You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-exclusions.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 02/19/2025
18
+
ms.date: 02/21/2025
19
19
---
20
20
21
21
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -71,7 +71,7 @@ The following table shows the exclusion types supported by Defender for Endpoint
71
71
|Process|A specific process (specified either by the full path or file name) and all files opened by it.<br/>*We recommend using full and trusted process launch path.*|`/bin/cat`<br/>`cat`<br/>`c?t`|
72
72
73
73
> [!IMPORTANT]
74
-
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`. When implementing global process exclusions, exclude only what is absolutely necessary to ensure system reliability and security. Verify that the process is known and trusted, specify the complete path to the process location, and confirm that the process will consistently launch from the same trusted full path.
74
+
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`. When implementing global process exclusions, exclude only what is necessary to ensure system reliability and security. Verify that the process is known and trusted, specify the complete path to the process location, and confirm that the process will consistently launch from the same trusted full path.
75
75
76
76
### File, folder, and process exclusions support the following wildcards:
77
77
@@ -141,7 +141,7 @@ In enterprise environments, exclusions can also be managed through a configurati
141
141
### Using Defender for Endpoint security settings management
142
142
143
143
> [!NOTE]
144
-
> This method is currently in private Preview. For enabling this feature, please reach out to [email protected].
144
+
> This method is currently in private Preview. To enable this feature, please reach out to [email protected].
145
145
> Make sure to review the prerequisites: [Defender for Endpoint security settings management prerequisites](/mem/intune/protect/mde-security-integration#prerequisites)
146
146
147
147
You can use the Microsoft Intune admin center or the Microsoft Defender portal to manage exclusions as endpoint security policies and assign those policies to Microsoft Entra ID groups. If you're using this method for the first time, make sure to complete the following steps:
@@ -150,11 +150,11 @@ You can use the Microsoft Intune admin center or the Microsoft Defender portal t
150
150
151
151
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**, and then select the Linux platform.
152
152
153
-
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](/mem/intune/protect/mde-security-integration).
153
+
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that aren't enrolled with Intune](/mem/intune/protect/mde-security-integration).
154
154
155
155
#### 2. Create a Microsoft Entra group
156
156
157
-
Create a dynamic Microsoft Entra group that uses the operating system type to ensure that all devices onboarded to Defender for Endpoint receive policies. Using a dynamic group allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually. For more information, see the following article: [Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
157
+
Create a dynamic Microsoft Entra group based on the operating system type to ensure that all devices onboarded to Defender for Endpoint receive the appropriate policies. This dynamic group automatically includes devices managed by Defender for Endpoint, eliminating the need for admins to manually create new policies. For more information, see the following article: [Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
158
158
159
159
#### 3. Create an endpoint security policy
160
160
@@ -170,7 +170,7 @@ Create a dynamic Microsoft Entra group that uses the operating system type to en
170
170
171
171
6. When you're done configuring settings, select **Next**.
172
172
173
-
7. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
173
+
7. On the **Assignments** page, select the groups that receive this profile. Then select **Next**.
174
174
175
175
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
176
176
@@ -416,7 +416,7 @@ To get the name of a detected threat, run the following command:
416
416
mdatp threat list
417
417
```
418
418
419
-
For example, to add `EICAR-Test-File (not a virus)` to the allow list, run the following command:
419
+
For example, to add `EICAR-Test-File (not a virus)` to the allowlist, run the following command:
420
420
421
421
```bash
422
422
mdatp threat allowed add --name "EICAR-Test-File (not a virus)"
0 commit comments