Skip to content

Commit 1cd77a1

Browse files
authored
Merge pull request #1685 from anoliveiraM/patch-3
Removing support for CentOS 6.x
2 parents 624fb0e + d25f895 commit 1cd77a1

File tree

1 file changed

+24
-30
lines changed

1 file changed

+24
-30
lines changed

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 24 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/21/2024
18+
ms.date: 10/23/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -31,7 +31,7 @@ ms.date: 10/21/2024
3131
This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
3232

3333
> [!CAUTION]
34-
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
34+
> Running other non-Microsoft endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
3535
3636
## How to install Microsoft Defender for Endpoint on Linux
3737

@@ -43,7 +43,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4343
- Linux distribution using the [systemd](https://systemd.io/)system manager
4444

4545
> [!NOTE]
46-
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
46+
> Linux distribution using system manager, support both SystemV and Upstart.
4747
- Beginner-level experience in Linux and BASH scripting
4848
- Administrative privileges on the device (for manual deployment)
4949

@@ -52,23 +52,20 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
5252
5353
### Installation instructions
5454

55-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
55+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
5656

57-
In general you need to take the following steps:
57+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
5858

59-
- Ensure that you have a Microsoft Defender for Endpoint subscription.
60-
- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
61-
- The command-line tool:
62-
- [Manual deployment](linux-install-manually.md)
63-
- Third-party management tools:
64-
- [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
65-
- [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
66-
- [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
67-
- [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
68-
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
59+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
60+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
61+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
62+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
63+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
6964

70-
> [!NOTE]
71-
> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
65+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
66+
67+
> [!IMPORTANT]
68+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
7269
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
7370
7471
### System requirements
@@ -78,19 +75,18 @@ In general you need to take the following steps:
7875
> [!NOTE]
7976
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
8077
81-
- Cores: 2 minimum, 4 preferred
78+
- Cores: Two minimum, four preferred
8279

8380
> [!NOTE]
84-
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
81+
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
8582
86-
- Memory: 1 GB minimum, 4 preferred
83+
- Memory: 1 GB minimum, 4 GB preferred
8784

88-
- List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
85+
- The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
8986
- Red Hat Enterprise Linux 6.7 or higher (In preview)
9087
- Red Hat Enterprise Linux 7.2 or higher
9188
- Red Hat Enterprise Linux 8.x
9289
- Red Hat Enterprise Linux 9.x
93-
- CentOS 6.7 or higher (In preview)
9490
- CentOS 7.2 or higher
9591
- Ubuntu 16.04 LTS
9692
- Ubuntu 18.04 LTS
@@ -121,7 +117,7 @@ In general you need to take the following steps:
121117
> [!CAUTION]
122118
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
123119
124-
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
120+
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
125121

126122
|RTP, Quick, Full Scan| Custom Scan|
127123
|---|---|
@@ -142,7 +138,7 @@ In general you need to take the following steps:
142138
|`vfat`||
143139
|`xfs`||
144140

145-
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
141+
- Audit framework (`auditd`) must be enabled if you're using auditd as your primary event provider.
146142

147143
> [!NOTE]
148144
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -151,7 +147,7 @@ In general you need to take the following steps:
151147

152148
### External package dependency
153149

154-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
150+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
155151

156152
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, and `mde-netfilter`
157153
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
@@ -168,14 +164,14 @@ When adding exclusions to Microsoft Defender Antivirus, you should be mindful of
168164

169165
### Network connections
170166

171-
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, please reference [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
167+
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
172168

173169
Defender for Endpoint on Linux can connect through a proxy server by using the following discovery methods:
174170

175171
- Transparent proxy
176172
- Manual static proxy configuration
177173

178-
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
174+
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no another configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
179175

180176
> [!WARNING]
181177
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
@@ -193,7 +189,7 @@ Guidance for how to configure the product in enterprise environments is availabl
193189

194190
## Common Applications to Microsoft Defender for Endpoint can impact
195191

196-
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
192+
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. Such applications for developer scenarios include Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For more guidance, consider consulting documentation regarding antivirus exclusions from non-Microsoft applications.
197193

198194
## Resources
199195

@@ -202,9 +198,7 @@ High I/O workloads from certain applications can experience performance issues w
202198
## Related articles
203199

204200
- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
205-
206201
- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
207-
208202
- [Turn on network protection for Linux](network-protection-linux.md)
209203

210204
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)