You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-proxy-internet.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Configure your devices to connect to the Defender for Endpoint service us
3
3
description: Learn how to configure your devices to enable communication with the cloud service using a proxy.
4
4
search.appverid: met150
5
5
ms.service: defender-endpoint
6
-
ms.author: bagol
7
-
author: batamig
6
+
ms.author: painbar
7
+
author: paulinbar
8
8
ms.localizationpriority: medium
9
9
manager: bagol
10
10
audience: ITPro
@@ -13,12 +13,12 @@ ms.collection:
13
13
- tier1
14
14
ms.topic: how-to
15
15
ms.subservice: onboard
16
-
ms.date: 07/01/2024
16
+
ms.date: 11/09/2025
17
17
appliesto:
18
18
- Microsoft Defender for Endpoint Plan 1
19
19
- Microsoft Defender for Endpoint Plan 2
20
-
21
20
---
21
+
22
22
# STEP 2: Configure your devices to connect to the Defender for Endpoint service using a proxy
23
23
24
24
@@ -126,7 +126,9 @@ Configure the static proxy using the Group Policy available in Administrative Te
126
126
>
127
127
> For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus caches the last known working proxy. Ensure your proxy solution does not perform SSL inspection, as that breaks the secure cloud connection.
128
128
>
129
-
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses to bypass proxy server** and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
129
+
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md).
130
+
>
131
+
> If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)**for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses to bypass proxy server** and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
130
132
>
131
133
> You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-prerequisites.md
+45-44Lines changed: 45 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: Prerequisites for Microsoft Defender for Endpoint on Linux
3
3
ms.reviewer: gopkr, pahuijbr, megphapriya
4
4
description: Describes the requirements needed to install and use Microsoft Defender for Endpoint on Linux.
@@ -15,20 +15,19 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/27/2025
18
+
ms.date: 11/11/2025
19
19
---
20
20
21
21
# Prerequisites for Microsoft Defender for Endpoint on Linux
22
22
23
23
> [!TIP]
24
24
> Microsoft Defender for Endpoint on Linux now extends support for Arm64-based Linux servers in GA.
25
25
26
-
27
26
This article lists hardware and software requirements for Defender for Endpoint on Linux. For more information about Defender for Endpoint on Linux, such as what's included in this offering, see the following articles:
28
27
29
-
-[Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
28
+
-[Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
30
29
31
-
-[What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
30
+
-[What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
@@ -70,56 +69,59 @@ For detailed licensing information, see [Product Terms: Microsoft Defender for E
70
69
71
70
The following Linux server distributions and x64 (AMD64/EM64T) versions are supported:
72
71
73
-
- Red Hat Enterprise Linux 7.2 and higher
74
-
- Red Hat Enterprise Linux 8.x
75
-
- Red Hat Enterprise Linux 9.x
76
-
- CentOS 7.2 and higher, excluding CentOS Stream
72
+
- Red Hat Enterprise Linux 7.2 and higher
73
+
- Red Hat Enterprise Linux 8.x
74
+
- Red Hat Enterprise Linux 9.x
75
+
- Red Hat Enterprise Linux 10.x
76
+
- CentOS 7.2 and higher, excluding CentOS Stream
77
77
- CentOS 8.x
78
-
- Ubuntu 16.04 LTS
79
-
- Ubuntu 18.04 LTS
80
-
- Ubuntu 20.04 LTS
81
-
- Ubuntu 22.04 LTS
82
-
- Ubuntu 24.04 LTS
83
-
- Debian 9 - 12
84
-
- SUSE Linux Enterprise Server 12.x
85
-
- SUSE Linux Enterprise Server 15.x
86
-
- Oracle Linux 7.2 and higher
87
-
- Oracle Linux 8.x
88
-
- Oracle Linux 9.x
89
-
- Amazon Linux 2
90
-
- Amazon Linux 2023
78
+
- Ubuntu 16.04 LTS
79
+
- Ubuntu 18.04 LTS
80
+
- Ubuntu 20.04 LTS
81
+
- Ubuntu 22.04 LTS
82
+
- Ubuntu 24.04 LTS
83
+
- Debian 9 - 12
84
+
- SUSE Linux Enterprise Server 12.x
85
+
- SUSE Linux Enterprise Server 15.x
86
+
- Oracle Linux 7.2 and higher
87
+
- Oracle Linux 8.x
88
+
- Oracle Linux 9.x
89
+
- Amazon Linux 2
90
+
- Amazon Linux 2023
91
91
- Fedora 33-42
92
-
- Rocky 8.7 and higher
93
-
- Rocky 9.2 and higher
94
-
- Alma 8.4 and higher
95
-
- Alma 9.2 and higher
96
-
- Mariner 2
92
+
- Rocky 8.7 and higher
93
+
- Rocky 9.2 and higher
94
+
- Alma 8.4 and higher
95
+
- Alma 9.2 and higher
96
+
- Mariner 2
97
97
98
98
**The following Linux server distributions on ARM64 are now GA:**
99
99
100
-
- Ubuntu 20.04 ARM64
101
-
- Ubuntu 22.04 ARM64
100
+
- Ubuntu 20.04 ARM64
101
+
- Ubuntu 22.04 ARM64
102
102
- Ubuntu 24.04 ARM64
103
103
- Debian 11, 12 ARM64
104
-
- Amazon Linux 2 ARM64
105
-
- Amazon Linux 2023 ARM64
104
+
- Amazon Linux 2 ARM64
105
+
- Amazon Linux 2023 ARM64
106
106
- RHEL 8.x ARM64
107
107
- RHEL 9.x ARM64
108
+
- RHEL 10.x ARM64
108
109
- Oracle Linux 8.x ARM64
109
110
- Oracle Linux 9.x ARM64
110
111
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
111
112
112
113
> [!NOTE]
113
-
> Distributions and versions that aren't explicitly listed above, and custom operating systems, are unsupported (even if they're derived from the officially supported distributions).
114
-
> Microsoft Defender for Endpoint is kernel-version agnostic for all other supported distributions and versions. The minimal requirement for the kernel version is`3.10.0-327`or later.
114
+
> Distributions and versions that aren't explicitly listed above, and custom operating systems, are unsupported (even if they're derived from the officially supported distributions).
115
+
> Microsoft Defender for Endpoint is kernel-version agnostic for all other supported distributions and versions. The minimal requirement for the kernel version is`3.10.0-327`or later.
115
116
116
117
> [!WARNING]
117
118
> Running Defender for Endpoint on Linux alongside other fanotify-based security solutions is not supported and may lead to unpredictable behavior, including system hangs.
118
119
> If any applications use fanotify in blocking mode, they will appear in the conflicting_applications field of the mdatp health command output.
119
-
> You can still safely take advantage of Defender for Endpoint on Linux by setting antivirus enforcement level to passive. See [Configure security settings in Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences).> **EXCEPTION:** The Linux `FAPolicyD` feature, which also uses Fanotify in blocking mode, is supported with Defender for Endpoint in active mode on RHEL and Fedora platforms, provided that mdatp health reports a healthy status. This exception is based on validated compatibility specific to these distributions.
120
-
>
121
-
>
122
-
## Supported filesystems for real-time protection and quick, full, and custom scans
120
+
> You can still safely take advantage of Defender for Endpoint on Linux by setting antivirus enforcement level to passive. See [Configure security settings in Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences).> **EXCEPTION:** The Linux `FAPolicyD` feature, which also uses Fanotify in blocking mode, is supported with Defender for Endpoint in active mode on RHEL and Fedora platforms, provided that mdatp health reports a healthy status. This exception is based on validated compatibility specific to these distributions.
121
+
>
122
+
>
123
+
124
+
## Supported filesystems for real-time protection and quick, full, and custom scans
123
125
124
126
|Real-time protection and quick/full scans|Custom scans|
125
127
|---|---|
@@ -141,7 +143,7 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
141
143
|`xfs`|
142
144
143
145
> [!NOTE]
144
-
> To scan NFS v3 mount points, make sure to set the`no_root_squash`export option. Without this option, scanning NFS v3 can potentially fail due to lack of permissions.
146
+
> To scan NFS v3 mount points, make sure to set the`no_root_squash`export option. Without this option, scanning NFS v3 can potentially fail due to lack of permissions.
145
147
146
148
## Verify if devices can connect to Defender for Endpoint cloud services
147
149
@@ -150,16 +152,16 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
150
152
2. Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
3. Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
156
158
157
-
> [!NOTE]
159
+
> [!NOTE]
158
160
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
159
161
160
162
> [!WARNING]
161
-
> PAC, WPAD, and authenticated proxies aren't supported.
162
-
> Use only static or transparent proxies.
163
+
> PAC, WPAD, and authenticated proxies aren't supported.
164
+
> Use only static or transparent proxies.
163
165
> SSL inspection and intercepting proxies aren't supported for security reasons.
164
166
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
165
167
> Adding your interception certificate to the global store doesn't enable interception.
@@ -183,7 +185,6 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
183
185
> - For DEBIAN, the mdatp package requires `auditd`.
184
186
> - For Mariner, the mdatp package requires `audit`.
185
187
186
-
187
188
## Installation instructions
188
189
189
190
There are several methods and tools that you can use to deploy Microsoft Defender for Endpoint on Linux (applicable to AMD64 and ARM64 Linux servers):
@@ -219,4 +220,4 @@ If you experience any installation issues, self-troubleshooting resources are av
219
220
-[Install Defender for Endpoint on Linux to a custom path](linux-custom-location-installation.md)
220
221
221
222
> [!TIP]
222
-
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)
223
+
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ appliesto:
21
21
- Microsoft Defender for Endpoint Plan 2
22
22
23
23
---
24
+
24
25
# Microsoft Defender for Endpoint on Linux
25
26
26
27
@@ -143,4 +144,4 @@ If you're using non-Microsoft applications, also see their documentation regardi
143
144
-[Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md)
144
145
145
146
> [!TIP]
146
-
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)
147
+
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-offline.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ Starting with Windows 10, version 1607 or newer, and Windows 11, Microsoft Defen
128
128
> [!NOTE]
129
129
> In Windows 10, version 1607, the offline scan can be run from **Windows Settings > Update & security > Windows Defender** or from the Windows Defender client.
130
130
131
-
1. On your Windows device, open the Windows Security app, and then **Scan options**.
131
+
1. On your Windows device, open the **Windows Security** app. Select **Virus & threat protection**, and then choose**Scan options**.
132
132
133
133
2. Select the radio button **Microsoft Defender Offline scan** and select **Scan now**.
Copy file name to clipboardExpand all lines: defender-endpoint/respond-machine-alerts.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
ms.author: painbar
6
6
author: paulinbar
7
7
ms.localizationpriority: medium
8
-
ms.date: 11/05/2025
8
+
ms.date: 11/11/2025
9
9
manager: bagol
10
10
audience: ITPro
11
11
ms.collection:
@@ -363,7 +363,9 @@ When an identity in your network might be compromised, you must prevent that ide
363
363
> Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.
364
364
365
365
> [!IMPORTANT]
366
-
> Once a **Contain user** action is enforced on a domain controller, it starts a GPO update on the Default Domain Controller policy. A change of a GPO starts a sync across the domain controllers in your environment. This is expected behavior, and if you monitor your environment for AD GPO changes, you may be notified of such changes. Undoing the **Contain user** action reverts the GPO changes to their previous state, which will then start another AD GPO synchronization in your environment. Learn more about [merging of security policies on domain controllers](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj966251(v=ws.11)#merging-of-security-policies-on-domain-controllers).
366
+
> As part of the active protection provided by Microsoft Defender for Endpoint, a distributed mechanism can apply LSA Policy to prevent compromised users from accessing machines in your organization. Currently, when this policy is applied on domain controllers, it may cause Group Policy synchronization activity across domain controllers.
367
+
>
368
+
> We are gradually rolling out a new solution by integrating with new OS APIs. This deployment will be phased and thoroughly tested to ensure stability and security. During this rollout, LSA Policy enforcement on your servers will be temporarily removed to prevent potential GPO sync. This change will remain in effect until the rollout is complete.
0 commit comments