You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This document describes the Offline Security Intelligence Update feature of Microsoft Defender for Endpoint on Linux.
30
+
## How offline security intelligence updates work
31
31
32
-
This feature enables an organization to update the security intelligence (also referred to as "definitions" or "signatures" in this document) on Linux endpoints with limited or no exposure to the internet using a local hosting server (termed as*mirror server* in this document).
32
+
This article describes how to configure offline security intelligence updates in Defender for Endpoint on Linux. This capability enables you to update security intelligence (also referred to as *definitions* or *signatures*) on Linux devices that have limited or no exposure to the internet. With this configuration, you use a local hosting server, called a*mirror server*, that connects to the Microsoft cloud to download security intelligence updates. Other Linux devices pull these updates from your mirror server at predefined intervals.
33
33
34
-
Mirror server is any server in the customer's environment that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints pull the signatures from the mirror server at a predefined interval.
34
+
## Benefits of using offline security intelligence updates
35
35
36
36
Key benefits include:
37
37
38
-
-Ability to control and manage the frequency of signature downloads on the local server and the frequency at which endpoints pull the signatures from the local server.
39
-
-Addition of an extra layer of protection and control as the downloaded signatures can be tested on a test device before being propagated to the entire fleet.
40
-
-Reduction of network bandwidth as now only one local server will poll MS cloud to get the latest signatures on behalf of your entire fleet.
41
-
-Ability of the local server to run any of the three OS - Windows, Mac, Linux; no requirement to install Defender for Endpoint.
42
-
-Provision for the most up-to-date antivirus protection as signatures are always downloaded along with the latest compatible AV engine.
43
-
-Migration of signature with n-1 version to a backup folder on the local server, in each iteration. Provision to pull the n-1 signature version from the backup folder to your endpoints, if there's any issue with the latest signature.
44
-
-Option to fall back to online updates from Microsoft cloud (traditional method), in the event of a rare occasion of an offline update failure.
38
+
-Your security team can control and manage the frequency of signature downloads on the local server and the frequency at which endpoints pull signatures from the local server.
39
+
-You have an extra layer of protection and control as the downloaded signatures can be tested on a test device before they're propagated to the entire fleet.
40
+
-You need less network bandwidth, because only one local server gets the latest updates from the Microsoft cloud on behalf of your entire fleet.
41
+
-Your mirror server can run Windows, Mac, or Linux, and you don't have to install Defender for Endpoint on that server.
42
+
-You get the most up-to-date antivirus protection, because signatures are always downloaded along with the latest compatible antivirus engine.
43
+
-Older versions of signatures (`n-1`) are moved to a backup folder on your mirror server in each iteration. If there's an issue with the latest updates, you can pull the `n-1` signature version from the backup folder to your devices.
44
+
-In the rare event an offline update fails, you can configure a fallback option to get online updates from the Microsoft cloud.
45
45
46
46
## How offline security intelligence update works
47
47
48
-
-Organizations need to set up a mirror server, which is a local Web/NFS server that's reachable by the Microsoft cloud.
49
-
- Signatures are downloaded from Microsoft cloud on this mirror server by executing a script using cron job/task scheduler on the local server.
50
-
- Linux endpoints running Defender for Endpoint pull the downloaded signatures from this mirror server at a user-defined time interval.
51
-
- Signatures pulled on the Linux endpoints from the local server are first verified before getting loaded into the AV engine.
52
-
- To trigger and configure the update process, update the managed config json file on the Linux endpoints.
53
-
-The status of the update can be seen on the mdatp CLI.
48
+
-You set up a mirror server, which is a local Web or NFS server that's reachable by the Microsoft cloud.
49
+
- Signatures are downloaded from Microsoft cloud on this mirror server by executing a script using cron job or task scheduler on the local server.
50
+
- Linux endpoints running Defender for Endpoint pull the downloaded signatures from the mirror server at a predefined time interval.
51
+
- Signatures pulled onto Linux devices from the local server are first verified before they're loaded into the antivirus engine.
52
+
- To start and configure the update process, you can update the managed configuration json file on your Linux devices.
53
+
-You can view the status of updates in the mdatp CLI.
54
54
55
55
:::image type="content" source="./media/offline-update-diag-1.png" alt-text="Process flow diagram on the Mirror Server for downloading the security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
56
56
57
-
Fig. 1: Process flow diagram on the Mirror Server for downloading the security intelligence updates
57
+
Fig. 1: Process flow diagram on the mirror server for downloading the security intelligence updates
58
58
59
59
:::image type="content" source="./media/offline-update-diag-2.png" alt-text="Process flow diagram on the Linux endpoint for security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
60
60
@@ -70,8 +70,8 @@ The mirror server can run any of the following operating systems:
70
70
71
71
- Defender for Endpoint version `101.24022.0001` or later must be installed on the Linux endpoints.
72
72
- The Linux endpoints need to have connectivity to the mirror server.
73
-
- The Linux endpoint must be running any of the Defender for Endpoint-supported distributions.
74
-
- The mirror server can be either an HTTP/HTTPS server or a network share server, for example, an NFS Server.
73
+
- The Linux endpoint must be running any of the Defender for Endpoint-supported distributions. (see [Supported Linux distributions](mde-linux-prerequisites.md#supported-linux-distributions).)
74
+
- The mirror server can be either an HTTP/HTTPS server or a network share server, such as an NFS Server.
75
75
- The mirror server needs to have access to the following URLs:
@@ -83,13 +83,13 @@ The mirror server can run any of the following operating systems:
83
83
| 2 cores (Preferred 4 Core) | 1 GB Min (Preferred 4 GB) | 2 GB | System Dependent|
84
84
85
85
> [!NOTE]
86
-
> This configuration may vary depending on the number of requests that are served and the load each server must process.
86
+
> This configuration might vary depending on the number of requests that are served and the load each server must process.
87
87
88
88
## Configuring the mirror server
89
89
90
90
> [!NOTE]
91
91
> - The management and ownership of the Mirror Server lies solely with the customer as it resides in the customer's private environment.
92
-
> - The Mirror Server does not need to have Defender for Endpoint installed.
92
+
> - The Mirror Server doesn't need to have Defender for Endpoint installed.
93
93
94
94
### Get the offline security intelligence downloader script
95
95
@@ -99,22 +99,25 @@ Perform the following steps to get the downloader script:
99
99
100
100
#### Option 1: Clone the repo (Preferred)
101
101
102
-
-[Install git](https://kinsta.com/knowledgebase/install-git/) on the mirror server.
103
-
- Navigate to the directory where you want to clone the repo.
104
-
- Execute the command: `git clone https://github.com/microsoft/mdatp-xplat.git`
102
+
1.[Install git](https://kinsta.com/knowledgebase/install-git/) on the mirror server.
105
103
106
-
#### Option 2: Download the zip file
104
+
2. Navigate to the directory where you want to clone the repo.
107
105
108
-
- Download the zip file of the repo [from here](https://github.com/microsoft/mdatp-xplat/archive/refs/heads/master.zip).
106
+
3. Run the following command: `git clone https://github.com/microsoft/mdatp-xplat.git`
109
107
110
-
- Copy the zip file to the folder where you want to keep the script.
108
+
#### Option 2: Download the zipped file
111
109
112
-
- Extract the zip.
110
+
1.[Download the zipped file](https://github.com/microsoft/mdatp-xplat/archive/refs/heads/master.zip).
113
111
114
-
> [!NOTE]
115
-
> Schedule a [cron job](linux-update-mde-linux.md#to-set-the-cron-job) to keep the repo/downloaded zip file updated to the latest version at regular intervals.
112
+
2. Copy the downloaded file to the folder where you want to keep the script.
113
+
114
+
3. Extract the zipped folder.
115
+
116
+
4. Schedule a task or a [cron job](linux-update-mde-linux.md#to-set-the-cron-job) to keep the repo/downloaded zip file updated to the latest version at regular intervals.
117
+
118
+
#### Local directory structure after cloning the repo or downloading the zipped file
116
119
117
-
After cloning the repo/downloaded zip file, the local directory structure should be as follows:
120
+
After cloning the repo or downloading the zipped file, the local directory structure should be as follows:
118
121
119
122
```console
120
123
user@vm:~/mdatp-xplat$ tree linux/definition_downloader/
@@ -170,11 +173,11 @@ Once the signatures zip is downloaded, the mirror server can be used to host it.
170
173
Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
171
174
172
175
> [!NOTE]
173
-
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that this within this directory, there are the`arch_*` directories).
176
+
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that within the directory, there are `arch_*` directories).
174
177
>
175
-
> We can also use the absolute path of directory (local/remote mount point). For example, if the files were downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
178
+
> You can also use the absolute path of directory (local/remote mount point). For example, if the files are downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
176
179
177
-
Once the mirror server is set up, we need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
180
+
Once the mirror server is set up, you need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
178
181
179
182
## Configure the endpoints
180
183
@@ -202,12 +205,12 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
202
205
|`automaticDefinitionUpdateEnabled`|`True`/`False`| Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
203
206
|`definitionUpdatesInterval`| Numeric | Time of interval between each automatic update of signatures (in seconds). |
204
207
|`offlineDefinitionUpdateUrl`| String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). See the previous section for information about how to specify this path.|
205
-
|`offlineDefinitionUpdate`|`enabled`/`disabled`| When set to `enabled`, the "offline security intelligence update" feature is enabled, and vice versa. |
206
-
|`offlineDefinitionUpdateFallbackToCloud`|`True`/`False`| Determine Defender for Endpoint security intelligence update approach when "offline mirror server" fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when "offline security intelligence update" failed; else, vice versa. |
208
+
|`offlineDefinitionUpdate`|`enabled`/`disabled`| When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
209
+
|`offlineDefinitionUpdateFallbackToCloud`|`True`/`False`| Determine Defender for Endpoint security intelligence update approach when offline mirror server fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when offline security intelligence update failed; else, vice versa. |
207
210
|`offlineDefinitionUpdateVerifySig`|`enabled`/`disabled`| When set to `enabled`, downloaded definitions are verified on the endpoints; else, vice versa. |
208
211
209
212
> [!NOTE]
210
-
> As of today, the "offline security intelligence update" feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
213
+
> Currently, offline security intelligence updates can be configured on Linux endpoints via managed json only. Integration with Defender for Endpoint security settings management in the Microsoft Defender portal is on the roadmap, but isn't available yet.
- To trigger the "offline security intelligence update" manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
249
+
- To trigger the offline security intelligence update manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
247
250
248
251
```bash
249
252
mdatp definitions update
250
253
```
251
254
252
255
### Check update status
253
256
254
-
- After triggering the "offline security intelligence update" by either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
257
+
- After triggering offline security intelligence updates by using either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
Copy file name to clipboardExpand all lines: defender-office-365/submissions-teams.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ appliesto:
28
28
29
29
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
30
30
31
-
Users can report messages in Teams from chats, including chats with external users, standard channels, and meeting conversations. Users can only report messages as malicious.
31
+
Users can report messages in Teams from chats, standard channels, and meeting conversations. Users can only report messages as malicious.
32
32
33
33
> [!NOTE]
34
34
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).
0 commit comments