Skip to content

Commit 5f7e9a9

Browse files
committed
Final tweaks
1 parent f8fa89c commit 5f7e9a9

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

defender-endpoint/install-defender-endpoint-linux.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,7 @@ appliesto:
2323
---
2424
# Install Defender for Endpoint on Linux
2525

26-
This article is aimed at security admins who want to learn how to install and use [Defender for Endpoint](microsoft-defender-endpoint.md) on Linux servers. The article covers prerequisites, and links to additional deployment and configuration documents.
27-
28-
Microsoft publishes Defender for Endpoint [Linux software updates](linux-whatsnew.md) on a monthly basis. Each version of Defender for Endpoint on Linux is set to expire after nine months. To deploy new updates, follow the [deploy updates](linux-updates.md) instructions.
26+
This article is aimed at security admins who want to install [Defender for Endpoint](microsoft-defender-endpoint.md) on Linux servers. The article covers prerequisites, and links to additional deployment and configuration documents.
2927

3028
## Prerequisites
3129

@@ -39,7 +37,7 @@ This section lists the prerequisites for installing Defender for Endpoint on Lin
3937

4038
### Supported Linux distributions
4139

42-
The table in this section lists supported distributions. When running Defender for Endpoint on an unsupported distribution, the minimal kernel version is`3.10.0-327`.
40+
The table in this section lists supported distributions. When running Defender for Endpoint on unsupported distributions, the kernel version has to be at least`3.10.0-327`.
4341

4442
|Distribution |Version |x64 (AMD64/EM64T) |
4543
|---------|---------|---------|
@@ -60,12 +58,12 @@ The table in this section lists supported distributions. When running Defender f
6058

6159
To install Defender for Endpoint on Linux, you need the following permissions:
6260

63-
* Administrative privileges on the Linux server endpoint.
64-
* An appropriate [role](/defender-endpoint/prepare-deployment#role-based-access-control) assigned in Defender for Endpoint.
61+
* Administrative privileges on the Linux server endpoint
62+
* An appropriate [role](/defender-endpoint/prepare-deployment#role-based-access-control) assigned in Defender for Endpoint
6563

6664
### Network access
6765

68-
`*.endpoint.security.microsoft.com` access. If needed, you can [configure static proxy access](linux-static-proxy-configuration.md).
66+
You need access to `*.endpoint.security.microsoft.com`. If needed, you can [configure static proxy access](linux-static-proxy-configuration.md).
6967

7068
### Management tools
7169

@@ -100,7 +98,7 @@ The links in this section describe the methods you can use to deploy Defender fo
10098

10199
Installing Defender for Endpoint in any location other than the default install path isn't supported.
102100

103-
Defender for Endpoint creates a *mdatp* user with random UID and GID values. If you want to control these values, create an *mdatp* user before installation using the `/usr/sbin/nologin` shell option. For example, `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
101+
Defender for Endpoint creates an *mdatp* user with random UID and GID values. If you want to control these values, create an *mdatp* user before installation using the `/usr/sbin/nologin` shell option. For example, `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
104102

105103
* [Installer script](/defender-endpoint/linux-installer-script)
106104
* [Ansible](/defender-endpoint/linux-install-with-ansible)
@@ -124,7 +122,11 @@ To manage your Defender for Endpoint security settings, select one of these conf
124122

125123
### Exclusions
126124

127-
High I/O workloads from certain applications can experience performance issues when Defender for Endpoint is installed. Such applications include *Jenkins*, *Jira*, and database workloads such as *OracleDB* and *Postgres*. If you see performance degradation, consider setting exclusions for trusted applications.
125+
High input and output (I/O) workloads from certain applications can experience performance issues when Defender for Endpoint is installed. Such applications include *Jenkins*, *Jira*, and database workloads such as *OracleDB* and *Postgres*. If you see performance degradation, consider setting exclusions for trusted applications.
128126

129127
* [Configure and validate exclusions](/defender-endpoint/linux-exclusions)
130128
* [Mistakes to avoid when defining exclusions](/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus)
129+
130+
## Updates
131+
132+
Microsoft publishes Defender for Endpoint [Linux software updates](linux-whatsnew.md) on a monthly basis. Each version of Defender for Endpoint on Linux is set to expire after nine months. To deploy new updates, follow the [deploy updates](linux-updates.md) instructions.

0 commit comments

Comments
 (0)