

This corresponds to the number of threads used to perform the scan and impacts the CPU usage, as well as the duration of the on-demand scan.Ģ (default). Specifies the degree of parallelism for on-demand scans. Specifies whether to scan archives during on-demand antivirus scans.ĭegree of parallelism for on-demand scans

Scan archives (on-demand antivirus scans only) Enabling this setting triggers an antivirus scan on the running processes of the device.Īvailable in Microsoft Defender for Endpoint version 101.41.10 or higher. Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. SectionĪvailable in Defender for Endpoint version 101.86.81 or higher. For more details, please refer to: Create indicators for files. Note that enabling this feature might impact device performance. On macOS, only the script and Mach-O (32 and 64 bit) files are considered for this hash computation (from engine version 0.2 or higher).

When this feature is enabled, Defender for Endpoint computes hashes for files it scans to enable better matching against the indicator rules. Security intelligence updates are turned on.Īvailable in Microsoft Defender for Endpoint version 101.10.72 or higher.Įnables or disables file hash computation feature.Automatic threat remediation is turned off.Passive ( passive): Runs the antivirus engine in passive mode.On-demand ( on_demand): Files are scanned only on demand.Real-time ( real_time): Real-time protection (scan files as they're accessed) is enabled.There are three values for setting enforcement level: Specifies the enforcement preference of antivirus engine. See the following sections for a description of the dictionary contents. The antivirusEngine section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender for Endpoint. The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender for Endpoint, which are explained in more detail in the next sections. The following sections contain examples of configuration profiles for JAMF and Intune. The layout of the configuration profile depends on the management console that you are using. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences. plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference.
#MICROSOFT 365 FOR MACOS HOW TO#
This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile. Changing the preferences that are set through the configuration profile requires escalated privileges and isn't available for users without administrative permissions.

Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. In enterprise organizations, Microsoft Defender for Endpoint on macOS can be managed through a configuration profile that is deployed by using one of several management tools. To configure Microsoft Defender for Endpoint on macOS using the command-line interface, see Resources. This article contains instructions for how to set preferences for Microsoft Defender for Endpoint on macOS in enterprise organizations.
