You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-onboard-devices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: overview
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 06/19/2024
12
+
ms.date: 12/12/2024
13
13
ms.reviewer: efratka, nehabha, muktaagarwal
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -274,7 +274,7 @@ After a device is enrolled in Intune, you can add it to a device group. [Learn m
274
274
## Servers
275
275
276
276
> [!NOTE]
277
-
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
277
+
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-server-endpoints.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: denisebmsft
7
7
ms.author: deniseb
8
8
ms.reviewer: pahuijbr
9
9
ms.localizationpriority: medium
10
-
ms.date: 05/20/2024
10
+
ms.date: 12/13/2024
11
11
manager: deniseb
12
12
audience: ITPro
13
13
ms.collection:
@@ -23,12 +23,8 @@ ms.subservice: onboard
23
23
24
24
**Applies to:**
25
25
26
-
- Windows Server 2016 and Windows Server 2012 R2
27
-
- Windows Server Semi-Annual Enterprise Channel
28
-
- Windows Server 2019 and later
29
-
- Windows Server 2019 core edition
30
-
- Windows Server 2022
31
-
-[Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
26
+
- Microsoft Defender for Endpoint Server
27
+
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
32
28
33
29
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configserver-abovefoldlink)
34
30
@@ -44,7 +40,7 @@ For guidance on how to download and use Windows Security Baselines for Windows s
44
40
45
41
You'll need to complete the following general steps to successfully onboard servers.
46
42
47
-
:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices" lightbox="media/server-onboarding-tools-methods.png":::
43
+
:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices.":::
48
44
49
45
> [!NOTE]
50
46
> Windows Hyper-V Server editions are not supported.
@@ -56,7 +52,7 @@ Microsoft Defender for Endpoint integrates seamlessly with Microsoft Defender fo
56
52
> [!NOTE]
57
53
> For Windows Server 2016 and Windows Server 2012 R2, you can either manually install/upgrade the modern, unified solution on these machines, or use the integration to automatically deploy or upgrade servers covered by your respective Microsoft Defender for Server plan. More information about making the switch at [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows#enable-the-integration).
58
54
>
59
-
- When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
55
+
> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
60
56
>
61
57
> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data is stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
62
58
> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
@@ -235,7 +231,7 @@ This script can be used in various scenarios, including those scenarios describe
235
231
8. Go to the **Actions** tab and select **New...** Ensure that **Start a program** is selected in the **Action** field. The [installer script](server-migration.md#installer-script) handles the installation, and immediately perform the onboarding step after installation completes. Select *C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe* then provide the arguments:
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-strategy.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: conceptual
14
14
ms.subservice: onboard
15
15
search.appverid: met150
16
-
ms.date: 04/03/2024
16
+
ms.date: 12/12/2024
17
17
---
18
18
19
19
# Identify Defender for Endpoint architecture and deployment method
@@ -30,7 +30,7 @@ If you're already completed the steps to set up your Microsoft Defender for Endp
30
30
31
31
We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps:
|**Windows servers<br/>Linux servers**<br/>(Requires a server license) |[Onboard Windows devices using a local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md)|
|**Linux servers**|[Local script](linux-install-manually.md) <br/> [Puppet](linux-install-with-puppet.md) <br/> [Ansible](linux-install-with-ansible.md) <br/> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/> [Saltstack](linux-install-with-saltack.md)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)|
> For devices that aren't managed by Microsoft Intune or Microsoft Configuration Manager, you can use the Security Management for Microsoft Defender for Endpoint to receive security configurations for Microsoft Defender directly from Intune.
61
61
62
62
## Next step
63
63
64
64
After choosing your Defender for Endpoint architecture and deployment method continue to [Step 4 - Onboard devices](onboarding.md).
65
+
65
66
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,11 @@ ms.date: 10/11/2024
22
22
23
23
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
24
24
25
+
**Applies to**:
26
+
27
+
- Microsoft Defender for Endpoint Server
28
+
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29
+
25
30
Before you begin: Install unzip if it's not already installed.
26
31
27
32
The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29
+
25
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
26
31
27
32
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
77
82
78
83
> [!NOTE]
79
-
For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
84
+
> For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
80
85
81
86
## How to configure the list of exclusions
82
87
83
88
### Using the management console
84
89
85
90
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
91
+
86
92
```JSON
87
93
{
88
94
"exclusionSettings":{
@@ -161,7 +167,7 @@ Examples:
161
167
mdatp exclusion extension remove --name .txt
162
168
```
163
169
164
-
```Output
170
+
```console
165
171
Extension exclusion removed successfully
166
172
```
167
173
@@ -198,6 +204,7 @@ Examples:
198
204
```console
199
205
File exclusion removed successfully"
200
206
```
207
+
201
208
- Add/Remove an exclusion for a folder:
202
209
203
210
```bash
@@ -216,7 +223,7 @@ Examples:
216
223
Folder exclusion removed successfully
217
224
```
218
225
219
-
```bash
226
+
```bash
220
227
mdatp exclusion folder add --path /var/log/ --scope global
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29
+
25
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
26
31
27
32
> [!TIP]
@@ -223,14 +228,16 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
223
228
- Install the Microsoft GPG public key:
224
229
- For Debian 11 and earlier, run the following command.
- Install the HTTPS driver if not already installed:
235
242
236
243
```bash
@@ -374,7 +381,7 @@ Download the onboarding package from Microsoft Defender portal.
374
381
2. In the first drop-down menu, select**Linux Server** as the operating system. In the second drop-down menu, select**Local Script** as the deployment method.
375
382
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
376
383
377
-
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal" lightbox="media/portal-onboarding-linux.png":::
384
+
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal":::
378
385
379
386
4. From a command prompt, verify that you have the file, and extract the contents of the archive:
380
387
@@ -483,7 +490,7 @@ Download the onboarding package from Microsoft Defender portal.
483
490
484
491
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
485
492
486
-
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
493
+
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
487
494
488
495
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
0 commit comments