Skip to content

Commit 12d03c5

Browse files
authored
Merge pull request #1687 from MicrosoftDocs/main
pushing MDE on Linux updates live
2 parents f4bb483 + c50eac9 commit 12d03c5

6 files changed

+58
-47
lines changed

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 27 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/21/2024
18+
ms.date: 10/23/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -31,7 +31,7 @@ ms.date: 10/21/2024
3131
This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
3232

3333
> [!CAUTION]
34-
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
34+
> Running other non-Microsoft endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
3535
3636
## How to install Microsoft Defender for Endpoint on Linux
3737

@@ -40,35 +40,35 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4040
### Prerequisites
4141

4242
- Access to the Microsoft Defender portal
43+
-
4344
- Linux distribution using the [systemd](https://systemd.io/)system manager
4445

4546
> [!NOTE]
46-
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
47+
> Linux distribution using system manager, support both SystemV and Upstart.
48+
4749
- Beginner-level experience in Linux and BASH scripting
50+
-
4851
- Administrative privileges on the device (for manual deployment)
4952

5053
> [!NOTE]
5154
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent). Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5255
5356
### Installation instructions
5457

55-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
58+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
5659

57-
In general you need to take the following steps:
60+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
5861

59-
- Ensure that you have a Microsoft Defender for Endpoint subscription.
60-
- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
61-
- The command-line tool:
62-
- [Manual deployment](linux-install-manually.md)
63-
- Third-party management tools:
64-
- [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
65-
- [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
66-
- [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
67-
- [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
68-
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
62+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
63+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
64+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
65+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
66+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
6967

70-
> [!NOTE]
71-
> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
68+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
69+
70+
> [!IMPORTANT]
71+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
7272
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
7373
7474
### System requirements
@@ -78,19 +78,18 @@ In general you need to take the following steps:
7878
> [!NOTE]
7979
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
8080
81-
- Cores: 2 minimum, 4 preferred
81+
- Cores: Two minimum, four preferred
8282

8383
> [!NOTE]
84-
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
84+
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
8585
86-
- Memory: 1 GB minimum, 4 preferred
86+
- Memory: 1 GB minimum, 4 GB preferred
8787

88-
- List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
88+
- The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
8989
- Red Hat Enterprise Linux 6.7 or higher (In preview)
9090
- Red Hat Enterprise Linux 7.2 or higher
9191
- Red Hat Enterprise Linux 8.x
9292
- Red Hat Enterprise Linux 9.x
93-
- CentOS 6.7 or higher (In preview)
9493
- CentOS 7.2 or higher
9594
- Ubuntu 16.04 LTS
9695
- Ubuntu 18.04 LTS
@@ -121,7 +120,7 @@ In general you need to take the following steps:
121120
> [!CAUTION]
122121
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
123122
124-
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
123+
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
125124

126125
|RTP, Quick, Full Scan| Custom Scan|
127126
|---|---|
@@ -142,7 +141,7 @@ In general you need to take the following steps:
142141
|`vfat`||
143142
|`xfs`||
144143

145-
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
144+
- Audit framework (`auditd`) must be enabled if you're using auditd as your primary event provider.
146145

147146
> [!NOTE]
148147
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -151,7 +150,7 @@ In general you need to take the following steps:
151150

152151
### External package dependency
153152

154-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
153+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
155154

156155
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, and `mde-netfilter`
157156
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
@@ -168,14 +167,14 @@ When adding exclusions to Microsoft Defender Antivirus, you should be mindful of
168167

169168
### Network connections
170169

171-
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, please reference [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
170+
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
172171

173172
Defender for Endpoint on Linux can connect through a proxy server by using the following discovery methods:
174173

175174
- Transparent proxy
176175
- Manual static proxy configuration
177176

178-
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
177+
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no another configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
179178

180179
> [!WARNING]
181180
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
@@ -193,7 +192,7 @@ Guidance for how to configure the product in enterprise environments is availabl
193192

194193
## Common Applications to Microsoft Defender for Endpoint can impact
195194

196-
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
195+
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. Such applications for developer scenarios include Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For more guidance, consider consulting documentation regarding antivirus exclusions from non-Microsoft applications.
197196

198197
## Resources
199198

@@ -202,9 +201,7 @@ High I/O workloads from certain applications can experience performance issues w
202201
## Related articles
203202

204203
- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
205-
206204
- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
207-
208205
- [Turn on network protection for Linux](network-protection-linux.md)
209206

210207
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-office-365/air-about.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 06/09/2023
10+
ms.date: 10/22/2024
1111
ms.localizationpriority: medium
1212
search.appverid:
1313
- MET150
@@ -79,7 +79,9 @@ In addition, make sure to review your organization's [alert policies](alert-poli
7979

8080
## Which alert policies trigger automated investigations?
8181

82-
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
82+
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. If these alerts are disabled or replaced by custom alerts, AIR isn't triggered.
83+
84+
The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
8385

8486
|Alert|Severity|How the alert is generated|
8587
|---|---|---|

defender-office-365/attack-simulation-training-faq.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,10 @@ A: Several options are available to target users:
256256
- Include all users (currently available to organizations with less than 40,000 users).
257257
- Choose specific users.
258258
- Select users from a CSV file (one email address per line).
259-
- Microsoft Entra group-based targeting.
259+
- Microsoft Entra group-based targeting. The following group types are supported:
260+
- Microsoft 365 Groups (static and dynamic)
261+
- Distribution groups (static only)
262+
- Mail-enabled security groups (static only)
260263

261264
We find that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
262265

@@ -282,7 +285,7 @@ Managing a large CSV file or adding many individual recipients can be cumbersome
282285
> [!TIP]
283286
> Currently, shared mailboxes aren't supported in Attack simulation training. Simulations should target user mailboxes or groups containing user mailboxes.
284287
>
285-
> Distribution groups are expanded and the list of users is generated at the time of saving the simulation or simulation automation.
288+
> Groups are expanded and the list of users is generated at the time of saving the simulation, simulation automation, or training campaign.
286289
287290
### Q: Are the limits for the number of simulations that can be deployed during a specific time interval?
288291

defender-office-365/attack-simulation-training-simulation-automations.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/26/2024
15+
ms.date: 10/23/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -191,7 +191,12 @@ On the **Target users** page, select who receives the simulation. Use the follow
191191

192192
- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the simulation, choose one of the following options:
193193

194-
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. **Dynamic distribution groups are not supported**. The following search tools are available:
194+
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. The following group types are supported:
195+
- Microsoft 365 Groups (static and dynamic)
196+
- Distribution groups (static only)
197+
- Mail-enabled Security groups (static only)
198+
199+
The following search tools are available:
195200

196201
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
197202
- Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name** and **Email**.

0 commit comments

Comments
 (0)