You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/edr-detection.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
64
64
1. Extract the zip
65
65
66
66
```bash
67
-
unzip ~/Downloads/MDELinuxDIY.zip
67
+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
68
68
```
69
69
70
70
1. And run the following command:
@@ -77,6 +77,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
77
77
78
78
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
79
79
80
+
<!---
80
81
### macOS
81
82
82
83
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +130,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129
130
130
131
Look at the alert details and the device timeline, and perform the regular investigation steps.
131
132
132
-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
133
+
--->
134
+
135
+
## Next steps
136
+
137
+
If you're experiencing issues with application compatability or performance, you might consider adding exclusions. See the following articles for more information:
133
138
134
139
-[Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135
140
-[Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
0 commit comments