Skip to content

Commit 2cfa8cb

Browse files
authored
Merge pull request #2373 from MicrosoftDocs/main
1/8/2025 PM Publish
2 parents 37bff1f + c5167fc commit 2cfa8cb

File tree

4 files changed

+70
-43
lines changed

4 files changed

+70
-43
lines changed

defender-endpoint/linux-install-with-puppet.md

Lines changed: 11 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 12/24/2024
18+
ms.date: 01/08/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -29,16 +29,10 @@ ms.date: 12/24/2024
2929

3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3131
32-
This article describes how to deploy Defender for Endpoint on Linux using Puppet. A successful deployment requires the completion of all of the following tasks:
33-
34-
- [Download the onboarding package](#download-the-onboarding-package)
35-
- [Create Puppet manifest](#create-a-puppet-manifest)
36-
- [Deployment (include the manifest inside the site.pp file)](#include-the-manifest-inside-the-sitepp-file)
37-
- [Monitor your Puppet deployment](#monitor-puppet-deployment)
32+
This article describes how to deploy Defender for Endpoint on Linux using Puppet.
3833

3934
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
4035

41-
4236
## Prerequisites and system requirements
4337

4438
For a description of prerequisites and system requirements, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
@@ -70,9 +64,9 @@ Download the onboarding package from Microsoft Defender portal.
7064
inflating: mdatp_onboard.json
7165
```
7266

73-
## Create a Puppet manifest
67+
## Create a directory
7468

75-
You need to create a Puppet manifest for deploying Defender for Endpoint on Linux to devices managed by a Puppet server. This example makes use of the `apt` and `yumrepo` modules available from `puppetlabs`, and assumes that the modules are installed on your Puppet server.
69+
You need to create a directory for deploying Defender for Endpoint on Linux to devices managed by a Puppet server. This example makes use of the `apt` and `yumrepo` modules available from `puppetlabs`, and assumes that the modules are installed on your Puppet server.
7670

7771
1. Under the **modules** folder if your Puppet installation, create the folders `install_mdatp/files` and `install_mdatp/manifests`. The **modules** folder is typically located at `/etc/puppetlabs/code/environments/production/modules` on your Puppet server.
7872

@@ -100,7 +94,7 @@ You need to create a Puppet manifest for deploying Defender for Endpoint on Linu
10094
└── init.pp
10195
```
10296

103-
## Create a manifest file
97+
## Create a Puppet manifest file
10498

10599
There are two ways to create a manifest file:
106100

@@ -157,8 +151,8 @@ class install_mdatp (
157151

158152
}
159153
```
160-
>[!NOTE]
161-
>Installer script also supports other parameters such as channel, realtime protection, version, etc. To select from the list of available options, check help.
154+
> [!NOTE]
155+
> The installer script also supports other parameters such as channel, realtime protection, version, etc. To select from the list of available options, check help.
162156
>`./mde_installer.sh --help`
163157
164158
#### Create a manifest to deploy Defender for Endpoint by configuring repositories manually
@@ -265,7 +259,6 @@ class install_mdatp (
265259
266260
> [!NOTE]
267261
> Defender for Endpoint on Linux can be deployed from one of the following channels: **insiders-fast, insiders-slow, prod**. Each channel corresponds to a Linux software repository. The choice of the channel determines the type and frequency of the updates that are offered to your device. Devices in `insiders-fast` are the first ones to receive updates and new features in preview, followed by `insiders-slow`, and lastly by `prod`.
268-
>
269262
> Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/[version]`.
270263
271264
> [!Warning]
@@ -287,7 +280,7 @@ node "default" {
287280
288281
Enrolled agent devices periodically poll the Puppet Server and install new configuration profiles and policies as soon as they're detected.
289282
290-
## Monitor Puppet deployment
283+
## Monitor your Puppet deployment
291284
292285
On the agent device, you can also check the deployment status by running the following command:
293286
@@ -327,10 +320,10 @@ To get support from Microsoft, raise a support ticket and provide log files by u
327320
328321
## How to configure policies for Microsoft Defender on Linux
329322
330-
You can configure antivirus and EDR settings on your endpoints using following methods:
323+
You can configure antivirus and EDR settings on your endpoints. For more information, see the following articles:
331324
332-
- See [Set preferences for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences) to learn more about the available settings
333-
- See [security settings management](/mem/intune/protect/mde-security-integration) to configure settings in the Microsoft Defender portal.
325+
- [Set preferences for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences) describes the available settings
326+
- [Security settings management](/mem/intune/protect/mde-security-integration) describes how to configure settings in the Microsoft Defender portal.
334327
335328
## Operating system upgrades
336329

defender-endpoint/run-analyzer-linux.md

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 11/01/2024
12+
ms.date: 01/08/2024
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -189,7 +189,7 @@ This section provides instructions on how to run the tool locally on the Linux m
189189

190190
### Run the binary version of the client analyzer
191191

192-
#### Summary:
192+
#### Summary
193193

194194
1. Obtain from [https://go.microsoft.com/fwlink/?linkid=2297517](https://go.microsoft.com/fwlink/?linkid=2297517). Or, if your Linux server has internet access use `wget` to download the file:
195195

@@ -215,7 +215,7 @@ This section provides instructions on how to run the tool locally on the Linux m
215215

216216
6. Upload the file for the support engineer.
217217

218-
#### Details:
218+
#### Details
219219

220220
1. Download the [XMDE Client Analyzer Binary](https://go.microsoft.com/fwlink/?linkid=2297517) tool to the Linux machine you need to investigate.
221221

@@ -262,7 +262,7 @@ This section provides instructions on how to run the tool locally on the Linux m
262262
sudo ./MDESupportTool -d
263263
```
264264

265-
## Rung the Python-based client analyzer
265+
## Run the Python-based client analyzer
266266

267267
> [!NOTE]
268268
> - The analyzer depends on few extra PIP packages (`decorator`, `sh`, `distro`, `lxml`, and `psutil`) which are installed in the operating system when in root to produce the result output. If not installed, the analyzer attempts to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
@@ -344,7 +344,8 @@ Use the following command to get the machine diagnostic.
344344
345345
Usage example: `sudo ./MDESupportTool -d`
346346
347-
NOTE: The log level autoreset feature only available in 2405 or newer client version.
347+
> [!NOTE]
348+
> The log level autoreset feature only available in 2405 or newer client version.
348349
349350
### Positional arguments
350351
@@ -363,7 +364,7 @@ Usage example: `sudo ./MDESupportTool performance --frequency 2`
363364
364365
#### Exclude mode
365366
366-
Add exclusions for audit-d monitoring.
367+
Add exclusions for auditd monitoring.
367368
368369
> [!NOTE]
369370
> This functionality exists for Linux only.
@@ -442,12 +443,33 @@ Usage example: `sudo ./mde_support_tool.sh skipfaultyrules -e true`
442443
## See also
443444
444445
- [Client analyzer overview](overview-client-analyzer.md)
446+
445447
- [Download and run the client analyzer](download-client-analyzer.md)
448+
446449
- [Run the client analyzer on Windows](run-analyzer-windows.md)
450+
447451
- [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md)
452+
448453
- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)
454+
449455
- [Understand the analyzer HTML report](analyzer-report.md)
450456
457+
#### Defender for Endpoint on Linux troubleshooting documents
458+
459+
- [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-install)
460+
461+
- [Investigate agent health issues](/defender-endpoint/health-status)
462+
463+
- [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
464+
465+
- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-perf)
466+
467+
- [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-events)
468+
469+
- [Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives)
470+
471+
472+
451473
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
452474
453475

defender-endpoint/run-analyzer-macos.md

Lines changed: 29 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: macos
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 01/06/2025
12+
ms.date: 01/08/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -62,7 +62,7 @@ If you're experiencing reliability or device health issues with Microsoft Defend
6262
- `SupportToolLinuxBinary.zip`: For all Linux devices
6363
- `SupportToolMacOSBinary.zip`: For Mac devices
6464

65-
1. Unzip the SupportToolMacOSBinary.zip.
65+
5. Unzip the SupportToolMacOSBinary.zip.
6666

6767
```bash
6868
unzip -q SupportToolMacOSBinary.zip
@@ -91,40 +91,40 @@ The tool currently requires Python version 3 or later to be installed on your de
9191
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
9292
```
9393

94-
1. Verify the download.
94+
2. Verify the download.
9595

9696
| OS | Command |
9797
|--|--|
9898
| Linux | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip'| sha256sum -c` |
9999
| macOS | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip'| shasum -a 256 -c` |
100100

101-
1. Extract the contents of `XMDEClientAnalyzer.zip` on the machine.
101+
3. Extract the contents of `XMDEClientAnalyzer.zip` on the machine.
102102

103103
If you're using a terminal, extract the files by using the following command:
104104
105105
```bash
106106
unzip -q XMDEClientAnalyzer.zip -d XMDEClientAnalyzer
107107
```
108108
109-
1. Change directory to the extracted location.
109+
4. Change directory to the extracted location.
110110
111111
```bash
112112
cd XMDEClientAnalyzer
113113
```
114114
115-
1. Give the tool executable permission:
115+
5. Give the tool executable permission:
116116
117117
```bash
118118
chmod a+x mde_support_tool.sh
119119
```
120120
121-
1. Run as a nonroot user to install required dependencies:
121+
6. Run as a nonroot user to install required dependencies:
122122
123123
```bash
124124
./mde_support_tool.sh
125125
```
126126
127-
1. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
127+
7. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
128128
129129
```bash
130130
xattr -c MDESupportTools
@@ -136,7 +136,7 @@ The tool currently requires Python version 3 or later to be installed on your de
136136
137137
Apple could not verify "MDESupportTool" is free of malware that may harm your Mac or compromise your privacy"
138138
139-
1. To collect actual diagnostic package and generate the result archive file, run again as root:
139+
8. To collect actual diagnostic package and generate the result archive file, run again as root:
140140
141141
```bash
142142
sudo ./mde_support_tool.sh -d
@@ -168,7 +168,8 @@ Use the following command to get the machine diagnostic.
168168
169169
Usage example: `sudo ./MDESupportTool -d`
170170
171-
NOTE: The log level autoreset feature only available in 2405 or newer client version.
171+
> [!NOTE]
172+
> The log level autoreset feature is only available in 2405 or newer client version.
172173
173174
### Positional arguments
174175
@@ -218,4 +219,22 @@ Usage example `./mde_support_tool.sh trace --length 5`
218219
| `Audited_info.txt` | Details on audited service and related components for [Linux](linux-resources.md) OS. |
219220
| `perf_benchmark.tar.gz` | The performance test reports. You see this file only if you're using the performance parameter. |
220221

222+
## See also
223+
224+
### Defender for Endpoint on macOS troubleshooting
225+
226+
[Troubleshooting mode in Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-troubleshoot-mode)
227+
228+
[Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-install)
229+
230+
[Troubleshoot license issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-license)
231+
232+
[Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-sys-ext)
233+
234+
[Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/troubleshoot-cloud-connect-mdemac)
235+
236+
[Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-perf-overview)
237+
238+
[Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives)
239+
221240
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-xdr/microsoft-sentinel-onboard.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ search.appverid:
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
25-
ms.date: 12/02/2024
25+
ms.date: 01/08/2025
2626
---
2727

2828
# Connect Microsoft Sentinel to the Microsoft Defender portal
@@ -85,14 +85,7 @@ To connect a Microsoft Sentinel workspace to the Defender portal, complete the f
8585
1. In the Defender portal, select **Overview**.
8686
1. Select **Connect a workspace**.
8787
1. Choose the workspace you want to connect and select **Next**.
88-
1. Read and understand the product changes associated with connecting your workspace. These changes include:
89-
90-
- Incidents are no longer created by Microsoft Sentinel. They're now created by the correlation engine in the Microsoft Defender portal. This change is reflected in the incident's "incident provider name" field, which now reads "Microsoft Defender XDR."
91-
- Therefore, any active [Microsoft security incident creation rules](/azure/sentinel/threat-detection#microsoft-security-rules) are deactivated to avoid creating duplicate incidents. The incident creation settings in other types of analytics rules remain as they were, but those settings are implemented in the Defender portal, not in Microsoft Sentinel.
92-
- Log tables, queries, and functions in the Microsoft Sentinel workspace are also available in advanced hunting within the Defender portal.
93-
- The Microsoft Sentinel Contributor role is assigned to the Microsoft Threat Protection and WindowsDefenderATP apps within the subscription.
94-
- All alerts related to Defender XDR products are streamed directly from the main Defender XDR data connector to ensure consistency. Make sure you have incidents and alerts from this connector turned on in the workspace.
95-
88+
1. Read and understand the product changes associated with connecting your workspace.
9689
1. Select **Connect**.
9790

9891
After your workspace is connected, the banner on the **Overview** page shows that your environment is ready. The **Overview** page is updated with new sections that include metrics from Microsoft Sentinel like the number of data connectors and automation rules.

0 commit comments

Comments
 (0)