-1852531108%22%20id%3D%22toc-hId-1852530244%22%3EExperience%20Microsoft%20Defender%20ATP%20for%20Mac%20EDR%20with%20simulated%20attack%3C%2FH2%3E%0A%3CP%3EThe%20following%20steps%20simulate%20a%20detection%20scenario%20on%20a%20macOs%20machine.%20Follow%20the%20steps%2C%20try%20to%20investigate%20the%20case%2C%20and%20give%20us%20feedback.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EVerify%20that%20the%20onboarded%20macOS%20machine%20appears%20in%20Microsoft%20Defender%20Security%20Center.%20If%20this%20is%20the%20first%20onboarding%20of%20the%20machine%2C%20it%20can%20take%20up%20to%2020%20minutes%20until%20it%20appears.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EDownload%20and%26nbsp%3Bextract%26nbsp%3Bthe%20file%20from%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmdatpmacosdiy%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3E%3CU%3Ehere%3C%2FU%3E%3C%2FA%3E%26nbsp%3B(filename%3A%20%3CEM%3EMDATP%20MacOS%20DIY.zip%3C%2FEM%3E)%20to%20an%20onboarded%20macOS%20machine.%20Note%3A%20If%20the%20device%20is%20running%20macOS%20Catalina%20and%20was%20onboarded%20manually%2C%20you%20may%20need%20to%20take%20a%3CSTRONG%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3Efew%20more%20steps.%20In%20macOS%20Catalina%20you%20must%20explicitly%20allow%20full%20disk%20access%20to%20monitor%20built-in%20directories.%20To%20enable%20access%2C%20follow%20instructions%20%3CSPAN%3E%3CU%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-antivirus%2Fmicrosoft-defender-atp-mac-install-manually%23how-to-allow-full-disk-access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FU%3E%3C%2FSPAN%3E.%3C%2FLI%3E%0A%3CLI%3EAfter%20a%20few%20minutes%2C%20the%20following%20alert%20should%20be%20raised%20in%20Microsoft%20Defender%20Security%20Center.%3C%2FLI%3E%0A%3CLI%3E%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3ELook%20at%20the%20alert%20details%2C%20machine%20timeline%2C%20and%20perform%20the%20regular%20investigation%20steps.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22EDR-Mac%20Public%202.png%22%20style%3D%22width%3A%20939px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155124i0064543F5DF0591C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22EDR-Mac%20Public%202.png%22%20alt%3D%22EDR-Mac%20Public%202.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENote%3A%20A%20prerequisite%20for%20this%20scenario%20in%20macOS%20Catalina%20is%20to%20enable%20full%20disk%20access.%20Learn%20how%20to%20do%20it%20%3CSPAN%3E%3CU%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-antivirus%2Fmicrosoft-defender-atp-mac-install-manually%23how-to-allow-full-disk-access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FU%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--699625853%22%20id%3D%22toc-hId--699625853%22%20id%3D%22toc-hId--699625853%22%20id%3D%22toc-hId--699626717%22%3EPerformance%3C%2FH2%3E%0A%3CP%3EWe%20have%20optimized%20CPU%20utilization%20in%20compilation%20procedures%20and%20large%20software%20deployments%2C%20and%20we%20invite%20customers%20to%20give%20us%20feedback%20on%20performance.%20Please%20refer%20to%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmdatpmacosperfdoc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPerformance%20measurement%20documentation%3C%2FA%3E%3C%2FSPAN%3E%20%5BPDF%5D%20for%20more%20details.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1043184482%22%20id%3D%22toc-hId-1043184482%22%20id%3D%22toc-hId-1043184482%22%20id%3D%22toc-hId-1043183618%22%3EHelp%20us%20innovate%20Microsoft%20Defender%20ATP%20for%20Mac%3C%2FH2%3E%0A%3CP%3EWe%20are%20extremely%20excited%20to%20deliver%20this%20new%20milestone%20today.%20We%20value%20customer%20feedback.%20Join%20us%20as%20we%20continue%20to%20enhance%20Microsoft%20Defender%20ATP%20for%20Mac.%20Try%20out%20the%20EDR%20capabilities%20and%20use%20the%20feedback%20mechanism%20in%20the%20Microsoft%20Defender%20Security%20Center%20or%20join%20the%20discussion%20below%20to%20share%20your%20thoughts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-985879%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EAt%20Microsoft%2C%20we%E2%80%99re%20committed%20to%20building%20security%20solutions%20not%20just%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Efor%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EMicrosoft%20but%20also%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Efr%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Eom%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EMicrosoft%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E.%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EWe%20know%20that%20customers%20have%20complex%20and%20heterogenous%20environments%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Erunning%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Emultiple%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eapplications%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Emultiple%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eclouds%2C%20and%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Emultiple%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Eplatforms.%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EToday%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%2C%20t%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Ehe%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EMicrosoft%20Defender%20ATP%20team%20is%20proud%20to%20announce%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Ethe%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Epublic%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Ep%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Ereview%20availability%20of%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Eendpoint%20detection%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Eand%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Eresponse%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E(%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EEDR%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E)%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ecapabilities%20on%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3EmacOS%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3Edevices%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXW86686609%20BCX7%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXW86686609%20BCX7%22%3E.%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22EOP%20SCXW86686609%20BCX7%22%20data-ccp-props%3D%22%7B%7D%22%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22microsoft-defender-atp-for-mac-edr.png%22%20style%3D%22width%3A%20367px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155417i5C6D4C5E5F79E200%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22microsoft-defender-atp-for-mac-edr.png%22%20alt%3D%22microsoft-defender-atp-for-mac-edr.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-985879%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EEDR%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EmacOS%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2109416%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2109416%22%20slang%3D%22en-US%22%3E%3CP%3EFor%20EDR%20is%20Insider%20channel%20and%20%22enabled%20preview%20features%22%20still%20required%20to%20enabled%20the%20feature%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2110096%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Defender%20ATP%20for%20Mac%20-%20EDR%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2110096%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F572349%22%20target%3D%22_blank%22%3E%40Tsachev%3C%2FA%3E%26nbsp%3B-%20EDR%20capabilities%20for%20macOS%20are%20now%20generally%20available%2C%20so%20you%20don't%20need%20to%20enable%20preview%20features%20(unless%20you%20would%20like%20to%20so%20that%20you%20can%20have%20access%20to%20other%20preview%20capabilities).%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Feb 01 2021 08:56 AM
Updated by: