You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-network-connections-microsoft-defender-antivirus.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: deniseb
9
9
ms.author: deniseb
10
10
ms.topic: conceptual
11
11
ms.custom: nextgen
12
-
ms.date: 05/17/2024
12
+
ms.date: 10/08/2024
13
13
ms.reviewer: yongrhee; pahuijbr
14
14
ms.collection:
15
15
- m365-security
@@ -22,33 +22,31 @@ search.appverid: met150
22
22
23
23
**Applies to:**
24
24
25
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27
25
- Microsoft Defender Antivirus
28
26
27
+
> [!IMPORTANT]
28
+
> This article contains information about configuring network connections only for Microsoft Defender Antivirus, when used without Microsoft Defender for Endpoint. If you are using **Microsoft Defender for Endpoint** (which includes Microsoft Defender Antivirus), see [Configure device proxy and Internet connectivity settings for Defender for Endpoint](configure-proxy-internet.md).
29
+
29
30
**Platforms**
30
31
31
32
- Windows
32
33
33
-
To ensure Microsoft Defender Antivirus cloud-delivered protection works properly, your security team must configure your network to allow connections between your endpoints and certain Microsoft servers. This article lists connections that must be allowed for using the firewall rules. It also provides instructions for validating your connection. Configuring your protection properly ensures you receive the best value from your cloud-delivered protection services.
34
-
35
-
> [!IMPORTANT]
36
-
> This article contains information about configuring network connections only for Microsoft Defender Antivirus. If you are using Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus), see [Configure device proxy and Internet connectivity settings for Defender for Endpoint](configure-proxy-internet.md).
34
+
To ensure Microsoft Defender Antivirus cloud-delivered protection works properly, your security team must configure your network to allow connections between your endpoints and certain Microsoft servers. This article lists which destinations much be accessible. It also provides instructions for validating connections. Configuring connectivity properly ensures you receive the best value from Microsoft Defender Antivirus cloud-delivered protection services.
37
35
38
36
## Allow connections to the Microsoft Defender Antivirus cloud service
39
37
40
-
The Microsoft Defender Antivirus cloud service provides fast, and strong protection for your endpoints. It's optional to enable the cloud-delivered protection service. Microsoft Defender Antivirus cloud service is recommended, because it provides important protection against malware on your endpoints and network. For more information, see [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) for enabling service with Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or individual clients in the Windows Security app.
38
+
The Microsoft Defender Antivirus cloud service provides fast, strong protection for your endpoints. While it's optional to enable and use the cloud-delivered protection services provided by Microsoft Defender Antivirus, it's highly recommended because it provides important and timely protection against emerging threats on your endpoints and network. For more information, see [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md), which describes how to enable the service by using Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or individual clients in the Windows Security app.
41
39
42
-
After you've enabled the service, you need to configure your network or firewall to allow connections between network and your endpoints. Because your protection is a cloud service, computers must have access to the internet and reach the Microsoft cloud services. Don't exclude the URL `*.blob.core.windows.net` from any kind of network inspection.
40
+
After you've enabled the service, you need to configure your network or firewall to allow connections between network and your endpoints. Computers must have access to the internet and reach the Microsoft cloud services for proper operation.
43
41
44
42
> [!NOTE]
45
-
> The Microsoft Defender Antivirus cloud service delivers updated protection to your network and endpoints. The cloud service should not be considered as only protection for your files that are stored in the cloud; instead, the cloud service uses distributed resources and machine learning to deliver protection for your endpoints at a faster rate than the traditional Security intelligence updates.
43
+
> The Microsoft Defender Antivirus cloud service delivers updated protection to your network and endpoints. The cloud service should not be considered as protection for or against files that are stored in the cloud; instead, the cloud service uses distributed resources and machine learning to deliver protection for your endpoints at a faster rate than the traditional Security intelligence updates, and applies to file-based and file-less threats, regardless of where they originate from.
46
44
47
45
## Services and URLs
48
46
49
47
The table in this section lists services and their associated website addresses (URLs).
50
48
51
-
Make sure that there are no firewall or network filtering rules denying access to these URLs. Otherwise, you must create an allow rule specifically for those URLs (excluding the URL `*.blob.core.windows.net`). The URLs in the following table use port 443 for communication. (Port 80 is also required for some URLs, as noted in the following table.)
49
+
Make sure that there are no firewall or network filtering rules denying access to these URLs. Otherwise, you must create an allow rule specifically for those URLs. The URLs in the following table use port `443` for communication. (Port `80` is also required for some URLs, as noted in the following table.)
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
66
+
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:
67
67
68
68
```powershell
69
69
Set-ExecutionPolicy Unrestricted
70
70
```
71
71
72
-
You can perform these manual steps instead:
72
+
Or, you can perform these manual steps instead:
73
73
74
-
1. Create a folder under c: named demo, "c:\demo".
74
+
1. Create a folder under `c:` named `demo`, as in `c:\demo`.
75
75
76
-
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
76
+
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).
77
77
78
-
3. Execute PowerShell commands listed earlier in this article.
78
+
3. Run the PowerShell commands listed earlier in this article.
79
+
80
+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
86
86
```
87
87
88
-
2. Add the demo folder to protected folders list using PowerShell command:
88
+
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:
Copy file name to clipboardExpand all lines: defender-endpoint/linux-exclusions.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 07/31/2024
18
+
ms.date: 10/11/2024
19
19
---
20
20
21
21
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -24,9 +24,8 @@ ms.date: 07/31/2024
24
24
25
25
**Applies to:**
26
26
27
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
28
+
- Microsoft Defender XDR
30
29
31
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
32
31
@@ -141,7 +140,7 @@ For more information, see [Set preferences for Defender for Endpoint on Linux](l
141
140
Run the following command to see the available switches for managing exclusions:
142
141
143
142
> [!NOTE]
144
-
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn’t mentioned, the scope value is set as `epp`.
143
+
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
145
144
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-manually.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 08/01/2024
18
+
ms.date: 10/11/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -24,9 +24,8 @@ ms.date: 08/01/2024
24
24
25
25
**Applies to:**
26
26
27
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
28
+
- Microsoft Defender XDR
30
29
31
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-ansible.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 09/19/2024
18
+
ms.date: 10/11/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux with Ansible
@@ -24,9 +24,8 @@ ms.date: 09/19/2024
24
24
25
25
**Applies to:**
26
26
27
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
28
+
- Microsoft Defender XDR
30
29
31
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-puppet.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 07/15/2024
18
+
ms.date: 10/11/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -25,9 +25,8 @@ ms.date: 07/15/2024
25
25
26
26
**Applies to:**
27
27
28
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
-
-[Microsoft Defender XDR](/defender-xdr)
28
+
- Microsoft Defender for Servers
29
+
- Microsoft Defender XDR
31
30
32
31
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-saltack.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 07/15/2024
18
+
ms.date: 10/11/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
@@ -24,9 +24,8 @@ ms.date: 07/15/2024
24
24
25
25
**Applies to:**
26
26
27
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
-
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
28
+
- Microsoft Defender XDR
30
29
31
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
0 commit comments