Skip to content

Commit 55f576c

Browse files
Merge pull request #3330 from MicrosoftDocs/main
Publish main to live, 03/31/25, 3:30 PM PDT
2 parents ef122d0 + d2edd6e commit 55f576c

File tree

5 files changed

+84
-72
lines changed

5 files changed

+84
-72
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ permissions:
55

66
on:
77
schedule:
8-
- cron: "0 */12 * * *"
8+
- cron: "0 9 1 * *"
99

10-
workflow_dispatch:
10+
# workflow_dispatch:
1111

1212

1313
jobs:
@@ -21,6 +21,6 @@ jobs:
2121
"ExampleBranch1",
2222
"ExampleBranch2"
2323
]'
24-
ReportOnly: true
24+
ReportOnly: false
2525
secrets:
2626
AccessToken: ${{ secrets.GITHUB_TOKEN }}

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 71 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
3-
description: Offline Security Intelligence Update in Microsoft Defender for Endpoint on Linux.
2+
title: Configure offline security intelligence updates for Microsoft Defender for Endpoint on Linux
3+
description: Learn how to set up offline security intelligence updates in Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
55
ms.subservice: linux
66
ms.author: deniseb
@@ -15,10 +15,10 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/28/2025
18+
ms.date: 03/31/2025
1919
---
2020

21-
# Configure offline security intelligence update for Microsoft Defender for Endpoint on Linux
21+
# Configure offline security intelligence updates for Microsoft Defender for Endpoint on Linux
2222

2323
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)]
2424

@@ -27,34 +27,34 @@ ms.date: 03/28/2025
2727
- Microsoft Defender for Endpoint for servers
2828
- Microsoft Defender for Servers Plan 1 or Plan 2
2929

30-
This document describes the Offline Security Intelligence Update feature of Microsoft Defender for Endpoint on Linux.
30+
## How offline security intelligence updates work
3131

32-
This feature enables an organization to update the security intelligence (also referred to as "definitions" or "signatures" in this document) on Linux endpoints with limited or no exposure to the internet using a local hosting server (termed as *mirror server* in this document).
32+
This article describes how to configure offline security intelligence updates in Defender for Endpoint on Linux. This capability enables you to update security intelligence (also referred to as *definitions* or *signatures*) on Linux devices that have limited or no exposure to the internet. With this configuration, you use a local hosting server, called a *mirror server*, that connects to the Microsoft cloud to download security intelligence updates. Other Linux devices pull these updates from your mirror server at predefined intervals.
3333

34-
Mirror server is any server in the customer's environment that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints pull the signatures from the mirror server at a predefined interval.
34+
## Benefits of using offline security intelligence updates
3535

3636
Key benefits include:
3737

38-
- Ability to control and manage the frequency of signature downloads on the local server and the frequency at which endpoints pull the signatures from the local server.
39-
- Addition of an extra layer of protection and control as the downloaded signatures can be tested on a test device before being propagated to the entire fleet.
40-
- Reduction of network bandwidth as now only one local server will poll MS cloud to get the latest signatures on behalf of your entire fleet.
41-
- Ability of the local server to run any of the three OS - Windows, Mac, Linux; no requirement to install Defender for Endpoint.
42-
- Provision for the most up-to-date antivirus protection as signatures are always downloaded along with the latest compatible AV engine.
43-
- Migration of signature with n-1 version to a backup folder on the local server, in each iteration. Provision to pull the n-1 signature version from the backup folder to your endpoints, if there's any issue with the latest signature.
44-
- Option to fall back to online updates from Microsoft cloud (traditional method), in the event of a rare occasion of an offline update failure.
38+
- Your security team can control and manage the frequency of signature downloads on the local server and the frequency at which endpoints pull signatures from the local server.
39+
- You have an extra layer of protection and control as the downloaded signatures can be tested on a test device before they're propagated to the entire fleet.
40+
- You need less network bandwidth, because only one local server gets the latest updates from the Microsoft cloud on behalf of your entire fleet.
41+
- Your mirror server can run Windows, Mac, or Linux, and you don't have to install Defender for Endpoint on that server.
42+
- You get the most up-to-date antivirus protection, because signatures are always downloaded along with the latest compatible antivirus engine.
43+
- Older versions of signatures (`n-1`) are moved to a backup folder on your mirror server in each iteration. If there's an issue with the latest updates, you can pull the `n-1` signature version from the backup folder to your devices.
44+
- In the rare event an offline update fails, you can configure a fallback option to get online updates from the Microsoft cloud.
4545

4646
## How offline security intelligence update works
4747

48-
- Organizations need to set up a mirror server, which is a local Web/NFS server that's reachable by the Microsoft cloud.
49-
- Signatures are downloaded from Microsoft cloud on this mirror server by executing a script using cron job/task scheduler on the local server.
50-
- Linux endpoints running Defender for Endpoint pull the downloaded signatures from this mirror server at a user-defined time interval.
51-
- Signatures pulled on the Linux endpoints from the local server are first verified before getting loaded into the AV engine.
52-
- To trigger and configure the update process, update the managed config json file on the Linux endpoints.
53-
- The status of the update can be seen on the mdatp CLI.
48+
- You set up a mirror server, which is a local Web or NFS server that's reachable by the Microsoft cloud.
49+
- Signatures are downloaded from Microsoft cloud on this mirror server by executing a script using cron job or task scheduler on the local server.
50+
- Linux endpoints running Defender for Endpoint pull the downloaded signatures from the mirror server at a predefined time interval.
51+
- Signatures pulled onto Linux devices from the local server are first verified before they're loaded into the antivirus engine.
52+
- To start and configure the update process, you can update the managed configuration json file on your Linux devices.
53+
- You can view the status of updates in the mdatp CLI.
5454

5555
:::image type="content" source="./media/offline-update-diag-1.png" alt-text="Process flow diagram on the Mirror Server for downloading the security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
5656

57-
Fig. 1: Process flow diagram on the Mirror Server for downloading the security intelligence updates
57+
Fig. 1: Process flow diagram on the mirror server for downloading the security intelligence updates
5858

5959
:::image type="content" source="./media/offline-update-diag-2.png" alt-text="Process flow diagram on the Linux endpoint for security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
6060

@@ -70,8 +70,8 @@ The mirror server can run any of the following operating systems:
7070

7171
- Defender for Endpoint version `101.24022.0001` or later must be installed on the Linux endpoints.
7272
- The Linux endpoints need to have connectivity to the mirror server.
73-
- The Linux endpoint must be running any of the Defender for Endpoint-supported distributions.
74-
- The mirror server can be either an HTTP/HTTPS server or a network share server, for example, an NFS Server.
73+
- The Linux endpoint must be running any of the Defender for Endpoint-supported distributions. (see [Supported Linux distributions](mde-linux-prerequisites.md#supported-linux-distributions).)
74+
- The mirror server can be either an HTTP/HTTPS server or a network share server, such as an NFS Server.
7575
- The mirror server needs to have access to the following URLs:
7676
- `https://github.com/microsoft/mdatp-xplat.git`
7777
- `https://go.microsoft.com/fwlink/?linkid=2144709`
@@ -83,13 +83,13 @@ The mirror server can run any of the following operating systems:
8383
| 2 cores (Preferred 4 Core) | 1 GB Min (Preferred 4 GB) | 2 GB | System Dependent|
8484

8585
> [!NOTE]
86-
> This configuration may vary depending on the number of requests that are served and the load each server must process.
86+
> This configuration might vary depending on the number of requests that are served and the load each server must process.
8787
8888
## Configuring the mirror server
8989

9090
> [!NOTE]
9191
> - The management and ownership of the Mirror Server lies solely with the customer as it resides in the customer's private environment.
92-
> - The Mirror Server does not need to have Defender for Endpoint installed.
92+
> - The Mirror Server doesn't need to have Defender for Endpoint installed.
9393
9494
### Get the offline security intelligence downloader script
9595

@@ -99,22 +99,25 @@ Perform the following steps to get the downloader script:
9999

100100
#### Option 1: Clone the repo (Preferred)
101101

102-
- [Install git](https://kinsta.com/knowledgebase/install-git/) on the mirror server.
103-
- Navigate to the directory where you want to clone the repo.
104-
- Execute the command: `git clone https://github.com/microsoft/mdatp-xplat.git`
102+
1. [Install git](https://kinsta.com/knowledgebase/install-git/) on the mirror server.
105103

106-
#### Option 2: Download the zip file
104+
2. Navigate to the directory where you want to clone the repo.
107105

108-
- Download the zip file of the repo [from here](https://github.com/microsoft/mdatp-xplat/archive/refs/heads/master.zip).
106+
3. Run the following command: `git clone https://github.com/microsoft/mdatp-xplat.git`
109107

110-
- Copy the zip file to the folder where you want to keep the script.
108+
#### Option 2: Download the zipped file
111109

112-
- Extract the zip.
110+
1. [Download the zipped file](https://github.com/microsoft/mdatp-xplat/archive/refs/heads/master.zip).
113111

114-
> [!NOTE]
115-
> Schedule a [cron job](linux-update-mde-linux.md#to-set-the-cron-job) to keep the repo/downloaded zip file updated to the latest version at regular intervals.
112+
2. Copy the downloaded file to the folder where you want to keep the script.
113+
114+
3. Extract the zipped folder.
115+
116+
4. Schedule a task or a [cron job](linux-update-mde-linux.md#to-set-the-cron-job) to keep the repo/downloaded zip file updated to the latest version at regular intervals.
117+
118+
#### Local directory structure after cloning the repo or downloading the zipped file
116119

117-
After cloning the repo/downloaded zip file, the local directory structure should be as follows:
120+
After cloning the repo or downloading the zipped file, the local directory structure should be as follows:
118121

119122
```console
120123
user@vm:~/mdatp-xplat$ tree linux/definition_downloader/
@@ -170,11 +173,11 @@ Once the signatures zip is downloaded, the mirror server can be used to host it.
170173
Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
171174

172175
> [!NOTE]
173-
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that this within this directory, there are the `arch_*` directories).
176+
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that within the directory, there are `arch_*` directories).
174177
>
175-
> We can also use the absolute path of directory (local/remote mount point). For example, if the files were downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
178+
> You can also use the absolute path of directory (local/remote mount point). For example, if the files are downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
176179
177-
Once the mirror server is set up, we need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
180+
Once the mirror server is set up, you need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
178181

179182
## Configure the endpoints
180183

@@ -202,12 +205,12 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
202205
| `automaticDefinitionUpdateEnabled` | `True`/`False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
203206
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
204207
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). See the previous section for information about how to specify this path.|
205-
| `offlineDefinitionUpdate` | `enabled`/`disabled` | When set to `enabled`, the "offline security intelligence update" feature is enabled, and vice versa. |
206-
| `offlineDefinitionUpdateFallbackToCloud` | `True`/`False` | Determine Defender for Endpoint security intelligence update approach when "offline mirror server" fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when "offline security intelligence update" failed; else, vice versa. |
208+
| `offlineDefinitionUpdate` | `enabled`/`disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
209+
| `offlineDefinitionUpdateFallbackToCloud` | `True`/`False` | Determine Defender for Endpoint security intelligence update approach when offline mirror server fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when offline security intelligence update failed; else, vice versa. |
207210
| `offlineDefinitionUpdateVerifySig` | `enabled`/`disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints; else, vice versa. |
208211

209212
> [!NOTE]
210-
> As of today, the "offline security intelligence update" feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
213+
> Currently, offline security intelligence updates can be configured on Linux endpoints via managed json only. Integration with Defender for Endpoint security settings management in the Microsoft Defender portal is on the roadmap, but isn't available yet.
211214
212215
### Verify the configuration
213216

@@ -243,15 +246,15 @@ offline_definition_update_fallback_to_cloud : false[managed]
243246

244247
### Manual update
245248

246-
- To trigger the "offline security intelligence update" manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
249+
- To trigger the offline security intelligence update manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
247250

248251
```bash
249252
mdatp definitions update
250253
```
251254

252255
### Check update status
253256

254-
- After triggering the "offline security intelligence update" by either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
257+
- After triggering offline security intelligence updates by using either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
255258

256259
- Verify the following fields:
257260

@@ -266,33 +269,37 @@ offline_definition_update_fallback_to_cloud : false[managed]
266269

267270
## Troubleshooting and diagnostics
268271

269-
### Issues: MDATP update failure
272+
If updates fail, are stuck, or don't start, follow these steps to troubleshoot:
270273

271-
- Update stuck, or update didn't trigger.
272-
- Update failed.
274+
1. Check the status of offline security intelligence updates by using the following command:
273275

274-
### Common troubleshooting steps
276+
```bash
277+
mdatp health --details definitions
278+
```
275279

276-
- Check the status of the "offline security intelligence update" feature by using the following command:
280+
Look for information in the `definitions_update_fail_reason` section.
277281

278-
```bash
279-
mdatp health --details definitions
280-
```
282+
2. Make sure that `offline_definition_update` and `offline_definition_update_verify_sig` are enabled.
281283

282-
- This command should provide us with some user-friendly message in the `definitions_update_fail_reason` section.
283-
- Check if `offline_definition_update` and `offline_definition_update_verify_sig` are enabled.
284-
- Check if `definitions_update_source_uri` is equal to `offline_definition_url_configured`.
285-
- `definitions_update_source_uri` is the source from where the signatures were downloaded.
286-
- `offline_definition_url_configured` is the source from where signatures should be downloaded, the one mentioned in the managed config file.
284+
3. Make sure that `definitions_update_source_uri` is equal to `offline_definition_url_configured`.
287285

288-
- Try performing the connectivity test to check if mirror server is reachable from the host:
286+
- `definitions_update_source_uri` is the source from where the signatures were downloaded.
287+
- `offline_definition_url_configured` is the source from where signatures should be downloaded, the one mentioned in the managed config file.
289288

290-
```bash
291-
mdatp connectivity test
292-
```
289+
4. Try performing the connectivity test to check if mirror server is reachable from the host:
293290

294-
- Try to trigger a manual update using the following command:
291+
```bash
292+
mdatp connectivity test
293+
```
295294

296-
```bash
297-
mdatp definitions update
298-
```
295+
5. Try to initiate a manual update using the following command:
296+
297+
```bash
298+
mdatp definitions update
299+
```
300+
301+
## See also
302+
303+
- [Linux resources](linux-resources.md)
304+
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
305+
- [Configure security settings and policies for Microsoft Defender for Endpoint on Linux](linux-preferences.md)

defender-office-365/submissions-teams.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ appliesto:
2828

2929
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
3030

31-
Users can report messages in Teams from chats, including chats with external users, standard channels, and meeting conversations. Users can only report messages as malicious.
31+
Users can report messages in Teams from chats, standard channels, and meeting conversations. Users can only report messages as malicious.
3232

3333
> [!NOTE]
3434
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).

0 commit comments

Comments
 (0)