Skip to content

Commit 00294c0

Browse files
authored
Merge pull request #2182 from MicrosoftDocs/mde-servers
MDE server doc updates per Naama and Tina Coll
2 parents 87f50f6 + d98917b commit 00294c0

34 files changed

+535
-350
lines changed

defender-business/mdb-onboard-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/19/2024
12+
ms.date: 12/12/2024
1313
ms.reviewer: efratka, nehabha, muktaagarwal
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -274,7 +274,7 @@ After a device is enrolled in Intune, you can add it to a device group. [Learn m
274274
## Servers
275275

276276
> [!NOTE]
277-
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
277+
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
278278
279279
Choose the operating system for your server:
280280

defender-endpoint/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -137,9 +137,10 @@
137137
- name: Migrating devices to streamlined method
138138
href: migrate-devices-streamlined.md
139139

140-
- name: Onboarding Windows Client
140+
- name: Onboard client devices
141+
href: onboard-client.md
141142
items:
142-
- name: Onboarding Windows Client overview
143+
- name: Onboarding Windows client overview
143144
href: onboard-windows-client.md
144145
- name: Defender for Endpoint plug-in for WSL
145146
href: mde-plugin-wsl.md
@@ -158,7 +159,8 @@
158159
- name: Onboard previous versions of Windows
159160
href: onboard-downlevel.md
160161

161-
- name: Onboarding Windows Server
162+
- name: Onboard server devices
163+
href: onboard-server.md
162164
items:
163165
- name: Onboarding Windows Server overview
164166
href: onboard-windows-server.md

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 73 additions & 96 deletions
Large diffs are not rendered by default.

defender-endpoint/configure-server-endpoints.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: denisebmsft
77
ms.author: deniseb
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
10-
ms.date: 05/20/2024
10+
ms.date: 12/13/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -23,12 +23,8 @@ ms.subservice: onboard
2323

2424
**Applies to:**
2525

26-
- Windows Server 2016 and Windows Server 2012 R2
27-
- Windows Server Semi-Annual Enterprise Channel
28-
- Windows Server 2019 and later
29-
- Windows Server 2019 core edition
30-
- Windows Server 2022
31-
- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
26+
- Microsoft Defender for Endpoint Server
27+
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
3228

3329
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configserver-abovefoldlink)
3430
@@ -44,7 +40,7 @@ For guidance on how to download and use Windows Security Baselines for Windows s
4440

4541
You'll need to complete the following general steps to successfully onboard servers.
4642

47-
:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices" lightbox="media/server-onboarding-tools-methods.png":::
43+
:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices.":::
4844

4945
> [!NOTE]
5046
> Windows Hyper-V Server editions are not supported.
@@ -56,7 +52,7 @@ Microsoft Defender for Endpoint integrates seamlessly with Microsoft Defender fo
5652
> [!NOTE]
5753
> For Windows Server 2016 and Windows Server 2012 R2, you can either manually install/upgrade the modern, unified solution on these machines, or use the integration to automatically deploy or upgrade servers covered by your respective Microsoft Defender for Server plan. More information about making the switch at [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows#enable-the-integration).
5854
>
59-
- When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
55+
> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
6056
>
6157
> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data is stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
6258
> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
@@ -235,7 +231,7 @@ This script can be used in various scenarios, including those scenarios describe
235231
8. Go to the **Actions** tab and select **New...** Ensure that **Start a program** is selected in the **Action** field. The [installer script](server-migration.md#installer-script) handles the installation, and immediately perform the onboarding step after installation completes. Select *C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe* then provide the arguments:
236232

237233
```powershell
238-
-ExecutionPolicy RemoteSigned \\servername-or-dfs-space\share-name\install.ps1 -OnboardingScript \\servername-or-dfs-space\share-name\windowsdefenderatponboardingscript.cmd
234+
-ExecutionPolicy RemoteSigned \\servername-or-dfs-space\share-name\install.ps1 -OnboardingScript \\servername-or-dfs-space\share-name\windowsdefenderatponboardingscript.cmd
239235
```
240236
241237
> [!NOTE]
@@ -261,7 +257,7 @@ The following steps are only applicable if you're using a third-party anti-malwa
261257
- Type: `REG_DWORD`
262258
- Value: `1`
263259
264-
:::image type="content" source="media/atp-verify-passive-mode.png" alt-text="The passive mode verification result" lightbox="media/atp-verify-passive-mode.png":::
260+
:::image type="content" source="media/atp-verify-passive-mode.png" alt-text="Screenshot of the passive mode verification result.":::
265261
266262
#### Known issues and limitations in the new, unified solution package for Windows Server 2016 and Windows Server 2012 R2
267263

defender-endpoint/deployment-strategy.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 04/03/2024
16+
ms.date: 12/12/2024
1717
---
1818

1919
# Identify Defender for Endpoint architecture and deployment method
@@ -30,7 +30,7 @@ If you're already completed the steps to set up your Microsoft Defender for Endp
3030

3131
We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps:
3232

33-
:::image type="content" source="/defender/media/defender-endpoint/onboarding-architecture-2.png" alt-text="The deployment flow" lightbox="/defender/media/defender-endpoint/onboarding-architecture-2.png":::
33+
:::image type="content" source="/defender/media/defender-endpoint/onboarding-architecture-2.png" alt-text="The deployment flow":::
3434

3535
## Step 1: Identify your architecture
3636

@@ -49,17 +49,18 @@ Once you have determined the architecture of your environment and have created a
4949

5050
|Endpoint|Deployment tool|
5151
|---|---|
52-
|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br> [Group Policy](configure-endpoints-gp.md) <br> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br> [VDI scripts](configure-endpoints-vdi.md)|
53-
|**Windows servers<br>Linux servers** | [Integration with Microsoft Defender for Cloud](azure-server-integration.md)
54-
|**macOS**|[Local script](mac-install-manually.md) <br> [Microsoft Intune](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md)|
55-
|**Linux servers**|[Local script](linux-install-manually.md) <br> [Puppet](linux-install-with-puppet.md) <br> [Ansible](linux-install-with-ansible.md) <br> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br> [Saltstack](linux-install-with-saltack.md)|
52+
|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br/> [Group Policy](configure-endpoints-gp.md) <br/> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br/> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br/> [VDI scripts](configure-endpoints-vdi.md)|
53+
|**Windows servers<br/>Linux servers** <br/>(Requires a server license) | [Onboard Windows devices using a local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md) |
54+
|**macOS**|[Local script](mac-install-manually.md) <br/> [Microsoft Intune](mac-install-with-intune.md) <br/> [JAMF Pro](mac-install-with-jamf.md) <br/> [Mobile Device Management](mac-install-with-other-mdm.md)|
55+
|**Linux servers**|[Local script](linux-install-manually.md) <br/> [Puppet](linux-install-with-puppet.md) <br/> [Ansible](linux-install-with-ansible.md) <br/> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/> [Saltstack](linux-install-with-saltack.md)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)|
5656
|**Android**|[Microsoft Intune](android-intune.md)|
57-
|**iOS**|[Microsoft Intune](ios-install.md) <br> [Mobile Application Manager](ios-install-unmanaged.md) |
57+
|**iOS**|[Microsoft Intune](ios-install.md) <br/> [Mobile Application Manager](ios-install-unmanaged.md) |
5858

59-
>[!Note]
59+
> [!NOTE]
6060
> For devices that aren't managed by Microsoft Intune or Microsoft Configuration Manager, you can use the Security Management for Microsoft Defender for Endpoint to receive security configurations for Microsoft Defender directly from Intune.
6161
6262
## Next step
6363

6464
After choosing your Defender for Endpoint architecture and deployment method continue to [Step 4 - Onboard devices](onboarding.md).
65+
6566
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ ms.date: 10/11/2024
2222

2323
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
2424

25+
**Applies to**:
26+
27+
- Microsoft Defender for Endpoint Server
28+
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29+
2530
Before you begin: Install unzip if it's not already installed.
2631

2732
The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.

defender-endpoint/linux-exclusions.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ ms.date: 10/14/2024
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25+
**Applies to**:
26+
27+
- Microsoft Defender for Endpoint Server
28+
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29+
2530
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
2631
2732
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
@@ -76,13 +81,14 @@ Wildcard|Description|Examples|
7681
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
7782

7883
> [!NOTE]
79-
For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
84+
> For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
8085
8186
## How to configure the list of exclusions
8287

8388
### Using the management console
8489

8590
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
91+
8692
```JSON
8793
{
8894
"exclusionSettings":{
@@ -161,7 +167,7 @@ Examples:
161167
mdatp exclusion extension remove --name .txt
162168
```
163169

164-
```Output
170+
```console
165171
Extension exclusion removed successfully
166172
```
167173

@@ -198,6 +204,7 @@ Examples:
198204
```console
199205
File exclusion removed successfully"
200206
```
207+
201208
- Add/Remove an exclusion for a folder:
202209

203210
```bash
@@ -216,7 +223,7 @@ Examples:
216223
Folder exclusion removed successfully
217224
```
218225

219-
```bash
226+
```bash
220227
mdatp exclusion folder add --path /var/log/ --scope global
221228
```
222229

@@ -259,6 +266,7 @@ Examples:
259266
mdatp exclusion folder add --path "/var/" --scope epp
260267
```
261268
OR
269+
262270
```bash
263271
mdatp exclusion folder add --path "/var/*/" --scope epp
264272
```
@@ -284,7 +292,7 @@ Examples:
284292
mdatp exclusion process remove --name /usr/bin/cat --scope global
285293
```
286294

287-
```Output
295+
```console
288296
Process exclusion removed successfully
289297
```
290298

@@ -301,7 +309,7 @@ Examples:
301309
mdatp exclusion process remove --name /usr/bin/cat --scope epp
302310
```
303311

304-
```Output
312+
```console
305313
Process exclusion removed successfully
306314
```
307315

@@ -357,4 +365,5 @@ For example, to add `EICAR-Test-File (not a virus)` (the threat name associated
357365
```bash
358366
mdatp threat allowed add --name "EICAR-Test-File (not a virus)"
359367
```
368+
360369
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/linux-install-manually.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ ms.date: 12/02/2024
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25+
**Applies to**:
26+
27+
- Microsoft Defender for Endpoint Server
28+
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29+
2530
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
2631
2732
> [!TIP]
@@ -223,14 +228,16 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
223228
- Install the Microsoft GPG public key:
224229
- For Debian 11 and earlier, run the following command.
225230

226-
```bash
227-
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
228-
```
229-
For Debian 12 and later, run the following command.
231+
```bash
232+
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
233+
```
234+
235+
- For Debian 12 and later, run the following command.
236+
237+
```bash
238+
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null
239+
```
230240

231-
```bash
232-
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null
233-
```
234241
- Install the HTTPS driver if not already installed:
235242

236243
```bash
@@ -374,7 +381,7 @@ Download the onboarding package from Microsoft Defender portal.
374381
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script** as the deployment method.
375382
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
376383

377-
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal" lightbox="media/portal-onboarding-linux.png":::
384+
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal":::
378385

379386
4. From a command prompt, verify that you have the file, and extract the contents of the archive:
380387

@@ -483,7 +490,7 @@ Download the onboarding package from Microsoft Defender portal.
483490

484491
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
485492

486-
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
493+
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
487494

488495
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
489496

0 commit comments

Comments
 (0)