- Pricing and Availability Star Defender 4 runs on Mac OS X versions 10.4 and 10.5 and requires Pentium 1.83GHz, 512 MB RAM. A single-user license costs $19.95 (USD). A single-user license costs $19.
- OS X systems rarely have anti-viruses installed on them, and the Mac Defender was able to slip through OS X's rather dire malware detecting system and infect systems. Antivirus software isn't.
Star Defender 4 for Mac OS X 1.11 is 100% clean This download (StarDefender4MacDemo.zip) was tested thoroughly and was found 100% clean. Click 'Report Spyware' link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
Applies to:
Important
This article contains instructions for how to set preferences for Microsoft Defender for Endpoint on macOS in enterprise organizations. To configure Microsoft Defender for Endpoint on macOS using the command-line interface, see Resources.
Summary
In enterprise organizations, Microsoft Defender for Endpoint on macOS can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. Changing the preferences that are set through the configuration profile requires escalated privileges and is not available for users without administrative permissions.
This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile.
Configuration profile structure
The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.
Caution
The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.
The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender for Endpoint, which are explained in more detail in the next sections.
Antivirus engine preferences
The antivirusEngine section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender for Endpoint.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | antivirusEngine |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Enable / disable real-time protection
Specify whether to enable real-time protection, which scans files as they are accessed.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | enableRealTimeProtection |
Data type | Boolean |
Possible values | true (default) false |
Enable / disable passive mode
Specify whether the antivirus engine runs in passive mode. Passive mode has the following implications:
- Real-time protection is turned off
- On-demand scanning is turned on
- Automatic threat remediation is turned off
- Security intelligence updates are turned on
- Status menu icon is hidden
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | passiveMode |
Data type | Boolean |
Possible values | false (default) true |
Comments | Available in Microsoft Defender for Endpoint version 100.67.60 or higher. |
Exclusion merge policy
Specify the merge policy for exclusions. This can be a combination of administrator-defined and user-defined exclusions (merge
) or only administrator-defined exclusions (admin_only
). This setting can be used to restrict local users from defining their own exclusions.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | exclusionsMergePolicy |
Data type | String |
Possible values | merge (default) admin_only |
Comments | Available in Microsoft Defender for Endpoint version 100.83.73 or higher. |
Scan exclusions
Specify entities excluded from being scanned. Exclusions can be specified by full paths, extensions, or file names.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | exclusions |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Type of exclusion
Specify content excluded from being scanned by type.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | $type |
Data type | String |
Possible values | excludedPath excludedFileExtension excludedFileName |
Path to excluded content
Specify content excluded from being scanned by full file path.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | path |
Data type | String |
Possible values | valid paths |
Comments | Applicable only if $type is excludedPath |
Path type (file / directory)
Indicate if the path property refers to a file or directory.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | isDirectory |
Data type | Boolean |
Possible values | false (default) true |
Comments | Applicable only if $type is excludedPath |
File extension excluded from the scan
Specify content excluded from being scanned by file extension.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | extension |
Data type | String |
Possible values | valid file extensions |
Comments | Applicable only if $type is excludedFileExtension |
Process excluded from the scan
Specify a process for which all file activity is excluded from scanning. The process can be specified either by its name (e.g. cat
) or full path (e.g. /bin/cat
).
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | name |
Data type | String |
Possible values | any string |
Comments | Applicable only if $type is excludedFileName |
Allowed threats
Specify threats by name that are not blocked by Defender for Endpoint on Mac. These threats will be allowed to run.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | allowedThreats |
Data type | Array of strings |
Disallowed threat actions
Restricts the actions that the local user of a device can take when threats are detected. The actions included in this list are not displayed in the user interface.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | disallowedThreatActions |
Data type | Array of strings |
Possible values | allow (restricts users from allowing threats) restore (restricts users from restoring threats from the quarantine) |
Comments | Available in Microsoft Defender for Endpoint version 100.83.73 or higher. |
Threat type settings
Specify how certain threat types are handled by Microsoft Defender for Endpoint on macOS.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | threatTypeSettings |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Threat type
Specify threat types.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | key |
Data type | String |
Possible values | potentially_unwanted_application archive_bomb |
Action to take
Specify what action to take when a threat of the type specified in the preceding section is detected. Choose from the following options:
- Audit: your device is not protected against this type of threat, but an entry about the threat is logged.
- Block: your device is protected against this type of threat and you are notified in the user interface and the security console.
- Off: your device is not protected against this type of threat and nothing is logged.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | value |
Data type | String |
Possible values | audit (default) block off |
Threat type settings merge policy
Specify the merge policy for threat type settings. Atone (2019) mac os. This can be a combination of administrator-defined and user-defined settings (merge
) or only administrator-defined settings (admin_only
). This setting can be used to restrict local users from defining their own settings for different threat types.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | threatTypeSettingsMergePolicy |
Data type | String |
Possible values | merge (default) admin_only |
Comments | Available in Microsoft Defender for Endpoint version 100.83.73 or higher. |
Antivirus scan history retention (in days)
Specify the number of days that results are retained in the scan history on the device. Old scan results are removed from the history. Old quarantined files that are also removed from the disk.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | scanResultsRetentionDays |
Data type | String |
Possible values | 90 (default). Allowed values are from 1 day to 180 days. |
Comments | Available in Microsoft Defender for Endpoint version 101.07.23 or higher. |
Maximum number of items in the antivirus scan history
Specify the maximum number of entries to keep in the scan history. Entries include all on-demand scans performed in the past and all antivirus detections.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | scanHistoryMaximumItems |
Data type | String |
Possible values | 10000 (default). Allowed values are from 5000 items to 15000 items. |
Comments | Available in Microsoft Defender for Endpoint version 101.07.23 or higher. |
Cloud-delivered protection preferences
Configure the cloud-driven protection features of Microsoft Defender for Endpoint on macOS.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | cloudService |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Enable / disable cloud-delivered protection
Specify whether to enable cloud-delivered protection the device or not. To improve the security of your services, we recommend keeping this feature turned on.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | enabled |
Data type | Boolean |
Possible values | true (default) false |
Diagnostic collection level
Diagnostic data is used to keep Microsoft Defender for Endpoint secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by Microsoft Defender for Endpoint to Microsoft.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | diagnosticLevel |
Data type | String |
Possible values | optional (default) required |
Enable / disable automatic sample submissions
Determines whether suspicious samples (that are likely to contain threats) are sent to Microsoft. You are prompted if the submitted file is likely to contain personal information.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | automaticSampleSubmission |
Data type | Boolean |
Possible values | true (default) false |
Enable / disable automatic security intelligence updates
Determines whether security intelligence updates are installed automatically:
Section | Value |
---|---|
Key | automaticDefinitionUpdateEnabled |
Data type | Boolean |
Possible values | true (default) false |
User interface preferences
Manage the preferences for the user interface of Microsoft Defender for Endpoint on macOS.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | userInterface |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Show / hide status menu icon
Specify whether to show or hide the status menu icon in the top-right corner of the screen.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | hideStatusMenuIcon |
Data type | Boolean |
Possible values | false (default) true |
Show / hide option to send feedback
Specify whether users can submit feedback to Microsoft by going to Help
> Send Feedback
.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | userInitiatedFeedback |
Data type | String |
Possible values | enabled (default) disabled |
Comments | Available in Microsoft Defender for Endpoint version 101.19.61 or higher. |
Endpoint detection and response preferences
Totally finished game (game jam version) mac os. Manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender for Endpoint on macOS.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | edr |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Device tags
Specify a tag name and its value.
- The GROUP tag, tags the device with the specified value. The tag is reflected in the portal under the device page and can be used for filtering and grouping devices.
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | tags |
Data type | Dictionary (nested preference) |
Comments | See the following sections for a description of the dictionary contents. |
Type of tag
Specifies the type of tag
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | key |
Data type | String |
Possible values | GROUP |
Value of tag
Specifies the value of tag
Section | Value |
---|---|
Domain | com.microsoft.wdav |
Key | value |
Data type | String |
Possible values | any string |
Important
- Only one value per tag type can be set.
- Type of tags are unique, and should not be repeated in the same configuration profile.
Recommended configuration profile
To get started, we recommend the following configuration for your enterprise to take advantage of all protection features that Microsoft Defender for Endpoint provides.
The following configuration profile (or, in case of JAMF, a property list that could be uploaded into the custom settings configuration profile) will:
- Enable real-time protection (RTP)
- Specify how the following threat types are handled:
- Potentially unwanted applications (PUA) are blocked
- Archive bombs (file with a high compression rate) are audited to Microsoft Defender for Endpoint logs
- Enable automatic security intelligence updates
- Enable cloud-delivered protection
- Enable automatic sample submission
Property list for JAMF configuration profile
Intune profile
Full configuration profile example
The following templates contain entries for all settings described in this document and can be used for more advanced scenarios where you want more control over Microsoft Defender for Endpoint on macOS.
Property list for JAMF configuration profile
Intune profile
Property list validation
The property list must be a valid .plist file. This can be checked by executing:
If the file is well-formed, the above command outputs OK
and returns an exit code of 0
. Otherwise, an error that describes the issue is displayed and the command returns an exit code of 1
.
Configuration profile deployment
Once you've built the configuration profile for your enterprise, you can deploy it through the management console that your enterprise is using. The following sections provide instructions on how to deploy this profile using JAMF and Intune.
JAMF deployment
From the JAMF console, open Computers > Configuration Profiles, navigate to the configuration profile you'd like to use, then select Custom Settings. Create an entry with com.microsoft.wdav
as the preference domain and upload the .plist produced earlier.
Caution
You must enter the correct preference domain (com.microsoft.wdav
); otherwise, the preferences will not be recognized by Microsoft Defender for Endpoint.
Intune deployment
Open Manage > Device configuration. Select Manage > Profiles > Create Profile.
Choose a name for the profile. Change Platform=macOS to Profile type=Custom. Select Configure.
Save the .plist produced earlier as
com.microsoft.wdav.xml
.Enter
com.microsoft.wdav
as the custom configuration profile name.Open the configuration profile and upload the
com.microsoft.wdav.xml
file. (This file was created in step 3.)Select OK.
Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.
Caution
You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by Microsoft Defender for Endpoint.
Resources
Sweet Home 3D application may run on Windows, Mac OS X 10.4 to macOS 11, Linux and Solaris.
Depending on whether Java is installed on you system or not, you may launch Sweet Home 3D
with Java Web Start or its installer.
Download Sweet Home 3D installer
Sweet Home 3D installer is available under two versions, both bundled with a private copy of Java:
- a free version available at SourceForge.net that comes with 100 pieces of furniture and 26 textures
- a paid version available on the Amazon App Store bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 77.1 MB) | (version 6.5.1 - 228 MB) |
Once downloaded, run the installation program and follow the instructions from the installation wizard.
Ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. If you encounter some problems at Sweet Home 3D launch, please read the FAQ for additional information. |
Sweet Home 3D installer is available under two versions, both bundled with a private copy of Java: Downhill biking mac os.
- a free version available at SourceForge.net bundled with 100 pieces of furniture and 26 textures
- a paid version available on the Microsoft Store, automatically updated and bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 77.1 MB) | (version 6.5.3 - 245 MB) |
Once downloaded, run the installation program and follow the instructions from the installation wizard.
Ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. If you encounter some problems at Sweet Home 3D launch, please read the FAQ for additional information. |
Sweet Home 3D installer is available under two versions:
Star Defender 4 Free
- a free version available at SourceForge.net bundled with 100 pieces of furniture and 26 textures
- a paid version available on the Mac App Store, sandboxed, automatically updated and bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 75 MB) | (version 6.5.3 - 270 MB) |
For the free version, downloadSweetHome3D-6.5.2-macosx.dmg
for Mac OS X 10.8 to macOS 11, orSweetHome3D-6.5.2-macosx-10.4-10.9.dmg
(19.5 MB) for Mac OS X 10.4 to 10.8. Then double-click on the file you'll have downloaded, and runSweet Home 3D
application found in the opened folder. If the system refuses to launch Sweet Home 3D for security reasons, click on its application icon while maintaining the ctrl key pressed, and choose Open in the contextual menu that will appear. To install Sweet Home 3D, drag and drop the application in the folder of your choice.
If you don't want to care about the Java configuration of your system, click on one of the following links to download an all-in-one Sweet Home 3D installer bundled with Java:
Windows installer | - | Mac OS X installer | - | Linux 32-bit installer | - | Linux 64-bit installer |
(77.1 MB) | (75 MB) | (70.9 MB) | (67.6 MB) |
Run the downloaded installation program, and follow the instructions from the installation wizard. |
Under Mac OS X 10.4 to 10.8, download this installer (19.5 MB). |
Uncompress the downloaded file and run SweetHome3D application found in the uncompressed directory, possibly using this tip to launch it with a double click under Ubuntu. To install Sweet Home 3D, move the uncompressed directory in the one of your choice or read this article to create a launcher (see also this subject in the forum). |
Whatever your system is, ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. |
Download Sweet Home 3D with Java Web Start
If Java version 8 is installed on your system, click on the following link to download and launch Sweet Home 3D version 6.5.2 (19.5 MB):
Star Defender 3 Free
Launch Sweet Home 3D with Java Web Start |
Clicking on the previous link will automatically download and launch Sweet Home 3D. |
If Sweet Home 3D loading doesn't start once you clicked on the previous link, click on the SweetHome3D.jnlp downloaded file while maintaining the ctrl key pressed, and choose Open in the contextual menu that will appear. |
Choose to open the SweetHome3D.jnlp downloaded file with javaws program that you'll find in the bin directory of the JRE (Java Runtime Environment). |
If, once started, the download of Sweet Home 3D files by Java Web Start is interrupted, please wait, download should continue after a while. |
To get started, we recommend the following configuration for your enterprise to take advantage of all protection features that Microsoft Defender for Endpoint provides.
The following configuration profile (or, in case of JAMF, a property list that could be uploaded into the custom settings configuration profile) will:
- Enable real-time protection (RTP)
- Specify how the following threat types are handled:
- Potentially unwanted applications (PUA) are blocked
- Archive bombs (file with a high compression rate) are audited to Microsoft Defender for Endpoint logs
- Enable automatic security intelligence updates
- Enable cloud-delivered protection
- Enable automatic sample submission
Property list for JAMF configuration profile
Intune profile
Full configuration profile example
The following templates contain entries for all settings described in this document and can be used for more advanced scenarios where you want more control over Microsoft Defender for Endpoint on macOS.
Property list for JAMF configuration profile
Intune profile
Property list validation
The property list must be a valid .plist file. This can be checked by executing:
If the file is well-formed, the above command outputs OK
and returns an exit code of 0
. Otherwise, an error that describes the issue is displayed and the command returns an exit code of 1
.
Configuration profile deployment
Once you've built the configuration profile for your enterprise, you can deploy it through the management console that your enterprise is using. The following sections provide instructions on how to deploy this profile using JAMF and Intune.
JAMF deployment
From the JAMF console, open Computers > Configuration Profiles, navigate to the configuration profile you'd like to use, then select Custom Settings. Create an entry with com.microsoft.wdav
as the preference domain and upload the .plist produced earlier.
Caution
You must enter the correct preference domain (com.microsoft.wdav
); otherwise, the preferences will not be recognized by Microsoft Defender for Endpoint.
Intune deployment
Open Manage > Device configuration. Select Manage > Profiles > Create Profile.
Choose a name for the profile. Change Platform=macOS to Profile type=Custom. Select Configure.
Save the .plist produced earlier as
com.microsoft.wdav.xml
.Enter
com.microsoft.wdav
as the custom configuration profile name.Open the configuration profile and upload the
com.microsoft.wdav.xml
file. (This file was created in step 3.)Select OK.
Select Manage > Assignments. In the Include tab, select Assign to All Users & All devices.
Caution
You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by Microsoft Defender for Endpoint.
Resources
Sweet Home 3D application may run on Windows, Mac OS X 10.4 to macOS 11, Linux and Solaris.
Depending on whether Java is installed on you system or not, you may launch Sweet Home 3D
with Java Web Start or its installer.
Download Sweet Home 3D installer
Sweet Home 3D installer is available under two versions, both bundled with a private copy of Java:
- a free version available at SourceForge.net that comes with 100 pieces of furniture and 26 textures
- a paid version available on the Amazon App Store bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 77.1 MB) | (version 6.5.1 - 228 MB) |
Once downloaded, run the installation program and follow the instructions from the installation wizard.
Ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. If you encounter some problems at Sweet Home 3D launch, please read the FAQ for additional information. |
Sweet Home 3D installer is available under two versions, both bundled with a private copy of Java: Downhill biking mac os.
- a free version available at SourceForge.net bundled with 100 pieces of furniture and 26 textures
- a paid version available on the Microsoft Store, automatically updated and bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 77.1 MB) | (version 6.5.3 - 245 MB) |
Once downloaded, run the installation program and follow the instructions from the installation wizard.
Ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. If you encounter some problems at Sweet Home 3D launch, please read the FAQ for additional information. |
Sweet Home 3D installer is available under two versions:
Star Defender 4 Free
- a free version available at SourceForge.net bundled with 100 pieces of furniture and 26 textures
- a paid version available on the Mac App Store, sandboxed, automatically updated and bundled with 1500 pieces of furniture and 418 textures.
(version 6.5.2 - 75 MB) | (version 6.5.3 - 270 MB) |
For the free version, downloadSweetHome3D-6.5.2-macosx.dmg
for Mac OS X 10.8 to macOS 11, orSweetHome3D-6.5.2-macosx-10.4-10.9.dmg
(19.5 MB) for Mac OS X 10.4 to 10.8. Then double-click on the file you'll have downloaded, and runSweet Home 3D
application found in the opened folder. If the system refuses to launch Sweet Home 3D for security reasons, click on its application icon while maintaining the ctrl key pressed, and choose Open in the contextual menu that will appear. To install Sweet Home 3D, drag and drop the application in the folder of your choice.
If you don't want to care about the Java configuration of your system, click on one of the following links to download an all-in-one Sweet Home 3D installer bundled with Java:
Windows installer | - | Mac OS X installer | - | Linux 32-bit installer | - | Linux 64-bit installer |
(77.1 MB) | (75 MB) | (70.9 MB) | (67.6 MB) |
Run the downloaded installation program, and follow the instructions from the installation wizard. |
Under Mac OS X 10.4 to 10.8, download this installer (19.5 MB). |
Uncompress the downloaded file and run SweetHome3D application found in the uncompressed directory, possibly using this tip to launch it with a double click under Ubuntu. To install Sweet Home 3D, move the uncompressed directory in the one of your choice or read this article to create a launcher (see also this subject in the forum). |
Whatever your system is, ensure that the latest version of the drivers of your video card is installed, to get the best performances in Sweet Home 3D. |
Download Sweet Home 3D with Java Web Start
If Java version 8 is installed on your system, click on the following link to download and launch Sweet Home 3D version 6.5.2 (19.5 MB):
Star Defender 3 Free
Launch Sweet Home 3D with Java Web Start |
Clicking on the previous link will automatically download and launch Sweet Home 3D. |
If Sweet Home 3D loading doesn't start once you clicked on the previous link, click on the SweetHome3D.jnlp downloaded file while maintaining the ctrl key pressed, and choose Open in the contextual menu that will appear. |
Choose to open the SweetHome3D.jnlp downloaded file with javaws program that you'll find in the bin directory of the JRE (Java Runtime Environment). |
If, once started, the download of Sweet Home 3D files by Java Web Start is interrupted, please wait, download should continue after a while. |
Other downloads
Depending on your needs, you may also download the following files proposed in the Sweet Home 3D Download section on SourceForge.net:
3D models libraries | Each zipped file of the section SweetHome3D-models contains a double-clickable SH3F file describing additional 3D models created by contributors for the furniture catalog of Sweet Home 3D. Read Libraries of 3D models section for more information. |
Textures libraries | Each zipped file of the section SweetHome3D-textures contains a double-clickable SH3T file describing additional textures created by contributors for the textures catalog of Sweet Home 3D. |
Furniture Library Editor (10.8 MB) | This double-clickable JAR file launches the Furniture Library Editor under Windows, Mac OS X and Linux systems with Java installed. Like the Furniture import wizard, this application lets you quickly create a SH3F file and edit the properties of the 3D models it contains. |
Textures Library Editor (1.1 MB) | This double-clickable JAR file launches the Textures Library Editor under any system with Java installed. Like the Textures import wizard, this application lets you easily create a SH3T file and edit the properties of the texture images it contains. |
Sweet Home 3D JS Viewer (3.2 MB) | This archive contains the files of a HTML5 / WebGL Canvas you can upload on your web site to display the 3D view of a Sweet Home 3D file. Read the README.TXT file included in this archive for instructions about installation process. |
Sweet Home 3D portable (351 MB) | This 7-zip archive contains Sweet Home 3D applications for 32-bit and 64-bit Windows, Mac OS X, 32-bit and 64-bit Linux, bundled with the Java environments required to execute them. Once you uncompressed this archive in a given folder (on a hard disk or a USB key), you can move this folder or the USB key where you copied it to use Sweet Home 3D on another computer, without losing software configuration. |
Sweet Home 3D executable jar (25.5 MB) | This double-clickable JAR file launches Sweet Home 3D under Windows, Mac OS X and Linux systems with Java installed. It's not the preferred option to run Sweet Home 3D because you won't get association with Sweet Home 3D files, and depending on the Java version you use, it could use 96 MB of memory at maximum, which is too small to create middle sized homes. This JAR file is useful for plug-ins developers and advanced users who wants to run Sweet Home 3D with customized Java options (like the -Xmx Java option that lets you choose the maximum memory size used by Java). |
Sweet Home 3D installers | The SweetHome3D section contains the installers of Sweet Home 3D for all the supported operating systems and all the released versions up to the current version 6.5.2. |
Sweet Home 3D source (27.6 MB) | This archive contains the source files used to build Sweet Home 3D. Sources are useful to developers who want to contribute to the development of Sweet Home 3D and its plug-ins. Note that source files may be browsed on-line too with the web-based CVS repository viewer provided by SourceForge.net. |
Sweet Home 3D javadoc (2.5 MB) | This archive contains the developer's javadoc built from the source files of Sweet Home 3D. Javadoc is useful for developers only. Note that the javadoc may be browsed on-line here. |
© Copyright 2006-2021 eTeks - All rights reserved |