Skip to content

Commit 4b7db95

Browse files
Merge pull request #4937 from MicrosoftDocs/main
[AutoPublish] main to live - 09/04 13:30 PDT | 09/05 02:00 IST
2 parents 62777a9 + 22404c2 commit 4b7db95

File tree

3 files changed

+124
-5
lines changed

3 files changed

+124
-5
lines changed

defender-endpoint/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -267,20 +267,22 @@
267267
href: mde-linux-prerequisites.md
268268
- name: Choose a deployment method
269269
items:
270-
- name: Installer script based deployment
271-
href: linux-installer-script.md
272270
- name: Enabling deployment to a custom location
273271
href: linux-custom-location-installation.md
272+
- name: Installer script based deployment
273+
href: linux-installer-script.md
274274
- name: Ansible based deployment
275275
href: linux-install-with-ansible.md
276276
- name: Chef based deployment
277277
href: linux-deploy-defender-for-endpoint-with-chef.md
278278
- name: Puppet based deployment
279279
href: linux-install-with-puppet.md
280-
- name: Saltstack-based deployment
280+
- name: Saltstack based deployment
281281
href: linux-install-with-saltack.md
282282
- name: Manual deployment
283283
href: linux-install-manually.md
284+
- name: Golden image based deployment
285+
href: linux-deploy-defender-for-endpoint-using-golden-images.md
284286
- name: Direct onboarding with Defender for Cloud
285287
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
286288
- name: Configure Defender for Endpoint on Linux
Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
---
2+
title: Deploy Microsoft Defender for Endpoint on Linux using golden images
3+
description: Learn how to use preconfigured virtual machine templates (golden images) for rapid, consistent Microsoft Defender for Endpoint deployment on Linux.
4+
ms.service: defender-endpoint
5+
ms.author: painbar
6+
author: paulinbar
7+
ms.reviewer: meghapriya
8+
ms.localizationpriority: medium
9+
manager: bagol
10+
audience: ITPro
11+
ms.collection:
12+
- m365-security
13+
- tier3
14+
- mde-linux
15+
ms.topic: install-set-up-deploy
16+
ms.subservice: linux
17+
search.appverid: met150
18+
ms.date: 09/04/2025
19+
---
20+
21+
# Deploy Microsoft Defender for Endpoint on Linux using golden images
22+
23+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
24+
25+
**Applies to:**
26+
27+
- Microsoft Defender for Endpoint for servers
28+
- Microsoft Defender for Servers Plan 1 or Plan 2
29+
30+
Golden images are preconfigured virtual machine templates used to rapidly deploy consistent environments. Microsoft Defender for Endpoint on Linux supports golden image deployment across cloud and on-premises environments, with improved handling of machine identifiers and hostnames, ensuring reliable telemetry and device correlation.
31+
32+
This guide walks you through:
33+
34+
- Deploying Microsoft Defender for Endpoint on a golden image.
35+
36+
- Preparing the image for cloning.
37+
38+
- Ensuring unique identifiers for each virtual machine instance.
39+
40+
- Specific steps for cloud and on-premises environments.
41+
42+
## Step 1: Deploy Microsoft Defender for Endpoint on a golden image
43+
44+
1. Prepare the base virtual machine
45+
46+
- Install your preferred [supported Linux distribution](./mde-linux-prerequisites.md#supported-linux-distributions) and apply all necessary system updates.
47+
48+
1. Deploy Microsoft Defender for Endpoint on a golden image
49+
50+
There are several methods and tools that you can use to deploy Microsoft Defender for Endpoint on Linux (applicable to AMD64 and ARM64 Linux servers):
51+
52+
- [Installer script based deployment](./linux-installer-script.md)
53+
54+
- [Ansible based deployment](./linux-install-with-ansible.md)
55+
56+
- [Chef based deployment](./linux-deploy-defender-for-endpoint-with-chef.md)
57+
58+
- [Puppet based deployment](./linux-install-with-puppet.md)
59+
60+
- [SaltStack based deployment](./linux-install-with-saltack.md)
61+
62+
- [Manual deployment](./linux-install-manually.md)
63+
64+
- [Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)
65+
66+
- [Guidance for Defender for Endpoint on Linux Server with SAP](./mde-linux-deployment-on-sap.md)
67+
68+
1. Validate the deployment
69+
70+
Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
71+
72+
```bash
73+
mdatp health
74+
```
75+
76+
> [!NOTE]
77+
> Once Defender is successfully deployed on the golden image, there's no requirement to install and onboard it individually on each cloned machine.
78+
79+
## Step 2: Prepare the golden image for cloning
80+
81+
When deploying Defender for Endpoint on virtual machines, the hardware UUID reported by the system (system-uuid from dmidecode) is used to uniquely identify each instance.
82+
83+
Before making a snapshot of the virtual machine, ensure that each virtual machine clone gets a unique hardware UUID, as described in the following sections.
84+
85+
### On-premises machines
86+
87+
For on-premises environments, configure your virtualization platform so that each clone receives a unique hardware UUID from the underlying hypervisor. Follow these guidelines:
88+
89+
**KVM/libvirt**
90+
91+
- Don't hard-code the `<uuid>` element in the virtual machine's domain XML; if it's omitted, libvirt generates a random one at definition time.
92+
93+
- Alternatively, explicitly create a new UUID using `uuidgen`.
94+
95+
- For streamlined cloning, use `virt-clone` or `virt-manager`, which automatically assign unique UUIDs.
96+
97+
**VMware**
98+
99+
- During cloning, VMware prompts whether to keep the existing UUID or to create a new one. Always select **Create**, or configure `uuid.action = "create"` in the virtual machine's *.vmx* file.
100+
101+
- In VMware Cloud Director, set `backend.cloneBiosUuidOnVmCopy = 0` to force the creation of new UUIDs.
102+
103+
**Hyper-V**
104+
105+
Hyper-V automatically generates a new hardware UUID when you create a virtual machine using Hyper-V Manager or PowerShell ([New-VM](/powershell/module/hyper-v/new-vm)).
106+
107+
### Cloud virtual machines
108+
109+
Cloud platforms (for example, Azure, AWS, GCP) automatically inject unique metadata and identifiers via their instance metadata services (IMDS). No manual steps are required. Microsoft Defender for Endpoint automatically detects and uses these values to generate unique machine IDs.
110+
111+
## Hostname Management
112+
113+
If the hostname of a Linux server is changed after successful deployment of Defender, then you must restart the `mdatp` service to ensure the new hostname is correctly recognized by product.
114+
115+
## Related content
116+
117+
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-office-365/email-authentication-dkim-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Points to address or value: selector2-<CustomDomainWithDashes>._domainkey.<Initi
110110
- **\<CustomDomainWithDashes\>**: The custom domain or subdomain with periods replaced by dashes. For example, `contoso.com` becomes `contoso-com`, or `marketing.contoso.com` becomes `marketing-contoso-com`.
111111
- **\<InitialDomainPrefix\>**: The custom part of the \*.onmicrosoft.com you used to enroll in Microsoft 365. For example, if you used `contoso.onmicrosoft.com`, the value is `contoso`.
112112
- **\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors (for example, r or n). The value is automatically assigned by Microsoft when you add a new custom domain and enable DKIM. The value is determined by Microsoft's internal routing logic and isn't configurable.
113-
- This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025. Existing custom domains and initial domains continue to use the old DKIM format:
113+
- **This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025**. Existing custom domains and initial domains continue to use the old DKIM format:
114114

115115
```text
116116
Hostname: selector1._domainkey
@@ -193,7 +193,7 @@ Proceed if the domain satisfies these requirements.
193193
|Microsoft.Exchange.ManagementTasks.ValidationException|CNAME record does not
194194
exist for this config. Please publish the following two CNAME records first. Domain Name
195195
: contoso.com Host Name : selector1._domainkey Points to address or value: selector1-
196-
contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft.com Host Name : selector2._domainkey
196+
contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft Host Name : selector2._domainkey
197197
Points to address or value: selector2-contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft .
198198
If you have already published the CNAME records, sync will take a few minutes to as
199199
many as 4 days based on your specific DNS. Return and retry this step later.

0 commit comments

Comments
 (0)