rahuljindalmyit.blogspot.com
Open in
urlscan Pro
2a00:1450:4001:800::2001
Public Scan
Submitted URL: https://sendfox.com/trk/click/8kog49wq/qo4evv
Effective URL: https://rahuljindalmyit.blogspot.com/2023/12/create-and-manage-microsoft-defender.html?utm_source=sendfox&utm_medium=email&utm_campai...
Submission: On December 28 via manual from GB — Scanned from GB
Effective URL: https://rahuljindalmyit.blogspot.com/2023/12/create-and-manage-microsoft-defender.html?utm_source=sendfox&utm_medium=email&utm_campai...
Submission: On December 28 via manual from GB — Scanned from GB
Form analysis
1 forms found in the DOMhttps://rahuljindalmyit.blogspot.com/search
<form action="https://rahuljindalmyit.blogspot.com/search" target="_top">
<div class="search-input">
<input aria-label="Search this blog" autocomplete="off" name="q" placeholder="Search this blog" value="">
</div>
<input class="search-action flat-button" type="submit" value="Search" disabled="">
</form>
Text Content
Skip to main content SEARCH THIS BLOG MODERN DEVICE MANAGEMENT CREATE AND MANAGE MICROSOFT DEFENDER FOR ENDPOINT DEVICE TAGS FOR MACOS - December 15, 2023 I recently worked on an implementation project for Microsoft Defender for Endpoint for macOS devices and while I will love to cover all the bells and whistles involving the setup, for now I will just focus on one particular aspect of the setup i.e. MDE device tags. What is an MDE Device Tag anyway? Tags are used primarily to label and classify devices in an environment. This helps in making the searching easy and streamlining the designating rules to specific groups or categories. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident in Defender. Here are some common uses of device tags - 1. Device Filter - One can be use a filter in the Device inventory view, or to group devices. 2. RBAC - You can create device groups in Defender using tags for the purpose of enforcing Role Based Access Control in the Defender Portal. 3. Device Grouping - You can create device groups in Defender using tags for the purpose of assignments against Web content filtering and Indicators of Compromise rules. 4. Advanced Hunting - You can leverage tag information in Device info schema in Advanced hunting in Defender for reporting and inspect events in your network to locate threat indicators and entities. How to create MDE device tags? There are multiple ways of creating a tag. Manual The manual method involves creating and assigning the tag directly in the Defender Portal. 1. Open Microsoft Defender. 2. Navigate to Assets>Devices 3. Click on the particular macOS device and select Manage tags on the top right. 4. Create the tag as shown below. However, this method is only good if you are dealing with a handful of machines. That is where the next method is more preferable. Automated If you are managing devices using Intune, then you can easily assign tags using an Intune policy. You can either create a configuration file based on .plist preferences or just use Settings catalog. Needless to say, the later is going to be the choice of preference for many. 1. Open Microsoft Intune admin center. 2. Navigate to Devices>macOS>Configuration profiles>Create>Settings Catalog 3. Give a name and search for EDR as shown below. 4. Check Type of tag which will also select Value of tag. Once done, you can give whatever value you want for the tag. Note: Filtering might not work on tag names that contain parenthesis or commas so avoid these characters. 5. Assign the profile to a group of devices as normal. Note: It can take up to 18 hours for the tag information to populate so patience is the key. How & where to verify? First and foremost, check if the Intune profile is applying correctly. Secondly, head over to Defender Portal and see if the tag is populating for your targeted devices or not. You can do this by applying filters. You can also check for device info in advanced hunting on the Defender Portal. Run the following query to get the details. // Get latest information on user/device DeviceInfo | where RegistryDeviceTag has "Intune-macOS-DigitalDesign" Final Thoughts.. Device tags within Microsoft Defender for Endpoint is device tags is a pretty useful feature which in my opinion get overlooked. This functionality allows granular level of control over how an organization can manage their devices. There are other aspects of MDE device tags like RBAC, using API & scripts for automated method of creation of tags which I haven't covered in this blog. However, I do intend to cover them in the coming weeks along with creating MDE device tags for other platforms. Until next time.. Defender for endpoint Intune macos MDE microsoft intune Tags * Get link * Facebook * Twitter * Pinterest * Email * Other Apps COMMENTS POST A COMMENT POPULAR POSTS FROM THIS BLOG HOW TO FORCE ESCROWING OF BITLOCKER RECOVERY KEYS USING INTUNE - June 06, 2021 Every now and then it so happens that BitLocker recovery keys do not escrow in AAD. The usual culprits are incorrect BitLocker policies and\or the device hardware configuration failing to meet the minimum requirements. The other scenario and something I recently experienced is when everything is setup right and still the recovery key doesn’t escrow in AAD. As I understand, this can happen if the escrow process got interrupted the first time due to network or local devices related issues and the process could not resume. To circumvent this issue, one can simply push a PowerShell script to the devices to force the escrow of the recovery keys to AAD. Here is a script to do so. try{ $BitlockerVol = Get-BitLockerVolume -MountPoint $env:SystemDrive $KPID="" foreach($KP in $BitlockerVol.KeyProtector){ if($KP.KeyProtectorType -eq "RecoveryPassword"){ $KPID=$KP.KeyProtectorId break; } } $o Read more INTUNE: CONFIGURE PRINTERS FOR NON-ADMINISTRATIVE USERS - January 04, 2021 Configuring printers for end users or giving them the ability to do it themselves is a normal requirement for organizations. Now if your users are Administrators, then the configuration can be straight forward, but in case of Non-Administrators there are additional steps required as Non-Administrators will not be able to add a driver in the driver store despite being able to install a printer. In this blog, I will cover the steps that I took to address this requirement using Intune. The setup involves 2 steps - 1. Setup registries. 2. Install the driver and configure the printer Setting up registries – The registries that need to be configured are actually part of a GPO setting – Allow non-administrators to install drivers for these device setup classes It can be found under: Computer Configuration -> Policies -> Administrative Templates -> System -> Driver Installation I used a Powershell script to set the values and wrapped it in a Win32 application. $Path1 Read more HOW TO WHITELIST APPS USING APPLOCKER IN INTUNE - January 29, 2021 Windows AppLocker is a technology that has been around since Windows 7 days. In enterprise environments, it is typically configured via Group Policy, however one can leverage the XML it creates to easily build your own custom policies that perform many of the same tasks with Microsoft Intune. The only thing that one needs to be mindful of is whether you want to Deny or Allow access to a list of executables. Each of the methods have their own advantages and disadvantages, but with Allow (Whitelisting), one needs to apply extra caution as it can result in breaking of the system and cause all sort of functionality issues. I implemented a whitelist applocker policy in 2020, but never blogged about it so this is coming straight out of the archives. What all is involved? Identify a list of apps that you want to Whitelist in the XML. Model the policy that you want to implement using AppLocker in Group Policy Editor and export the XML. Use the XML to create a custom Windows 10 Device Co Read more Powered by Blogger Theme images by Bim Rahul Jindal Rahul is an IT Professional with over 17+ years of rich IT experience. He is a Microsoft MVP in Enterprise Mobility and an Ex MVP in Security. He is currently working with Ergo Group as a Senior Consultant and specializes in Microsoft Intune, Configuration Manager and Cloud Security. He is a community expert in Microsoft Learn, Techcommunity and also an avid blogger covering various areas of Modern Device Management. Visit profile ARCHIVE * 2023 30 * December 2 * New Microsoft Defender app and bulk tagging for iO... * Create and manage Microsoft Defender for Endpoint ... * November 2 * October 3 * September 4 * August 3 * July 1 * June 4 * May 3 * April 3 * February 3 * January 2 * 2022 42 * November 2 * October 1 * September 4 * August 3 * July 4 * June 1 * May 3 * April 6 * March 7 * February 7 * January 4 * 2021 39 * December 1 * November 2 * October 3 * September 6 * August 5 * July 5 * June 3 * May 3 * April 3 * March 2 * February 2 * January 4 * 2020 10 * December 3 * November 4 * October 1 * July 2 * 2019 4 * November 1 * October 1 * March 2 Show more Show less LABELS * 7-zip * Account Protection * additional context * admin portal * Administrative templates * Administrative Unit * admx * Android * APP * App Configuration * Apple * Application guard * Applocker * ASR * Attack Surface Reduction * audit logs * authentication context * authenticator lite * Autopilot * Azure * Azure AD * Azure Ad authentication methods * Azure Ad dynamic groups * Azure Azure AD * Azure Blob * azure sign-in * Baseline * Bitlocker * Browser * Browser extensions * Browser settings * byod * Catalog * CB * Certificate * Citrix * Cloud Management Gateway * CloudProtection * CMG * CMPivot * Co-management * Company Portal * Compliance * Compliance Settings * Conditional Access * Condtional Access * ConfigMgr * ConfigMgr CB 1902 * Controlled Folder Access * CSP * csv * Current Branch * Custom Office Templates * Custom Role * Customizations * CVE-2022-29072 * Defender ATP * Defender for endpoint * dem * Desktop icons * Device Actions * device administrator * device enrollment * device enrollment managers * Device Policy Controller * DPC * Edge * EDR * Endpoint Analytics * Endpoint Security * Enterprise Application * Entra * entra id * ESP * Exchange online * filter for devices * Filters * Firewall * fraud * Google * Google Chrome * GPO * gps coordinates * group policy analytics * HWHashID * hyper-v * Identity Access * identity governance * Identity Protection * IEMode * Indicators * Inplace Upgrade * Internet Explorer * Intune * iOS * jit * json * Known Folder Move * LAPS * Lenovo * local groups * LocalAdminAccount * macos * Macro * MAM * MDE * MDM * MDT * MEM * MEMCM * Mempowered * mfa * mfa fatigue * microsoft 365 admin portal * Microsoft 365 Apps * microsoft authenticator * microsoft entra id * Microsoft GraphAPI * microsoft intune * Microsoft Store * MS15-011 * multifactor * named location * NAT * NetworkProtection * nudge * number matching * OEM * Office * OMA-URI * OneDrive * outook mobile * password protection * passwordless * Patching * PGP * Phishing * phishing resistant * pim * Powershell * preprovisioning * Printers * Privileged Identity Management * Proactive Remediation Scripts * protected actions * PXE * ransomware * RBAC * RDS * registration campaign * Resource Groups * Safe Browsing * SCCM * Schedule Tasks * Security * Servicing Profiles * Settings * Settings Catalog * sign-in frequency * smart lockout * SmartScreen * SMB Signing * Software Update Point * sophos * SPN * SQL * SSPR * SSRS * Start menu * SUP * Symantec * Symantec Encryption Desktop * Tags * TAP * Temporary Access Pass * Tenant attach * Update Ring * Url shortcuts * USB * VBS * Vulnerabilities * WaaS * WDS * web clip * Web Content Filtering * WHfB * whiteglove * Whitelist * Win32 * Windows 10 * Windows 11 * Windows Autopilot * Windows Defender * Windows Hello for Business * Windows LAPS * Windows365 * Windows365CloudPC * winget * XML Show more Show less This site uses cookies from Google to deliver its services and to analyse traffic. Your IP address and user agent are shared with Google, together with performance and security metrics, to ensure quality of service, generate usage statistics and to detect and address abuse.Learn moreOk