Skip to content

Commit 48df9bd

Browse files
authored
Merge pull request #1072 from MicrosoftDocs/main
Publish main to live, Thursday 3:30PM PDT, 08/01
2 parents 543eb1a + 6a3f9a5 commit 48df9bd

File tree

47 files changed

+358
-905
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+358
-905
lines changed

defender-endpoint/edr-detection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 01/15/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -54,11 +54,11 @@ powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionP
5454

5555
### Linux
5656

57-
1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
57+
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server
5858

5959

6060
```bash
61-
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
61+
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6262
```
6363

6464
1. Extract the zip

defender-endpoint/linux-install-manually.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -42,7 +42,7 @@ This article describes how to deploy Microsoft Defender for Endpoint on Linux ma
4242
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
4343
- [Mariner](#mariner)
4444
- [Application installation](#application-installation)
45-
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
45+
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
4646
- [SLES and variants](#sles-and-variants)
4747
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
4848
- [Mariner](#mariner-1)
@@ -58,9 +58,9 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
5858
5959
## Configure the Linux software repository
6060

61-
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
61+
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted as *[channel]*): *insiders-fast*, *insiders-slow*, or `prod`. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
6262

63-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
63+
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by `prod`.
6464

6565
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
6666

@@ -91,7 +91,7 @@ Options:
9191

9292
Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation).
9393

94-
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)
94+
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
9595

9696
- Install `yum-utils` if it isn't installed yet:
9797

@@ -128,7 +128,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
128128
> [!TIP]
129129
> Use hostnamectl command to identify system related information including release *[version]*.
130130
131-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
131+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
132132

133133
```bash
134134
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
@@ -160,7 +160,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
160160
> [!TIP]
161161
> Use SPident command to identify system related information including release *[version]*.
162162
163-
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
163+
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
164164

165165
```bash
166166
sudo zypper addrepo -c -f -n microsoft-prod https://packages.microsoft.com/config/sles/12/prod.repo
@@ -198,7 +198,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
198198
> [!TIP]
199199
> Use hostnamectl command to identify system related information including release *[version]*.
200200
201-
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
201+
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
202202

203203
```bash
204204
curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
@@ -210,7 +210,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
210210
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
211211
```
212212

213-
For example, if you chose *prod* channel:
213+
For example, if you chose `prod` channel:
214214

215215
```bash
216216
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
@@ -263,7 +263,7 @@ curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | su
263263
> [!NOTE]
264264
> On Mariner, Insider Fast Channel is not available.
265265
266-
If you want to deploy Defender for Endpoint on Linux from the *prod* channel. Use the following commands
266+
If you want to deploy Defender for Endpoint on Linux from the `prod` channel. Use the following commands
267267

268268
```bash
269269
sudo dnf install mariner-repos-extras
@@ -476,7 +476,7 @@ Download the onboarding package from Microsoft Defender portal.
476476
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
477477
```
478478
479-
- You can run additional detection tests on zip files using either of the following commands:
479+
- You can run more detection tests on zip files using either of the following commands:
480480
481481
```bash
482482
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
@@ -493,7 +493,7 @@ Download the onboarding package from Microsoft Defender portal.
493493
494494
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
495495
496-
- Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
496+
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
497497
498498
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
499499
@@ -503,16 +503,16 @@ Download the onboarding package from Microsoft Defender portal.
503503
504504
The following external package dependencies exist for the mdatp package:
505505
506-
- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"
507-
- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"
508-
- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"
509-
- For Mariner the mdatp package requires "attr", "audit", "diffutils", "libacl", "libattr", "libselinux-utils", "selinux-policy", "policycoreutils", "mde-netfilter"
506+
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
507+
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
508+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
509+
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
510510
511511
The mde-netfilter package also has the following package dependencies:
512512
513-
- For DEBIAN, the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"
514-
- For RPM, the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
515-
- For Mariner, the mde-netfilter package requires "libnfnetlink", "libnetfilter_queue"
513+
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1`, `libglib2.0-0`
514+
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
515+
- For Mariner, the mde-netfilter package requires `libnfnetlink`, `libnetfilter_queue`
516516
517517
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
518518
@@ -523,7 +523,7 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
523523
524524
## How to migrate from Insiders-Fast to Production channel
525525
526-
1. Uninstall the "Insiders-Fast channel" version of Defender for Endpoint on Linux.
526+
1. Uninstall the `Insiders-Fast channel` version of Defender for Endpoint on Linux.
527527
528528
```bash
529529
sudo yum remove mdatp
@@ -536,13 +536,13 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
536536
```
537537
538538
> [!NOTE]
539-
> The output should show "packages-microsoft-com-fast-prod".
539+
> The output should show `packages-microsoft-com-fast-prod`.
540540
541541
```bash
542542
sudo yum-config-manager --disable packages-microsoft-com-fast-prod
543543
```
544544
545-
1. Redeploy Microsoft Defender for Endpoint on Linux using the "Production channel".
545+
1. Redeploy Microsoft Defender for Endpoint on Linux using the Production channel.
546546
547547
## Uninstallation
548548

defender-endpoint/mac-install-with-intune.md

Lines changed: 16 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/20/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -65,7 +65,7 @@ In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2
6565

6666
1. Under **Configuration profiles**, select **Create Profile**.
6767

68-
This profile is needed for Big Sur (11) or later. It is ignored on older versions of macOS, because they use the kernel extension.
68+
This profile is needed for Big Sur (11) or later. It's ignored on older versions of macOS, because they use the kernel extension.
6969

7070
1. On the **Policies** tab, select **Create** > **New Policy**.
7171

@@ -100,7 +100,7 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
100100

101101
Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
102102

103-
To configure network filter:
103+
To configure your network filter:
104104

105105
1. Under **Configuration profiles**, select **Create Profile**.
106106

@@ -160,7 +160,7 @@ To configure Full Disk Access:
160160
1. Review the configuration profile. Select **Create**.
161161

162162
> [!NOTE]
163-
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
163+
> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in **System Settings** > **Privacy & Security** > **Full Disk Access**.
164164
165165
### Step 4: Background services
166166

@@ -267,10 +267,10 @@ Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/b
267267

268268
### Step 7: Bluetooth permissions
269269

270-
> [!CAUTION]
271-
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
270+
> [!CAUTION]
271+
> macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
272272
273-
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings above to enable Bluetooth access.
273+
Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings mentioned earlier in this article to enable Bluetooth access.
274274

275275
> [!NOTE]
276276
> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
@@ -288,7 +288,7 @@ For more information, see [Deploy updates for Microsoft Defender for Endpoint on
288288
Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/settings/microsoft_auto_update).
289289

290290
> [!NOTE]
291-
> The sample AutoUpdate2.mobileconfig from the GitHub repository has it set to Current Channel (Production).
291+
> The sample `AutoUpdate2.mobileconfig` from the GitHub repository has it set to Current Channel (Production).
292292
293293
1. Under **Configuration profiles**, select **Create Profile**.
294294

@@ -316,31 +316,15 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
316316

317317
### Step 9: Microsoft Defender for Endpoint configuration settings
318318

319-
In this step, we go over *Preferences* that enables you to configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) **or** Microsoft Intune ([https://intune.microsoft.com](https://intune.microsoft.com)).
319+
In this step, we go over *Preferences* that enables you to configure anti-malware and EDR policies using Microsoft Intune ([https://intune.microsoft.com](https://intune.microsoft.com)).
320320

321-
#### 9a. Set policies using Microsoft Defender portal
322-
323-
1. Go through [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender for Endpoint Security Settings Management.
324-
325-
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
326-
327-
3. Under **Select Platform**, select **macOS**.
328-
329-
4. Under **Select Template**, choose a template and select **Create Policy**.
330-
331-
5. Specify a name and description for the policy, and then select **Next**.
332-
333-
6. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
334-
335-
For more information about managing security settings, see:
336-
337-
- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)
338-
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
321+
> [!NOTE]
322+
> If managed via Intune, it will not allow for the device to register via the Microsoft Defender for Endpoint Security Settings Management ([Microsoft Defender XDR portal (https://security.microsoft.com)](Microsoft Defender XDR portal (https://security.microsoft.com) or)).
339323
340324
> [!IMPORTANT]
341-
> The policies set via Intune will take precedence over the Microsoft Defender for Endpoint Security Settings Management.
342-
343-
#### Set policies using Microsoft Intune
325+
> Important
326+
> Only the policies set via Intune will take effect, and the Microsoft Defender for Endpoint Security Settings Management will not be used.
327+
#### **Set policies using Microsoft Intune**
344328

345329
You can manage the security settings for Microsoft Defender for Endpoint on macOS under **Setting Preferences** in Microsoft Intune.
346330

@@ -372,9 +356,8 @@ In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?t
372356

373357
1. Review the policy in **Review+Create** and select **Save**.
374358

375-
376359
> [!TIP]
377-
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the .mobileconig from step 8.
360+
> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the `.mobileconfig` from step 8.
378361
379362
### Step 11: Device Control for Microsoft Defender for Endpoint on macOS
380363

@@ -463,7 +446,7 @@ You can visit **Apps** > **By platform** > **macOS** to see it on the list of al
463446
For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
464447

465448
> [!IMPORTANT]
466-
> You should create and deploy the configuration profiles in the above order (step 1-13) for a successful system configuration.
449+
> You should create and deploy the configuration profiles in the order specified (steps 1-13) for a successful system configuration.
467450
468451
#### Step 15: Download the onboarding package
469452

defender-endpoint/mde-plugin-wsl.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 07/26/2024
18+
ms.date: 08/01/2024
1919
search.appverid: MET150
2020
---
2121

@@ -192,7 +192,7 @@ To test the plug-in after installation, follow these steps:
192192

193193
2. Run the command `wsl`.
194194

195-
3. Download and extract the script file from [https://aka.ms/LinuxDIY](https://aka.ms/LinuxDIY).
195+
3. Download and extract the script file from [https://aka.ms/MDE-Linux-EDR-DIY](https://aka.ms/MDE-Linux-EDR-DIY).
196196

197197
4. At the Linux prompt, run the command `./mde_linux_edr_diy.sh`.
198198

defender-endpoint/network-protection-macos.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent macOS connections to bad sites
33
description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 12/08/2023
6+
ms.date: 08/01/2024
77
audience: ITPro
88
author: siosulli
99
ms.author: siosulli
@@ -128,9 +128,10 @@ To confirm that network protection has been started successfully, run the follow
128128
mdatp health --field network_protection_status
129129
```
130130

131-
#### JAMF deployment
131+
#### JAMF Pro deployment
132+
133+
A successful JAMF Pro deployment requires a configuration profile to set the enforcement level of network protection.
132134

133-
A successful JAMF deployment requires a configuration profile to set the enforcement level of network protection.
134135
After you create this configuration profile, assign it to the devices where you want to enable network protection.
135136

136137
##### Configure the enforcement level

defender-endpoint/tamperprotection-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 01/29/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Protect macOS security settings with tamper protection
@@ -298,7 +298,7 @@ Tampering alert is raised in the Microsoft Defender portal
298298
- Try to stop the Defender for Endpoint process (kill).
299299
- Try to delete, rename, modify, move Defender for Endpoint files (similar to what a malicious user would do), for example:
300300

301-
- /Applications/Microsoft Defender ATP.app/
301+
- /Applications/Microsoft Defender.app/
302302
- /Library/LaunchDaemons/com.microsoft.fresno.plist
303303
- /Library/LaunchDaemons/com.microsoft.fresno.uninstall.plist
304304
- /Library/LaunchAgents/com.microsoft.wdav.tray.plist

0 commit comments

Comments
 (0)