Skip to content

Commit 5e54863

Browse files
Merge pull request #2812 from MicrosoftDocs/mde-linux-exclusions
Mde linux exclusions
2 parents 2dd0e11 + 1feee73 commit 5e54863

File tree

1 file changed

+48
-9
lines changed

1 file changed

+48
-9
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/31/2025
18+
ms.date: 02/18/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -52,7 +52,7 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
5252
5353
| Exclusion Category | Exclusion Scope | Description |
5454
| --- | --- | --- |
55-
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus (AV) scans and on-demand scans.|
55+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus scans and on-demand scans.|
5656
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
5757

5858
> [!IMPORTANT]
@@ -63,12 +63,12 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
6363

6464
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
6565

66-
Exclusion|Definition|Examples
67-
---|---|---
68-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66+
|Exclusion|Definition|Examples|
67+
|---|---|---|
68+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test` |
69+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log` |
70+
| Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/` |
71+
| Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t` |
7272

7373
> [!IMPORTANT]
7474
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
@@ -89,6 +89,8 @@ Wildcard|Description|Examples|
8989
9090
## How to configure the list of exclusions
9191

92+
You can configure exclusions using a management console, Defender for Endpoint security settings management, or the command line.
93+
9294
### Using the management console
9395

9496
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
@@ -140,6 +142,43 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140142

141143
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142144

145+
### Using Defender for Endpoint security settings management
146+
147+
As a security administrator, you can configure Defender for Endpoint exclusions using the Microsoft Defender portal. This method is referred to as Defender for Endpoint security settings management. If you're using this method for the first time, make sure to complete the following procedures:
148+
149+
#### 1. Configure your tenant to support security settings management
150+
151+
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**, and then select the Linux platform.
152+
153+
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](/mem/intune/protect/mde-security-integration).
154+
155+
#### 2. Create a Microsoft Entra group
156+
157+
Create a dynamic Microsoft Entra group that uses the operating system type to ensure that all devices onboarded to Defender for Endpoint receive policies. Using a dynamic group allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually. For more information, see the following articles:
158+
159+
- [Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
160+
- [Microsoft Entra groups overview](/entra/fundamentals/concept-learn-about-groups)
161+
162+
#### 3. Create an endpoint security policy
163+
164+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new Policy**.
165+
166+
2. For Platform, select **Linux**.
167+
168+
3. Select the required exclusion template (**Microsoft defender global exclusion (AV+EDR) for global exclusions and Microsoft defender antivirus exclusions for antivirus exclusions**), and then select **Create policy**.
169+
170+
4. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
171+
172+
5. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
173+
174+
6. When you're done configuring settings, select **Next**.
175+
176+
7. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
177+
178+
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
179+
180+
For more information refer: [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies#create-an-endpoint-security-policy).
181+
143182
### Using the command line
144183

145184
Run the following command to see the available switches for managing exclusions:
@@ -157,7 +196,7 @@ mdatp exclusion
157196
158197
Examples:
159198

160-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
199+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)*:
161200

162201
```bash
163202
mdatp exclusion extension add --name .txt

0 commit comments

Comments
 (0)