You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-puppet.md
+11-18Lines changed: 11 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 12/24/2024
18
+
ms.date: 01/08/2025
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -29,16 +29,10 @@ ms.date: 12/24/2024
29
29
30
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
31
31
32
-
This article describes how to deploy Defender for Endpoint on Linux using Puppet. A successful deployment requires the completion of all of the following tasks:
33
-
34
-
-[Download the onboarding package](#download-the-onboarding-package)
-[Deployment (include the manifest inside the site.pp file)](#include-the-manifest-inside-the-sitepp-file)
37
-
-[Monitor your Puppet deployment](#monitor-puppet-deployment)
32
+
This article describes how to deploy Defender for Endpoint on Linux using Puppet.
38
33
39
34
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
40
35
41
-
42
36
## Prerequisites and system requirements
43
37
44
38
For a description of prerequisites and system requirements, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
@@ -70,9 +64,9 @@ Download the onboarding package from Microsoft Defender portal.
70
64
inflating: mdatp_onboard.json
71
65
```
72
66
73
-
## Create a Puppet manifest
67
+
## Create a directory
74
68
75
-
You need to create a Puppet manifest for deploying Defender for Endpoint on Linux to devices managed by a Puppet server. This example makes use of the `apt` and `yumrepo` modules available from `puppetlabs`, and assumes that the modules are installed on your Puppet server.
69
+
You need to create a directory for deploying Defender for Endpoint on Linux to devices managed by a Puppet server. This example makes use of the `apt` and `yumrepo` modules available from `puppetlabs`, and assumes that the modules are installed on your Puppet server.
76
70
77
71
1. Under the **modules** folder if your Puppet installation, create the folders `install_mdatp/files` and `install_mdatp/manifests`. The **modules** folder is typically located at `/etc/puppetlabs/code/environments/production/modules` on your Puppet server.
78
72
@@ -100,7 +94,7 @@ You need to create a Puppet manifest for deploying Defender for Endpoint on Linu
100
94
└── init.pp
101
95
```
102
96
103
-
## Create a manifest file
97
+
## Create a Puppet manifest file
104
98
105
99
There are two ways to create a manifest file:
106
100
@@ -157,8 +151,8 @@ class install_mdatp (
157
151
158
152
}
159
153
```
160
-
>[!NOTE]
161
-
>Installer script also supports other parameters such as channel, realtime protection, version, etc. To select from the list of available options, check help.
154
+
>[!NOTE]
155
+
>The installer script also supports other parameters such as channel, realtime protection, version, etc. To select from the list of available options, check help.
162
156
>`./mde_installer.sh --help`
163
157
164
158
#### Create a manifest to deploy Defender for Endpoint by configuring repositories manually
@@ -265,7 +259,6 @@ class install_mdatp (
265
259
266
260
> [!NOTE]
267
261
> Defender forEndpoint on Linux can be deployed from one of the following channels: **insiders-fast, insiders-slow, prod**. Each channel corresponds to a Linux software repository. The choice of the channel determines the type and frequency of the updates that are offered to your device. Devicesin`insiders-fast` are the first ones to receive updates and new features in preview, followed by `insiders-slow`, and lastly by `prod`.
268
-
>
269
262
> Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/[version]`.
270
263
271
264
> [!Warning]
@@ -287,7 +280,7 @@ node "default" {
287
280
288
281
Enrolled agent devices periodically poll the Puppet Server and install new configuration profiles and policies as soon as they're detected.
289
282
290
-
## Monitor Puppet deployment
283
+
## Monitor your Puppet deployment
291
284
292
285
On the agent device, you can also check the deployment status by running the following command:
293
286
@@ -327,10 +320,10 @@ To get support from Microsoft, raise a support ticket and provide log files by u
327
320
328
321
## How to configure policies for Microsoft Defender on Linux
329
322
330
-
You can configure antivirus and EDR settings on your endpoints using following methods:
323
+
You can configure antivirus and EDR settings on your endpoints. For more information, see the following articles:
331
324
332
-
- See [Set preferences for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences) to learn more about the available settings
333
-
- See [security settings management](/mem/intune/protect/mde-security-integration) to configure settings in the Microsoft Defender portal.
325
+
- [Set preferences for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences) describes the available settings
326
+
- [Security settings management](/mem/intune/protect/mde-security-integration) describes how to configure settings in the Microsoft Defender portal.
1. Run as a nonroot user to install required dependencies:
121
+
6. Run as a nonroot user to install required dependencies:
122
122
123
123
```bash
124
124
./mde_support_tool.sh
125
125
```
126
126
127
-
1. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
127
+
7. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
128
128
129
129
```bash
130
130
xattr -c MDESupportTools
@@ -136,7 +136,7 @@ The tool currently requires Python version 3 or later to be installed on your de
136
136
137
137
Apple could not verify "MDESupportTool" is free of malware that may harm your Mac or compromise your privacy"
138
138
139
-
1. To collect actual diagnostic package and generate the result archive file, run again as root:
139
+
8. To collect actual diagnostic package and generate the result archive file, run again as root:
140
140
141
141
```bash
142
142
sudo ./mde_support_tool.sh -d
@@ -168,7 +168,8 @@ Use the following command to get the machine diagnostic.
168
168
169
169
Usage example: `sudo ./MDESupportTool -d`
170
170
171
-
NOTE: The log level autoreset feature only available in 2405 or newer client version.
171
+
> [!NOTE]
172
+
> The log level autoreset feature is only available in 2405 or newer client version.
172
173
173
174
### Positional arguments
174
175
@@ -218,4 +219,22 @@ Usage example `./mde_support_tool.sh trace --length 5`
218
219
| `Audited_info.txt` | Details on audited service and related components for [Linux](linux-resources.md) OS. |
219
220
| `perf_benchmark.tar.gz` | The performance test reports. You see this file only if you're using the performance parameter. |
220
221
222
+
## See also
223
+
224
+
### Defender for Endpoint on macOS troubleshooting
225
+
226
+
[Troubleshooting mode in Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-troubleshoot-mode)
227
+
228
+
[Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-install)
229
+
230
+
[Troubleshoot license issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-license)
231
+
232
+
[Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-sys-ext)
233
+
234
+
[Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/troubleshoot-cloud-connect-mdemac)
235
+
236
+
[Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-support-perf-overview)
237
+
238
+
[Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives)
239
+
221
240
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-xdr/microsoft-sentinel-onboard.md
+2-9Lines changed: 2 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ search.appverid:
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
25
-
ms.date: 12/02/2024
25
+
ms.date: 01/08/2025
26
26
---
27
27
28
28
# Connect Microsoft Sentinel to the Microsoft Defender portal
@@ -85,14 +85,7 @@ To connect a Microsoft Sentinel workspace to the Defender portal, complete the f
85
85
1. In the Defender portal, select **Overview**.
86
86
1. Select **Connect a workspace**.
87
87
1. Choose the workspace you want to connect and select **Next**.
88
-
1. Read and understand the product changes associated with connecting your workspace. These changes include:
89
-
90
-
- Incidents are no longer created by Microsoft Sentinel. They're now created by the correlation engine in the Microsoft Defender portal. This change is reflected in the incident's "incident provider name" field, which now reads "Microsoft Defender XDR."
91
-
- Therefore, any active [Microsoft security incident creation rules](/azure/sentinel/threat-detection#microsoft-security-rules) are deactivated to avoid creating duplicate incidents. The incident creation settings in other types of analytics rules remain as they were, but those settings are implemented in the Defender portal, not in Microsoft Sentinel.
92
-
- Log tables, queries, and functions in the Microsoft Sentinel workspace are also available in advanced hunting within the Defender portal.
93
-
- The Microsoft Sentinel Contributor role is assigned to the Microsoft Threat Protection and WindowsDefenderATP apps within the subscription.
94
-
- All alerts related to Defender XDR products are streamed directly from the main Defender XDR data connector to ensure consistency. Make sure you have incidents and alerts from this connector turned on in the workspace.
95
-
88
+
1. Read and understand the product changes associated with connecting your workspace.
96
89
1. Select **Connect**.
97
90
98
91
After your workspace is connected, the banner on the **Overview** page shows that your environment is ready. The **Overview** page is updated with new sections that include metrics from Microsoft Sentinel like the number of data connectors and automation rules.
0 commit comments