Skip to content

Commit 608e4ac

Browse files
authored
Merge pull request #2996 from kurtsarens/docs-editor/linux-install-manually-1741083322
Agent Copilot (AC) does not provide the correct command for onboarding. Rewording should help AC to provide the correct command.
2 parents fde8670 + 260d596 commit 608e4ac

File tree

1 file changed

+34
-35
lines changed

1 file changed

+34
-35
lines changed

defender-endpoint/linux-install-manually.md

Lines changed: 34 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 02/14/2025
18+
ms.date: 03/04/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -391,96 +391,95 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
391391
392392
> [!NOTE]
393393
> Initially the client device isn't associated with an organization and the *orgId* attribute is blank.
394-
394+
395395
```bash
396396
mdatp health --field org_id
397397
```
398-
399-
2. Run `MicrosoftDefenderATPOnboardingLinuxServer.py`.
398+
399+
1. Run one of the below scenarios.
400400

401401
> [!NOTE]
402402
> To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
403403
>
404404
> To onboard a device that was previously offboard, you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
405-
406-
If you're running RHEL 8.x or Ubuntu 20.04 or higher, you need to use `python3`.
407-
405+
406+
If you're running RHEL 8.x or Ubuntu 20.04 or higher, you need to use `python3`. Run the following command:
407+
408408
```bash
409409
sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
410410
```
411-
412-
For the rest of distros and versions, you need to use `python`.
413-
411+
412+
For the rest of distros and versions, you need to use `python`. Run the following command:
413+
414414
```bash
415415
sudo python MicrosoftDefenderATPOnboardingLinuxServer.py
416416
```
417-
418-
3. Verify that the device is now associated with your organization and reports a valid organization identifier:
417+
418+
1. Verify that the device is now associated with your organization and reports a valid organization identifier:
419419
420420
```bash
421421
mdatp health --field org_id
422422
```
423-
424-
4. Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
423+
424+
1. Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
425425
426426
```bash
427427
mdatp health --field healthy
428428
```
429-
429+
430430
> [!IMPORTANT]
431431
> When the product starts for the first time, it downloads the latest anti-malware definitions. This process might take up to a few minutes depending on the network connectivity. During this time, the command mentioned earlier returns a value of `false`. You can check the status of the definition update using the following command:
432-
>
432+
>
433433
> ```bash
434434
> mdatp health --field definitions_status
435435
> ```
436-
>
437436
> You might also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
438-
439-
5. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
437+
438+
1. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
440439
441440
1. Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
442-
441+
443442
```bash
444443
mdatp health --field real_time_protection_enabled
445444
```
446-
445+
447446
If it isn't enabled, execute the following command:
448-
447+
449448
```bash
450449
mdatp config real-time-protection --value enabled
451450
```
452-
453-
2. Open a Terminal window and execute the following command to run a detection test:
451+
452+
1. To run a detection test, open a Terminal window. and then run the following command:
454453

455454
``` bash
456455
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
457456
```
458-
459-
3. You can run more detection tests on zip files using either of the following commands:
460457

458+
1. You can run more detection tests on zip files using either of the following commands:
459+
461460
```bash
462461
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
463462
curl -o /tmp/eicarcom2.zip https://secure.eicar.org/eicarcom2.zip
464463
```
465464

466465
The files should be quarantined by Defender for Endpoint on Linux.
467466

468-
4. Use the following command to list all the detected threats:
467+
1. Use the following command to list all the detected threats:
469468

470469
```bash
471470
mdatp threat list
472471
```
473-
474-
6. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
472+
473+
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
475474

476475
1. Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
477-
478-
2. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, and then run the following command: `./mde_linux_edr_diy.sh`
479-
476+
477+
1. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, and then run the following command: `./mde_linux_edr_diy.sh`
478+
480479
After a few minutes, a detection should be raised in Microsoft Defender XDR.
481-
482-
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
483-
480+
481+
1. Look at the alert details, machine timeline, and perform your typical investigation steps.
482+
484483
## Microsoft Defender for Endpoint package external package dependencies
485484

486485
The following external package dependencies exist for the `mdatp` package:

0 commit comments

Comments
 (0)