Skip to content

Commit 2d3bdce

Browse files
committed
Update comprehensive-guidance-on-linux-deployment.md
1 parent c83b653 commit 2d3bdce

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -87,22 +87,23 @@ Add the Microsoft Defender for Endpoint URLs and/or IP addresses to the allowed
8787

8888
Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
8989

90-
1. See [Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
90+
1. See [Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic).
9191

92-
2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
92+
2. If the Linux servers are behind a proxy, set proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
9393

9494
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
9595

9696
> [!NOTE]
97-
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
97+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and Mac).
9898
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
9999
100-
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
100+
For more information, see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
101101

102102
#### Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic
103103

104-
1. Go to [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
105-
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses
104+
1. See [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
105+
106+
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses.
106107

107108
#### Step 2: Set up proxy settings
108109

@@ -122,15 +123,15 @@ The following table lists the supported proxy settings:
122123

123124
#### Step 3: Verify SSL inspection isn't being performed on the network traffic
124125

125-
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
126+
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For more information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
126127

127128
##### Troubleshoot cloud connectivity issues
128129

129130
For more information, see [Troubleshooting cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
130131

131132
## 2. Capture performance data from the endpoint
132133

133-
Capture performance data from the endpoints that have Defender for Endpoint installed. This includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
134+
Capture performance data from the endpoints that have Defender for Endpoint installed. This data includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
134135

135136
## 3. (Optional) Check for filesystem errors 'fsck' (akin to chkdsk)
136137

@@ -154,21 +155,21 @@ For a detailed list of supported Linux distros, see [System requirements](micros
154155
|---|---|
155156
|Disk space |Minimum: 2 GB <br> NOTE: More disk space might be needed if cloud diagnostics are enabled for crash collections. |
156157
|RAM |1 GB<br> 4 GB is preferred|
157-
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> 4 cores are preferred |
158+
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> Four cores are preferred |
158159

159160
|OS version|Kernel filter driver|Comments|
160161
|---|---|---|
161-
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the fanotify kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
162+
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the `fanotify` kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
162163
## 7. Add your existing solution to the exclusion list for Microsoft Defender Antivirus
163164

164165
This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus.
165166

166167
> [!TIP]
167168
> To get help configuring exclusions, refer to your solution provider's documentation.
168169
169-
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses fanotify, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
170+
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses `fanotify`, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
170171

171-
- To check if there's a non-Microsoft antimalware that is running FANotify, you can run `mdatp health`, then check the result:
172+
- To check if there's a non-Microsoft antimalware that is running `fanotify`, you can run `mdatp health`, then check the result:
172173

173174
:::image type="content" source="media/mdatp-health-result.png" alt-text="Image of mdatp health result":::
174175

@@ -196,7 +197,6 @@ This step of the setup process involves adding Defender for Endpoint to the excl
196197
When you add [exclusions to Microsoft Defender Antivirus scans](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions.
197198

198199
> [!NOTE]
199-
>
200200
> - Antivirus exclusions apply to the antivirus engine.
201201
> - Indicators allow/block apply to the antivirus engine.
202202

0 commit comments

Comments
 (0)