You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/install-defender-endpoint-linux.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,9 +23,7 @@ appliesto:
23
23
---
24
24
# Install Defender for Endpoint on Linux
25
25
26
-
This article is aimed at security admins who want to learn how to install and use [Defender for Endpoint](microsoft-defender-endpoint.md) on Linux servers. The article covers prerequisites, and links to additional deployment and configuration documents.
27
-
28
-
Microsoft publishes Defender for Endpoint [Linux software updates](linux-whatsnew.md) on a monthly basis. Each version of Defender for Endpoint on Linux is set to expire after nine months. To deploy new updates, follow the [deploy updates](linux-updates.md) instructions.
26
+
This article is aimed at security admins who want to install [Defender for Endpoint](microsoft-defender-endpoint.md) on Linux servers. The article covers prerequisites, and links to additional deployment and configuration documents.
29
27
30
28
## Prerequisites
31
29
@@ -39,7 +37,7 @@ This section lists the prerequisites for installing Defender for Endpoint on Lin
39
37
40
38
### Supported Linux distributions
41
39
42
-
The table in this section lists supported distributions. When running Defender for Endpoint on an unsupported distribution, the minimal kernel version is`3.10.0-327`.
40
+
The table in this section lists supported distributions. When running Defender for Endpoint on unsupported distributions, the kernel version has to be at least`3.10.0-327`.
43
41
44
42
|Distribution |Version |x64 (AMD64/EM64T) |
45
43
|---------|---------|---------|
@@ -60,12 +58,12 @@ The table in this section lists supported distributions. When running Defender f
60
58
61
59
To install Defender for Endpoint on Linux, you need the following permissions:
62
60
63
-
* Administrative privileges on the Linux server endpoint.
64
-
* An appropriate [role](/defender-endpoint/prepare-deployment#role-based-access-control) assigned in Defender for Endpoint.
61
+
* Administrative privileges on the Linux server endpoint
62
+
* An appropriate [role](/defender-endpoint/prepare-deployment#role-based-access-control) assigned in Defender for Endpoint
65
63
66
64
### Network access
67
65
68
-
`*.endpoint.security.microsoft.com` access. If needed, you can [configure static proxy access](linux-static-proxy-configuration.md).
66
+
You need access to `*.endpoint.security.microsoft.com`. If needed, you can [configure static proxy access](linux-static-proxy-configuration.md).
69
67
70
68
### Management tools
71
69
@@ -100,7 +98,7 @@ The links in this section describe the methods you can use to deploy Defender fo
100
98
101
99
Installing Defender for Endpoint in any location other than the default install path isn't supported.
102
100
103
-
Defender for Endpoint creates a*mdatp* user with random UID and GID values. If you want to control these values, create an *mdatp* user before installation using the `/usr/sbin/nologin` shell option. For example, `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
101
+
Defender for Endpoint creates an*mdatp* user with random UID and GID values. If you want to control these values, create an *mdatp* user before installation using the `/usr/sbin/nologin` shell option. For example, `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
@@ -124,7 +122,11 @@ To manage your Defender for Endpoint security settings, select one of these conf
124
122
125
123
### Exclusions
126
124
127
-
High I/O workloads from certain applications can experience performance issues when Defender for Endpoint is installed. Such applications include *Jenkins*, *Jira*, and database workloads such as *OracleDB* and *Postgres*. If you see performance degradation, consider setting exclusions for trusted applications.
125
+
High input and output (I/O) workloads from certain applications can experience performance issues when Defender for Endpoint is installed. Such applications include *Jenkins*, *Jira*, and database workloads such as *OracleDB* and *Postgres*. If you see performance degradation, consider setting exclusions for trusted applications.
128
126
129
127
*[Configure and validate exclusions](/defender-endpoint/linux-exclusions)
130
128
*[Mistakes to avoid when defining exclusions](/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus)
129
+
130
+
## Updates
131
+
132
+
Microsoft publishes Defender for Endpoint [Linux software updates](linux-whatsnew.md) on a monthly basis. Each version of Defender for Endpoint on Linux is set to expire after nine months. To deploy new updates, follow the [deploy updates](linux-updates.md) instructions.
0 commit comments