You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+24-30Lines changed: 24 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/21/2024
18
+
ms.date: 10/23/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
@@ -31,7 +31,7 @@ ms.date: 10/21/2024
31
31
This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
32
32
33
33
> [!CAUTION]
34
-
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
34
+
> Running other non-Microsoft endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
35
35
36
36
## How to install Microsoft Defender for Endpoint on Linux
37
37
@@ -43,7 +43,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
43
43
- Linux distribution using the [systemd](https://systemd.io/)system manager
44
44
45
45
> [!NOTE]
46
-
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
46
+
> Linux distribution using system manager, support both SystemV and Upstart.
47
47
- Beginner-level experience in Linux and BASH scripting
48
48
- Administrative privileges on the device (for manual deployment)
49
49
@@ -52,23 +52,20 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
52
52
53
53
### Installation instructions
54
54
55
-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
55
+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
56
56
57
-
In general you need to take the following steps:
57
+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
58
58
59
-
- Ensure that you have a Microsoft Defender for Endpoint subscription.
60
-
- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
61
-
- The command-line tool:
62
-
-[Manual deployment](linux-install-manually.md)
63
-
- Third-party management tools:
64
-
-[Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
65
-
-[Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
66
-
-[Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
67
-
-[Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
68
-
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
59
+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
60
+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
61
+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
62
+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
63
+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
69
64
70
-
> [!NOTE]
71
-
> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
65
+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
66
+
67
+
> [!IMPORTANT]
68
+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
72
69
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
73
70
74
71
### System requirements
@@ -78,19 +75,18 @@ In general you need to take the following steps:
78
75
> [!NOTE]
79
76
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
80
77
81
-
- Cores: 2 minimum, 4 preferred
78
+
- Cores: Two minimum, four preferred
82
79
83
80
> [!NOTE]
84
-
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
81
+
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
85
82
86
-
- Memory: 1 GB minimum, 4 preferred
83
+
- Memory: 1 GB minimum, 4 GB preferred
87
84
88
-
-List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
85
+
-The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
89
86
- Red Hat Enterprise Linux 6.7 or higher (In preview)
90
87
- Red Hat Enterprise Linux 7.2 or higher
91
88
- Red Hat Enterprise Linux 8.x
92
89
- Red Hat Enterprise Linux 9.x
93
-
- CentOS 6.7 or higher (In preview)
94
90
- CentOS 7.2 or higher
95
91
- Ubuntu 16.04 LTS
96
92
- Ubuntu 18.04 LTS
@@ -121,7 +117,7 @@ In general you need to take the following steps:
121
117
> [!CAUTION]
122
118
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
123
119
124
-
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
120
+
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
125
121
126
122
|RTP, Quick, Full Scan| Custom Scan|
127
123
|---|---|
@@ -142,7 +138,7 @@ In general you need to take the following steps:
142
138
|`vfat`||
143
139
|`xfs`||
144
140
145
-
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
141
+
- Audit framework (`auditd`) must be enabled if you're using auditd as your primary event provider.
146
142
147
143
> [!NOTE]
148
144
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -151,7 +147,7 @@ In general you need to take the following steps:
151
147
152
148
### External package dependency
153
149
154
-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
150
+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
155
151
156
152
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage``selinux-policy-targeted`, and `mde-netfilter`
157
153
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
@@ -168,14 +164,14 @@ When adding exclusions to Microsoft Defender Antivirus, you should be mindful of
168
164
169
165
### Network connections
170
166
171
-
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, please reference[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
167
+
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, see[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
172
168
173
169
Defender for Endpoint on Linux can connect through a proxy server by using the following discovery methods:
174
170
175
171
- Transparent proxy
176
172
- Manual static proxy configuration
177
173
178
-
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
174
+
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no another configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
179
175
180
176
> [!WARNING]
181
177
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
@@ -193,7 +189,7 @@ Guidance for how to configure the product in enterprise environments is availabl
193
189
194
190
## Common Applications to Microsoft Defender for Endpoint can impact
195
191
196
-
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
192
+
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. Such applications for developer scenarios include Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For more guidance, consider consulting documentation regarding antivirus exclusions from non-Microsoft applications.
197
193
198
194
## Resources
199
195
@@ -202,9 +198,7 @@ High I/O workloads from certain applications can experience performance issues w
202
198
## Related articles
203
199
204
200
-[Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
205
-
206
201
-[Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
207
-
208
202
-[Turn on network protection for Linux](network-protection-linux.md)
209
203
210
204
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments