Skip to content

Commit 287e8e7

Browse files
authored
Merge pull request #1054 from AruneemaXD/AruneemaXD-patch-1
Global exclusion typos + correction
2 parents f8b5d8f + c80d8e0 commit 287e8e7

File tree

2 files changed

+23
-26
lines changed

2 files changed

+23
-26
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provide and validate exclusions for Microsoft Defender for Endpoint
44
ms.service: defender-endpoint
55
ms.author: dansimp
66
author: dansimp
7-
ms.reviewer: gopkr
7+
ms.reviewer: gopkr, ardeshmukh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,21 +15,13 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/23/2024
18+
ms.date: 07/31/2024
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25-
**In this article:**
26-
27-
1. [Supported exclusion scopes](#supported-exclusion-scopes)
28-
2. [Supported exclusion types](#supported-exclusion-types)
29-
3. [How to configure the list of exclusions](#how-to-configure-the-list-of-exclusions)
30-
4. [Validate exclusions lists with the EICAR test file](#validate-exclusions-lists-with-the-eicar-test-file)
31-
5. [Allow threats](#allow-threats)
32-
3325
**Applies to:**
3426

3527
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -41,7 +33,7 @@ ms.date: 07/23/2024
4133
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
4234

4335
> [!IMPORTANT]
44-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
36+
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
4537
4638
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
4739

@@ -81,7 +73,8 @@ Process|A specific process (specified either by the full path or file name) and
8173
File, folder, and process exclusions support the following wildcards:
8274

8375
> [!NOTE]
84-
> Wildcards are not supported while configuring global exclusions.
76+
> File path needs to be present before adding or removing file exclusions with scope as global.
77+
> Wildcards are not supported while configuring global exclusions.
8578
8679
Wildcard|Description|Examples|
8780
---|---|---
@@ -114,7 +107,7 @@ mdatp exclusion
114107
115108
Examples:
116109

117-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
110+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
118111

119112
```bash
120113
mdatp exclusion extension add --name .txt
@@ -132,7 +125,7 @@ Examples:
132125
Extension exclusion removed successfully
133126
```
134127

135-
- Add/Remove an exclusion for a file:
128+
- Add/Remove an exclusion for a file *(File path should already be present in case of adding or removing exclusion with global scope)* :
136129

137130
```bash
138131
mdatp exclusion file add --path /var/log/dummy.log --scope epp

defender-endpoint/linux-preferences.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Set preferences for Microsoft Defender for Endpoint on Linux
3-
ms.reviewer: gopkr
3+
ms.reviewer: gopkr, ardeshmukh
44
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
55
ms.service: defender-endpoint
66
ms.author: dansimp
77
author: dansimp
88
ms.localizationpriority: medium
9-
ms.date: 07/23/2024
9+
ms.date: 07/31/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -79,7 +79,7 @@ Specifies the enforcement preference of antivirus engine. There are three values
7979
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
8080
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
8181
82-
#### Enable/disable behavior-monitoring
82+
#### Enable/disable behavior monitoring
8383

8484
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
8585

@@ -136,9 +136,6 @@ Specifies the degree of parallelism for on-demand scans. This corresponds to the
136136
137137
#### Exclusion merge policy
138138

139-
> [!NOTE]
140-
> ExclusionSetting - you can use
141-
142139
Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). Administrator-defined (admin_only) are exclusions that are configured by Defender for Endpoint policy. This setting can be used to restrict local users from defining their own exclusions.
143140

144141
|Description|JSON Value|Defender Portal Value|
@@ -149,6 +146,7 @@ Specifies the merge policy for exclusions. It can be a combination of administra
149146

150147
> [!NOTE]
151148
> Available in Defender for Endpoint version `100.83.73` or later.
149+
> Can also configure exclusions under [exclusionSettings](#exclusion-setting-preferences)
152150
153151
#### Scan exclusions
154152

@@ -215,7 +213,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
215213
|**Possible values**|any string|any string|
216214
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
217215

218-
#### Muting Non Exec mounts
216+
#### Muting non-exec mounts
219217

220218
Specifies the behavior of RTP on mount point marked as noexec. There are two values for setting are:
221219

@@ -234,7 +232,7 @@ Specifies the behavior of RTP on mount point marked as noexec. There are two val
234232
> [!NOTE]
235233
> Available in Defender for Endpoint version `101.85.27` or later.
236234
237-
#### Unmonitor Filesystems
235+
#### Unmonitor filesystems
238236

239237
Configure filesystems to be unmonitored/excluded from real-time protection (RTP). The filesystems configured are validated against Microsoft Defender's list of permitted filesystems. Filesystems can only be monitored after successful validation. These configured unmonitored filesystems are still scanned by Quick, Full, and custom scans in Microsoft Defender Antivirus.
240238

@@ -266,7 +264,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266264
```
267265

268266
> [!NOTE]
269-
> Here;s the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
267+
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
270268
>
271269
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
272270
@@ -380,10 +378,12 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380378
> [!NOTE]
381379
> Available in Defender for Endpoint version `101.04.76` or later.
382380
383-
### Exclusion Setting preferences [**PREVIEW**]
381+
### Exclusion setting preferences
382+
383+
**Exlusion setting preferences are currently in preview**.
384384

385385
> [!NOTE]
386-
> Available in Defender for Endpoint version `101.23092.0012` or later.
386+
> Available in Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring.
387387
388388
The *exclusionSettings* section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
389389

@@ -444,6 +444,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
444444

445445
> [!NOTE]
446446
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
447+
447448
##### Path to excluded content
448449

449450
Used to exclude content from the scan by full file path.
@@ -457,7 +458,10 @@ Used to exclude content from the scan by full file path.
457458

458459
##### Path type (file / directory)
459460

460-
Indicates if the *path* property refers to a file or directory.
461+
Indicates if the *path* property refers to a file or directory.
462+
463+
> [!NOTE]
464+
> File path must already exist if adding file exclusion with global scope.
461465
462466
|Description|JSON Value|
463467
|---|---|

0 commit comments

Comments
 (0)