Skip to content

Commit 10b8ceb

Browse files
Merge pull request #3310 from MicrosoftDocs/main
Publish main to live, 03/28/25, 3:30 PM PDT
2 parents 38f3286 + 051ac5c commit 10b8ceb

File tree

6 files changed

+68
-142
lines changed

6 files changed

+68
-142
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,11 @@
119119
"source_path": "defender-endpoint/linux-schedule-scan-mde.md",
120120
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-crontab",
121121
"redirect_document_id": true
122+
},
123+
{
124+
"source_path": "defender-endpoint/non-windows.md",
125+
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint",
126+
"redirect_document_id": true
122127
}
123128
]
124129
}

defender-endpoint/TOC.yml

Lines changed: 25 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,35 @@
66
items:
77
- name: What is Microsoft Defender for Endpoint?
88
href: microsoft-defender-endpoint.md
9-
- name: Zero Trust for Microsoft Defender for Endpoint
9+
items:
10+
- name: Defender for Endpoint on macOS
11+
href: microsoft-defender-endpoint-mac.md
12+
- name: Defender for Endpoint on Linux
13+
href: microsoft-defender-endpoint-linux.md
14+
- name: Defender for Endpoint on Android
15+
href: microsoft-defender-endpoint-android.md
16+
- name: Defender for Endpoint on iOS
17+
href: microsoft-defender-endpoint-ios.md
18+
- name: Defender for Endpoint for US Government customers
19+
href: gov.md
20+
- name: Supported Microsoft Defender for Endpoint capabilities by platform
21+
href: supported-capabilities-by-platform.md
22+
- name: Defender for Endpoint Plan 1
23+
items:
24+
- name: Overview of Defender for Endpoint Plan 1
25+
href: defender-endpoint-plan-1.md
26+
- name: Setup and configuration
27+
href: mde-p1-setup-configuration.md
28+
- name: Get started
29+
href: mde-plan1-getting-started.md
30+
- name: Minimum requirements
31+
href: minimum-requirements.md
32+
- name: Zero Trust with Defender for Endpoint
1033
href: zero-trust-with-microsoft-defender-endpoint.md
11-
- name: Trial user guide - Microsoft Defender for Endpoint
34+
- name: Trial user guide - Defender for Endpoint
1235
href: defender-endpoint-trial-user-guide.md
1336
- name: Pilot and deploy Defender for Endpoint
1437
href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-endpoint/TOC.json&bc=/defender-endpoint/breadcrumb/toc.json
15-
- name: Minimum requirements
16-
href: minimum-requirements.md
17-
- name: Supported Microsoft Defender for Endpoint capabilities by platform
18-
href: supported-capabilities-by-platform.md
1938
- name: What's new in Defender for Endpoint
2039
href: whats-new-in-microsoft-defender-endpoint.md
2140
items:
@@ -36,28 +55,6 @@
3655
href: /defender-xdr/preview
3756
- name: Data storage and privacy
3857
href: data-storage-privacy.md
39-
- name: Defender for Endpoint Plan 1
40-
items:
41-
- name: Overview
42-
href: defender-endpoint-plan-1.md
43-
- name: Setup and configuration
44-
href: mde-p1-setup-configuration.md
45-
- name: Get started
46-
href: mde-plan1-getting-started.md
47-
- name: Microsoft Defender for Endpoint for US Government customers
48-
href: gov.md
49-
- name: Microsoft Defender for Endpoint on other platforms
50-
href: non-windows.md
51-
items:
52-
- name: macOS
53-
href: microsoft-defender-endpoint-mac.md
54-
- name: Linux
55-
href: microsoft-defender-endpoint-linux.md
56-
- name: Android
57-
href: microsoft-defender-endpoint-android.md
58-
- name: iOS
59-
href: microsoft-defender-endpoint-ios.md
60-
6158
- name: Antivirus solution compatibility with Defender for Endpoint
6259
href: defender-compatibility.md
6360

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 35 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
66
ms.service: defender-endpoint
77
ms.subservice: ngp
88
ms.localizationpriority: medium
9-
ms.date: 03/14/2025
9+
ms.date: 03/28/2025
1010
author: emmwalshh
1111
ms.author: ewalsh
1212
ms.topic: conceptual
@@ -30,36 +30,47 @@ search.appverid: met150
3030

3131
- Windows Server
3232

33+
34+
> [!IMPORTANT]
35+
> ## Important notes about automatic exclusions on Windows Server
36+
>
37+
> - [Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
38+
> - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
39+
> - Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
40+
> - Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
41+
> - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
42+
> - Appropriate exclusions must be set for software that isn't included with the operating system.
43+
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
44+
45+
## Overview
46+
3347
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
3448

35-
- [Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
3649
- [Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later.
50+
- [Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
3751

3852
For a more detailed overview of exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
3953

40-
## A few important points about exclusions on Windows Server
54+
## Automatic server role exclusions
4155

42-
- Custom exclusions take precedence over automatic exclusions.
43-
- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning.
44-
- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).
45-
- Custom and duplicate exclusions don't conflict with automatic exclusions.
46-
- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
47-
- Appropriate exclusions must be set for software that isn't included with the operating system.
48-
- Windows Server 2012 R2 doesn't have Microsoft Defender Antivirus as an installable feature. When you onboard those servers to Defender for Endpoint, you'll install Microsoft Defender Antivirus, and default exclusions for operating system files are applied. However, exclusions for server roles (as specified below) don't apply automatically, and you should configure these exclusions as appropriate. To learn more, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md).
49-
- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
50-
- The list of built-in exclusions in Windows is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
56+
Automatic server role exclusions will apply specific sets of automatic path and process exclusions based on the roles that you select for the server.
5157

52-
## Automatic server role exclusions
58+
> [!NOTE]
59+
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
60+
> - Default locations could be different than the locations that are described in this article.
61+
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the automatic server role exclusions.
62+
> - To set exclusions for software that isn't included as a Windows feature or server role, refer to the software manufacturer's documentation.
63+
64+
### Windows Server 2016 or later
5365

5466
On Windows Server 2016 or later, you shouldn't need to define exclusions for server roles. When you install a role on Windows Server 2016 or later, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role.
5567

56-
Windows Server 2012 R2 does not support the automatic exclusions feature. You'll need to define explicit exclusions for any server role and any software that's added after installing the operating system.
68+
### Windows Server 2012 R2
69+
70+
Windows Server 2012 R2 does not support the automatic server role exclusions feature. Windows Server 2012 R2 also does not have Microsoft Defender Antivirus as an installable feature. When you onboard those servers to Defender for Endpoint, you'll install Microsoft Defender Antivirus, and default built-in exclusions for operating system files are applied. However, automatic server role exclusions (as specified below) will not be automatically applied. If these exclusions are desired, you should add custom exclusions for these paths and processes as appropriate. To learn more about onboarding Microsoft Defender Antivirus on Windows Server 2012 R2, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md).
5771

58-
> [!IMPORTANT]
59-
> - Default locations could be different than the locations that are described in this article.
60-
> - To set exclusions for software that isn't included as a Windows feature or server role, refer to the software manufacturer's documentation.
6172

62-
Automatic exclusions include:
73+
### Automatic exclusions include:
6374

6475
- [Hyper-V exclusions](#hyper-v-exclusions)
6576
- [SYSVOL files](#sysvol-files)
@@ -229,9 +240,14 @@ This section lists the folder exclusions that are delivered automatically when y
229240

230241
## Built-in exclusions
231242

243+
> [!NOTE]
244+
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
245+
> - Default locations could be different than the locations that are described in this article.
246+
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
247+
232248
Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
233249

234-
Built-in exclusions include:
250+
### Built-in exclusions include:
235251

236252
- [Windows "temp.edb" files](#windows-tempedb-files)
237253
- [Windows Update files or Automatic Update files](#windows-update-files-or-automatic-update-files)
@@ -241,7 +257,6 @@ Built-in exclusions include:
241257
- [File Replication Service (FRS) exclusions](#file-replication-service-frs-exclusions)
242258
- [Process exclusions for built-in operating system files](#process-exclusions-for-built-in-operating-system-files)
243259

244-
The list of built-in exclusions in Windows is kept up to date as the threat landscape changes.
245260

246261
### Windows "temp.edb" files
247262

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 03/20/2025
18+
ms.date: 03/28/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -74,21 +74,7 @@ There are several methods and tools that you can use to deploy Microsoft Defende
7474
> [!IMPORTANT]
7575
> Installing Microsoft Defender for Endpoint in any location other than the default install path isn't supported. On Linux, Microsoft Defender for Endpoint creates an mdatp user with random UID and GID values. If you want to control these values, create an mdatp user before installation using the /usr/sbin/nologin shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
7676
77-
### Troubleshoot installation issues
78-
79-
If you experience any installation issues, for self-troubleshooting, follow these steps:
80-
81-
1. For information on how to find the log that's generated automatically when an installation error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
82-
83-
2. For information about common installation issues, see [Installation issues](/defender-endpoint/linux-support-install).
84-
85-
3. If health of the device is `false`, see [Defender for Endpoint agent health issues](/defender-endpoint/health-status).
86-
87-
4. For product performance issues, see [Troubleshoot performance issues](/defender-endpoint/linux-support-perf).
88-
89-
5. For proxy and connectivity issues, see [Troubleshoot cloud connectivity issues](/defender-endpoint/linux-support-connectivity).
90-
91-
To get support from Microsoft, open a support ticket, and provide the log files created by using the [client analyzer](/defender-endpoint/overview-client-analyzer).
77+
If you experience any installation issues, self-troubleshooting resources are available. See the ilnks in the [See also](#see-also) section.
9278

9379
### Configure policies for Defender for Endpoint on Linux
9480

defender-endpoint/non-windows.md

Lines changed: 0 additions & 77 deletions
This file was deleted.

0 commit comments

Comments
 (0)