You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+27-30Lines changed: 27 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/21/2024
18
+
ms.date: 10/23/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
@@ -31,7 +31,7 @@ ms.date: 10/21/2024
31
31
This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
32
32
33
33
> [!CAUTION]
34
-
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
34
+
> Running other non-Microsoft endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
35
35
36
36
## How to install Microsoft Defender for Endpoint on Linux
37
37
@@ -40,35 +40,35 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
40
40
### Prerequisites
41
41
42
42
- Access to the Microsoft Defender portal
43
+
-
43
44
- Linux distribution using the [systemd](https://systemd.io/)system manager
44
45
45
46
> [!NOTE]
46
-
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
47
+
> Linux distribution using system manager, support both SystemV and Upstart.
48
+
47
49
- Beginner-level experience in Linux and BASH scripting
50
+
-
48
51
- Administrative privileges on the device (for manual deployment)
49
52
50
53
> [!NOTE]
51
54
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent). Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
52
55
53
56
### Installation instructions
54
57
55
-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
58
+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
56
59
57
-
In general you need to take the following steps:
60
+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
58
61
59
-
- Ensure that you have a Microsoft Defender for Endpoint subscription.
60
-
- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
61
-
- The command-line tool:
62
-
-[Manual deployment](linux-install-manually.md)
63
-
- Third-party management tools:
64
-
-[Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
65
-
-[Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
66
-
-[Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
67
-
-[Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
68
-
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
62
+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
63
+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
64
+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
65
+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
66
+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
69
67
70
-
> [!NOTE]
71
-
> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
68
+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
69
+
70
+
> [!IMPORTANT]
71
+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
72
72
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
73
73
74
74
### System requirements
@@ -78,19 +78,18 @@ In general you need to take the following steps:
78
78
> [!NOTE]
79
79
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
80
80
81
-
- Cores: 2 minimum, 4 preferred
81
+
- Cores: Two minimum, four preferred
82
82
83
83
> [!NOTE]
84
-
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
84
+
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
85
85
86
-
- Memory: 1 GB minimum, 4 preferred
86
+
- Memory: 1 GB minimum, 4 GB preferred
87
87
88
-
-List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
88
+
-The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
89
89
- Red Hat Enterprise Linux 6.7 or higher (In preview)
90
90
- Red Hat Enterprise Linux 7.2 or higher
91
91
- Red Hat Enterprise Linux 8.x
92
92
- Red Hat Enterprise Linux 9.x
93
-
- CentOS 6.7 or higher (In preview)
94
93
- CentOS 7.2 or higher
95
94
- Ubuntu 16.04 LTS
96
95
- Ubuntu 18.04 LTS
@@ -121,7 +120,7 @@ In general you need to take the following steps:
121
120
> [!CAUTION]
122
121
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
123
122
124
-
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
123
+
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
125
124
126
125
|RTP, Quick, Full Scan| Custom Scan|
127
126
|---|---|
@@ -142,7 +141,7 @@ In general you need to take the following steps:
142
141
|`vfat`||
143
142
|`xfs`||
144
143
145
-
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
144
+
- Audit framework (`auditd`) must be enabled if you're using auditd as your primary event provider.
146
145
147
146
> [!NOTE]
148
147
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -151,7 +150,7 @@ In general you need to take the following steps:
151
150
152
151
### External package dependency
153
152
154
-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
153
+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
155
154
156
155
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage``selinux-policy-targeted`, and `mde-netfilter`
157
156
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
@@ -168,14 +167,14 @@ When adding exclusions to Microsoft Defender Antivirus, you should be mindful of
168
167
169
168
### Network connections
170
169
171
-
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, please reference[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
170
+
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, see[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
172
171
173
172
Defender for Endpoint on Linux can connect through a proxy server by using the following discovery methods:
174
173
175
174
- Transparent proxy
176
175
- Manual static proxy configuration
177
176
178
-
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
177
+
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no another configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
179
178
180
179
> [!WARNING]
181
180
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
@@ -193,7 +192,7 @@ Guidance for how to configure the product in enterprise environments is availabl
193
192
194
193
## Common Applications to Microsoft Defender for Endpoint can impact
195
194
196
-
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
195
+
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. Such applications for developer scenarios include Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For more guidance, consider consulting documentation regarding antivirus exclusions from non-Microsoft applications.
197
196
198
197
## Resources
199
198
@@ -202,9 +201,7 @@ High I/O workloads from certain applications can experience performance issues w
202
201
## Related articles
203
202
204
203
-[Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
205
-
206
204
-[Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
207
-
208
205
-[Turn on network protection for Linux](network-protection-linux.md)
209
206
210
207
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-office-365/air-about.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: conceptual
10
-
ms.date: 06/09/2023
10
+
ms.date: 10/22/2024
11
11
ms.localizationpriority: medium
12
12
search.appverid:
13
13
- MET150
@@ -79,7 +79,9 @@ In addition, make sure to review your organization's [alert policies](alert-poli
79
79
80
80
## Which alert policies trigger automated investigations?
81
81
82
-
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
82
+
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. If these alerts are disabled or replaced by custom alerts, AIR isn't triggered.
83
+
84
+
The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-faq.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -256,7 +256,10 @@ A: Several options are available to target users:
256
256
- Include all users (currently available to organizations with less than 40,000 users).
257
257
- Choose specific users.
258
258
- Select users from a CSV file (one email address per line).
259
-
- Microsoft Entra group-based targeting.
259
+
- Microsoft Entra group-based targeting. The following group types are supported:
260
+
- Microsoft 365 Groups (static and dynamic)
261
+
- Distribution groups (static only)
262
+
- Mail-enabled security groups (static only)
260
263
261
264
We find that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
262
265
@@ -282,7 +285,7 @@ Managing a large CSV file or adding many individual recipients can be cumbersome
282
285
> [!TIP]
283
286
> Currently, shared mailboxes aren't supported in Attack simulation training. Simulations should target user mailboxes or groups containing user mailboxes.
284
287
>
285
-
> Distribution groups are expanded and the list of users is generated at the time of saving the simulation or simulation automation.
288
+
> Groups are expanded and the list of users is generated at the time of saving the simulation, simulation automation, or training campaign.
286
289
287
290
### Q: Are the limits for the number of simulations that can be deployed during a specific time interval?
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-simulation-automations.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 08/26/2024
15
+
ms.date: 10/23/2024
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -191,7 +191,12 @@ On the **Target users** page, select who receives the simulation. Use the follow
191
191
192
192
-**Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the simulation, choose one of the following options:
193
193
194
-
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. **Dynamic distribution groups are not supported**. The following search tools are available:
194
+
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. The following group types are supported:
195
+
- Microsoft 365 Groups (static and dynamic)
196
+
- Distribution groups (static only)
197
+
- Mail-enabled Security groups (static only)
198
+
199
+
The following search tools are available:
195
200
196
201
-**Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
197
202
- Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name** and **Email**.
0 commit comments