Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

12/5/2019
10:55 AM
50%
50%

Microsoft Defender ATP Brings EDR Capabilities to macOS

Mac computers will now have the option to use Microsoft Defender Advanced Threat Protection's endpoint and detection response.

Microsoft has made its Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR) capabilities available for the Mac operating system, officials confirmed this week, bringing more comprehensive security tools to non-Microsoft platforms.

Back in March, Microsoft debuted Defender ATP for Mac with new antivirus capabilities. This let enterprise customers strengthen Mac security, get Mac computers onboarded in the same portal as Windows devices, and expand dashboard visibility to include macOS-related alerts. The new EDR support announced today brings more detailed context to security detections.

Additional capabilities include a machine timeline, which contains information about process creation, network connections, and file creations. Microsoft's advanced hunting tool lets users conduct free-form investigations using a powerful query engine and growing set of shared queries. Users can search for threats across macOS devices using up to 30 days of raw data.

Microsoft notes much of the investigation experience, including the hyperlinked exploration between monitored entities (files, processes, network connections, alerts), is the same on Mac machines as it is on Windows computers. Monitored entities can be explored on Mac devices.

This marks the latest step in Microsoft Defender ATP for Mac; Microsoft plans to continue expanding its capabilities to non-Windows platforms.

Read more details here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "A Cause You Care About Needs Your Cybersecurity Help."

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
howard909
50%
50%
howard909,
User Rank: Apprentice
1/31/2020 | 5:18:00 AM
macOS
I read the post and it is really very informative. It is really very good news that mac users will also get the advantage of Microsoft Defender. Also if have any query related to the Mac they can visit Macbook Technical Support and able to solve it by themself.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Data Loss Spikes Under COVID-19 Lockdowns
Seth Rosenblatt, Contributing Writer,  5/28/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10548
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10549
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10546
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10547
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-11094
PUBLISHED: 2020-06-04
The October CMS debugbar plugin before version 3.1.0 contains a feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as ...