Skip to content

Commit 2f10f42

Browse files
authored
Merge pull request #1308 from MicrosoftDocs/main
Publish main to live, Tuesday 5:00 PM IST, 09/10
2 parents 1a717af + 2c97063 commit 2f10f42

File tree

2 files changed

+47
-44
lines changed

2 files changed

+47
-44
lines changed

defender-endpoint/linux-preferences.md

Lines changed: 41 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -861,40 +861,15 @@ The following configuration profile contains entries for all settings described
861861

862862
```JSON
863863
{
864-
"antivirusEngine":{
865-
"enforcementLevel":"real_time",
866-
"behaviorMonitoring": "enabled",
864+
"antivirusEngine":{
865+
"enforcementLevel":"passive",
866+
"behaviorMonitoring": "disabled",
867867
"scanAfterDefinitionUpdate":true,
868868
"scanArchives":true,
869869
"scanHistoryMaximumItems": 10000,
870870
"scanResultsRetentionDays": 90,
871871
"maximumOnDemandScanThreads":2,
872872
"exclusionsMergePolicy":"merge",
873-
"exclusions":[
874-
{
875-
"$type":"excludedPath",
876-
"isDirectory":false,
877-
"path":"/var/log/system.log<EXAMPLE DO NOT USE>"
878-
},
879-
{
880-
"$type":"excludedPath",
881-
"isDirectory":true,
882-
"path":"/run<EXAMPLE DO NOT USE>"
883-
},
884-
{
885-
"$type":"excludedPath",
886-
"isDirectory":true,
887-
"path":"/home/*/git<EXAMPLE DO NOT USE>"
888-
},
889-
{
890-
"$type":"excludedFileExtension",
891-
"extension":".pdf<EXAMPLE DO NOT USE>"
892-
},
893-
{
894-
"$type":"excludedFileName",
895-
"name":"cat<EXAMPLE DO NOT USE>"
896-
}
897-
],
898873
"allowedThreats":[
899874
"<EXAMPLE DO NOT USE>EICAR-Test-File (not a virus)"
900875
],
@@ -904,6 +879,7 @@ The following configuration profile contains entries for all settings described
904879
],
905880
"nonExecMountPolicy":"unmute",
906881
"unmonitoredFilesystems": ["nfs,fuse"],
882+
"enableFileHashComputation": false,
907883
"threatTypeSettingsMergePolicy":"merge",
908884
"threatTypeSettings":[
909885
{
@@ -914,14 +890,49 @@ The following configuration profile contains entries for all settings described
914890
"key":"archive_bomb",
915891
"value":"audit"
916892
}
917-
]
893+
],
894+
"scanFileModifyPermissions":false,
895+
"scanFileModifyOwnership":false,
896+
"scanNetworkSocketEvent":false,
897+
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/<EXAMPLE DO NOT USE>",
898+
"offlineDefintionUpdateFallbackToCloud":false,
899+
"offlineDefinitionUpdate":"disabled"
918900
},
919901
"cloudService":{
920902
"enabled":true,
921903
"diagnosticLevel":"optional",
922904
"automaticSampleSubmissionConsent":"safe",
923905
"automaticDefinitionUpdateEnabled":true,
924-
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
906+
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/",
907+
"definitionUpdatesInterval":28800
908+
},
909+
"features":{
910+
"moduleLoad":"disabled",
911+
"supplementarySensorConfigurations":{
912+
"enableFilePermissionEvents":"disabled",
913+
"enableFileOwnershipEvents":"disabled",
914+
"enableRawSocketEvent":"disabled",
915+
"enableBootLoaderCalls":"disabled",
916+
"enableProcessCalls":"disabled",
917+
"enablePseudofsCalls":"diabled",
918+
"enableEbpfModuleLoadEvents":"disabled",
919+
"sendLowfiEvents":"disabled"
920+
},
921+
"ebpfSupplementaryEventProvider":"enabled",
922+
"offlineDefinitionUpdateVerifySig": "disabled"
923+
},
924+
"networkProtection":{
925+
"enforcementLevel":"disabled",
926+
"disableIcmpInspection":true
927+
},
928+
"edr":{
929+
"groupIds":"GroupIdExample",
930+
"tags": [
931+
{
932+
"key": "GROUP",
933+
"value": "Tag"
934+
}
935+
]
925936
},
926937
"exclusionSettings":{
927938
"exclusions":[

defender-endpoint/prepare-deployment.md

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.topic: conceptual
1717
ms.subservice: onboard
1818
search.appverid: met150
19-
ms.date: 06/26/2024
19+
ms.date: 09/09/2024
2020
---
2121

2222
# Assign roles and permissions for Microsoft Defender for Endpoint deployment
@@ -38,15 +38,7 @@ The next step when deploying Defender for Endpoint is to assign roles and permis
3838
3939
## Role-based access control
4040

41-
Microsoft recommends using the concept of least privileges. Defender for Endpoint leverages built-in roles within Microsoft Entra ID. Microsoft recommends [review the different roles that are available](/azure/active-directory/roles/permissions-reference) and choose the right one to solve your needs for each persona for this application. Some roles may need to be applied temporarily and removed after the deployment has been completed.
42-
43-
|Personas|Roles|Microsoft Entra role (if necessary)|Assign to|
44-
|---|---|---|---|
45-
|Security Administrator||||
46-
|Security Analyst||||
47-
|Endpoint Administrator||||
48-
|Infrastructure Administrator||||
49-
|Business Owner/Stakeholder||||
41+
Microsoft recommends using the concept of least privileges. Defender for Endpoint leverages built-in roles within Microsoft Entra ID. [Review the different roles available](/azure/active-directory/roles/permissions-reference) and choose the right one to solve your needs for each persona for this application. Some roles may need to be applied temporarily and removed after the deployment has been completed.
5042

5143
Microsoft recommends using [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure) to manage your roles to provide additional auditing, control, and access review for users with directory permissions.
5244

@@ -62,11 +54,11 @@ You can find details on permission guidelines here: [Create roles and assign the
6254

6355
The following example table serves to identify the Cyber Defense Operations Center structure in your environment that will help you determine the RBAC structure required for your environment.
6456

65-
|Tier|Description|Permission Required|
57+
|Tier|Description|Permissions required|
6658
|---|---|---|
67-
|Tier 1|**Local security operations team / IT team** <br/><br/> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.||
68-
|Tier 2|**Regional security operations team** <br/><br/> This team can see all the devices for their region and perform remediation actions.|View data|
69-
|Tier 3|**Global security operations team** <br/><br/> This team consists of security experts and is authorized to see and perform all actions from the portal.|View data <br/><br/> Alerts investigation Active remediation actions <br/><br/> Alerts investigation Active remediation actions <br/><br/> Manage portal system settings <br/><br/> Manage security settings|
59+
|Tier 1|**Local security operations team / IT team** <br/><br/> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.|View data|
60+
|Tier 2|**Regional security operations team** <br/><br/> This team can see all the devices for their region and perform remediation actions.|View data <br/><br/> Alerts investigation <br/><br/> Active remediation actions <br/><br/>|
61+
|Tier 3|**Global security operations team** <br/><br/> This team consists of security experts and is authorized to see and perform all actions from the portal.|View data <br/><br/> Alerts investigation <br/><br/> Active remediation actions <br/><br/> Manage portal system settings <br/><br/> Manage security settings|
7062

7163
## Next step
7264

0 commit comments

Comments
 (0)