Skip to content

Commit 4ee09a5

Browse files
authored
Merge pull request #1298 from meghapriyams/docs-editor/microsoft-defender-endpoint-li-1725885845
Update microsoft-defender-endpoint-linux.md
2 parents e9565b7 + feb8577 commit 4ee09a5

File tree

1 file changed

+22
-30
lines changed

1 file changed

+22
-30
lines changed

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 22 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/17/2024
18+
ms.date: 09/09/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -48,7 +48,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4848
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
4949
5050
- Beginner-level experience in Linux and BASH scripting
51-
- Administrative privileges on the device (in case of manual deployment)
51+
- Administrative privileges on the device (for manual deployment)
5252

5353
> [!NOTE]
5454
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent). Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
@@ -78,7 +78,14 @@ In general you need to take the following steps:
7878
7979
### System requirements
8080

81-
- Supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
81+
- Disk space: 2 GB
82+
> [!NOTE]
83+
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
84+
- Cores: 2 minimum, 4 preferred
85+
> [!NOTE]
86+
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
87+
- Memory: 1 GB minimum, 4 preferred
88+
- List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
8289
- Red Hat Enterprise Linux 6.7 or higher (In preview)
8390
- Red Hat Enterprise Linux 7.2 or higher
8491
- Red Hat Enterprise Linux 8.x
@@ -97,21 +104,18 @@ In general you need to take the following steps:
97104
- Oracle Linux 9.x
98105
- Amazon Linux 2
99106
- Amazon Linux 2023
100-
- Fedora 33-38
101-
107+
- Fedora 33-38
102108
- Rocky 8.7 and higher
103-
- Rocky 9.2 and higher
104-
109+
- Rocky 9.2 and higher
105110
- Alma 8.4 and higher
106-
- Alma 9.2 and higher
107-
111+
- Alma 9.2 and higher
108112
- Mariner 2
109-
110-
> [!NOTE]
111-
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
112-
> With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; MDE Linux support for RHEL 6 will also be deprecated by June 30, 2024
113-
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
114-
> Microsoft Defender Vulnerablity Management is not supported on Rocky and Alma currently.
113+
114+
> [!NOTE]
115+
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
116+
> With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; MDE Linux support for RHEL 6 will also be deprecated by June 30, 2024
117+
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
118+
> Microsoft Defender Vulnerablity Management is not supported on Rocky and Alma currently.
115119
116120
- List of supported kernel versions
117121

@@ -161,20 +165,6 @@ In general you need to take the following steps:
161165
> [!CAUTION]
162166
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
163167
164-
- Disk space: 2 GB
165-
166-
> [!NOTE]
167-
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections.
168-
169-
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
170-
171-
- Cores: 2 minimum, 4 preferred
172-
173-
- Memory: 1 GB minimum, 4 preferred
174-
175-
> [!NOTE]
176-
> Please make sure that you have free disk space in /var.
177-
178168
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
179169

180170
|RTP, Quick, Full Scan| Custom Scan|
@@ -197,13 +187,15 @@ In general you need to take the following steps:
197187
|xfs|
198188

199189

200-
After you've enabled the service, you m need to configure your network or firewall to allow outbound connections between it and your endpoints.
190+
After you've enabled the service, you need to configure your network or firewall to allow outbound connections between it and your endpoints.
201191

202192
- Audit framework (`auditd`) must be enabled.
203193

204194
> [!NOTE]
205195
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
206196
197+
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
198+
207199
### External package dependency
208200
The following external package dependencies exist for the mdatp package:
209201
- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"

0 commit comments

Comments
 (0)