Skip to content

Commit 26f9669

Browse files
committed
Update mde-linux-prerequisites.md
1 parent a7c9832 commit 26f9669

File tree

1 file changed

+55
-55
lines changed

1 file changed

+55
-55
lines changed

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 55 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,14 @@ For more detailed information about licensing requirements for Microsoft Defende
4242

4343
For detailed licensing information, see [Product Terms: Microsoft Defender for Endpoint]( https://www.microsoft.com/licensing/terms/productoffering/MicrosoftDefenderforEndpoint/EAEAS) and work with your account team to learn more about the terms and conditions.
4444

45+
## System Requirements
46+
47+
- **CPU**: One CPU core minimum. For high-performance workloads, more cores are recommended.
48+
- **Disk Space**: 2 GB minimum. For high-performance workloads, more disk space might be needed.
49+
- **Memory**: 1 GB of RAM minimum. For high-performance workloads, more memory might be needed.
50+
51+
> [!NOTE]
52+
> Performance tuning might be needed based on workloads. For more information, see [Performance tuning for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-perf)
4553
4654
## Software requirements
4755

@@ -54,15 +62,6 @@ For detailed licensing information, see [Product Terms: Microsoft Defender for E
5462
> The Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/azure-monitor-agent-overview#log-analytics-agent).
5563
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5664
57-
## System Requirements
58-
59-
- **CPU**: One CPU core minimum. For high-performance workloads, more cores are recommended.
60-
- **Disk Space**: 2 GB minimum. For high-performance workloads, more disk space might be needed.
61-
- **Memory**: 1 GB of RAM minimum. For high-performance workloads, more memory might be needed.
62-
63-
> [!NOTE]
64-
> Performance tuning might be needed based on workloads. For more information, see [Performance tuning for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-perf)
65-
6665
## Supported Linux distributions
6766

6867
The following Linux server distributions and x64 (AMD64/EM64T) versions are supported:
@@ -112,31 +111,59 @@ Support for [Microsoft Defender for Endpoint on Linux for Arm64-based devices](/
112111
> If there are any other applications on the system that use fanotify in blocking mode, applications are listed in the conflicting_applications field of the mdatp health command output.
113112
> The Linux FAPolicyD feature uses fanotify in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to passive mode. See [Enforcement level for Microsoft Defender Antivirus](/defender-endpoint/linux-preferences#enforcement-level-for-microsoft-defender-antivirus).
114113
115-
## List of supported filesystems for RTP, Quick, Full, and Custom Scan.
114+
## Supported filesystems for real-time protection and quick, full, and custom scans
116115

117-
|RTP, Quick, Full Scan|Custom Scan|
116+
|Real-time protection and quick/full scans|Custom scans|
118117
|---|---|
119-
|btrfs|All filesystems supported for RTP, Quick, Full Scan|
120-
|ecryptfs|Efs|
121-
|ext2|S3fs|
122-
|ext3|Blobfuse|
123-
|ext4|Lustr|
124-
|fuse|glustrefs|
125-
|fuseblk|Afs|
126-
|jfs|sshfs|
127-
|nfs(v3 only)|cifs|
128-
|overlay|smb|
129-
|ramfs|gcsfuse|
130-
|reiserfs|sysfs|
131-
|tmpfs|
132-
|udf|
133-
|vfat|
134-
|xfs|
118+
|`btrfs`|All filesystems are supported for real-time protection and quick/full scans|
119+
|`ecryptfs`|`Efs`|
120+
|`ext2`|`S3fs`|
121+
|`ext3`|`Blobfuse`|
122+
|`ext4`|`Lustr`|
123+
|`fuse`|`glustrefs`|
124+
|`fuseblk`|`Afs`|
125+
|`jfs`|`sshfs`|
126+
|`nfs` (v3 only)|`cifs`|
127+
|`overlay`|`smb`|
128+
|`ramfs`|`gcsfuse`|
129+
|`reiserfs`|`sysfs`|
130+
|`tmpfs`|
131+
|`udf`|
132+
|`vfat`|
133+
|`xfs`|
135134

136135
> [!NOTE]
137-
> NFS v3 mount points to be scanned thoroughly and are required to set the no_root_squash export option on these mount points
136+
> NFS v3 mount points to be scanned thoroughly and are required to set the `no_root_squash` export option on these mount points.
138137
> Without this option, scanning NFS v3 can potentially fail due to lack of permissions.
139138
139+
## Network connections
140+
141+
- Verify that your devices can connect to Microsoft Defender for Endpoint cloud services.
142+
- Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment)
143+
- Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
144+
1. Transparent proxy
145+
2. Manual static proxy configuration
146+
- Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
147+
148+
> [!NOTE]
149+
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
150+
151+
> [!WARNING]
152+
> PAC, WPAD, and authenticated proxies are not supported.
153+
> Use only static or transparent proxies.
154+
> SSL inspection and intercepting proxies are also not supported for security reasons.
155+
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
156+
> Adding your interception certificate to the global store will not enable interception.
157+
158+
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
159+
160+
## External package dependency
161+
162+
For information on external package dependencies, see the following articles:
163+
164+
- [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux)
165+
- [Configure security settings and policies for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences)
166+
140167
## Installation instructions
141168

142169
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](/defender-endpoint/minimum-requirements) are met.
@@ -163,30 +190,3 @@ If you experience any installation failures, see [Troubleshooting installation f
163190
> If you want to control the UID and GID, create a mdatp user before installation using the /usr/sbin/nologin shell option.
164191
> Here's an example: mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin.
165192
166-
## Network connections
167-
168-
- Verify that your devices can connect to Microsoft Defender for Endpoint cloud services.
169-
- Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment)
170-
- Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
171-
1. Transparent proxy
172-
2. Manual static proxy configuration
173-
- Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
174-
175-
> [!NOTE]
176-
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
177-
178-
> [!WARNING]
179-
> PAC, WPAD, and authenticated proxies are not supported.
180-
> Use only static or transparent proxies.
181-
> SSL inspection and intercepting proxies are also not supported for security reasons.
182-
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
183-
> Adding your interception certificate to the global store will not enable interception.
184-
185-
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
186-
187-
## External package dependency
188-
189-
For information on external package dependencies, see the following articles:
190-
191-
- [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux)
192-
- [Configure security settings and policies for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences)

0 commit comments

Comments
 (0)