You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-prerequisites.md
+55-55Lines changed: 55 additions & 55 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,14 @@ For more detailed information about licensing requirements for Microsoft Defende
42
42
43
43
For detailed licensing information, see [Product Terms: Microsoft Defender for Endpoint](https://www.microsoft.com/licensing/terms/productoffering/MicrosoftDefenderforEndpoint/EAEAS) and work with your account team to learn more about the terms and conditions.
44
44
45
+
## System Requirements
46
+
47
+
-**CPU**: One CPU core minimum. For high-performance workloads, more cores are recommended.
48
+
-**Disk Space**: 2 GB minimum. For high-performance workloads, more disk space might be needed.
49
+
-**Memory**: 1 GB of RAM minimum. For high-performance workloads, more memory might be needed.
50
+
51
+
> [!NOTE]
52
+
> Performance tuning might be needed based on workloads. For more information, see [Performance tuning for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-perf)
45
53
46
54
## Software requirements
47
55
@@ -54,15 +62,6 @@ For detailed licensing information, see [Product Terms: Microsoft Defender for E
54
62
> The Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/azure-monitor-agent-overview#log-analytics-agent).
55
63
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
56
64
57
-
## System Requirements
58
-
59
-
-**CPU**: One CPU core minimum. For high-performance workloads, more cores are recommended.
60
-
-**Disk Space**: 2 GB minimum. For high-performance workloads, more disk space might be needed.
61
-
-**Memory**: 1 GB of RAM minimum. For high-performance workloads, more memory might be needed.
62
-
63
-
> [!NOTE]
64
-
> Performance tuning might be needed based on workloads. For more information, see [Performance tuning for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-perf)
65
-
66
65
## Supported Linux distributions
67
66
68
67
The following Linux server distributions and x64 (AMD64/EM64T) versions are supported:
@@ -112,31 +111,59 @@ Support for [Microsoft Defender for Endpoint on Linux for Arm64-based devices](/
112
111
> If there are any other applications on the system that use fanotify in blocking mode, applications are listed in the conflicting_applications field of the mdatp health command output.
113
112
> The Linux FAPolicyD feature uses fanotify in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to passive mode. See [Enforcement level for Microsoft Defender Antivirus](/defender-endpoint/linux-preferences#enforcement-level-for-microsoft-defender-antivirus).
114
113
115
-
## List of supported filesystems for RTP, Quick, Full, and Custom Scan.
114
+
## Supported filesystems for real-time protection and quick, full, and custom scans
116
115
117
-
|RTP, Quick, Full Scan|Custom Scan|
116
+
|Real-time protection and quick/full scans|Custom scans|
118
117
|---|---|
119
-
|btrfs|All filesystems supported for RTP, Quick, Full Scan|
120
-
|ecryptfs|Efs|
121
-
|ext2|S3fs|
122
-
|ext3|Blobfuse|
123
-
|ext4|Lustr|
124
-
|fuse|glustrefs|
125
-
|fuseblk|Afs|
126
-
|jfs|sshfs|
127
-
|nfs(v3 only)|cifs|
128
-
|overlay|smb|
129
-
|ramfs|gcsfuse|
130
-
|reiserfs|sysfs|
131
-
|tmpfs|
132
-
|udf|
133
-
|vfat|
134
-
|xfs|
118
+
|`btrfs`|All filesystems are supported for real-time protection and quick/full scans|
119
+
|`ecryptfs`|`Efs`|
120
+
|`ext2`|`S3fs`|
121
+
|`ext3`|`Blobfuse`|
122
+
|`ext4`|`Lustr`|
123
+
|`fuse`|`glustrefs`|
124
+
|`fuseblk`|`Afs`|
125
+
|`jfs`|`sshfs`|
126
+
|`nfs`(v3 only)|`cifs`|
127
+
|`overlay`|`smb`|
128
+
|`ramfs`|`gcsfuse`|
129
+
|`reiserfs`|`sysfs`|
130
+
|`tmpfs`|
131
+
|`udf`|
132
+
|`vfat`|
133
+
|`xfs`|
135
134
136
135
> [!NOTE]
137
-
> NFS v3 mount points to be scanned thoroughly and are required to set the no_root_squash export option on these mount points
136
+
> NFS v3 mount points to be scanned thoroughly and are required to set the `no_root_squash` export option on these mount points.
138
137
> Without this option, scanning NFS v3 can potentially fail due to lack of permissions.
139
138
139
+
## Network connections
140
+
141
+
- Verify that your devices can connect to Microsoft Defender for Endpoint cloud services.
142
+
- Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment)
143
+
- Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
144
+
1. Transparent proxy
145
+
2. Manual static proxy configuration
146
+
- Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
147
+
148
+
> [!NOTE]
149
+
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
150
+
151
+
> [!WARNING]
152
+
> PAC, WPAD, and authenticated proxies are not supported.
153
+
> Use only static or transparent proxies.
154
+
> SSL inspection and intercepting proxies are also not supported for security reasons.
155
+
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
156
+
> Adding your interception certificate to the global store will not enable interception.
157
+
158
+
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
159
+
160
+
## External package dependency
161
+
162
+
For information on external package dependencies, see the following articles:
163
+
164
+
-[Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux)
165
+
-[Configure security settings and policies for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences)
166
+
140
167
## Installation instructions
141
168
142
169
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](/defender-endpoint/minimum-requirements) are met.
@@ -163,30 +190,3 @@ If you experience any installation failures, see [Troubleshooting installation f
163
190
> If you want to control the UID and GID, create a mdatp user before installation using the /usr/sbin/nologin shell option.
164
191
> Here's an example: mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin.
165
192
166
-
## Network connections
167
-
168
-
- Verify that your devices can connect to Microsoft Defender for Endpoint cloud services.
169
-
- Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment)
170
-
- Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
171
-
1. Transparent proxy
172
-
2. Manual static proxy configuration
173
-
- Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
174
-
175
-
> [!NOTE]
176
-
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
177
-
178
-
> [!WARNING]
179
-
> PAC, WPAD, and authenticated proxies are not supported.
180
-
> Use only static or transparent proxies.
181
-
> SSL inspection and intercepting proxies are also not supported for security reasons.
182
-
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
183
-
> Adding your interception certificate to the global store will not enable interception.
184
-
185
-
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
186
-
187
-
## External package dependency
188
-
189
-
For information on external package dependencies, see the following articles:
190
-
191
-
-[Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux)
192
-
-[Configure security settings and policies for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences)
0 commit comments