You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 04/03/2024
17
+
ms.date: 01/10/2025
18
18
---
19
19
20
20
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229
229
230
230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231
231
232
-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232
+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233
233
234
-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234
+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235
235
236
236
#### To upload a file in the library
237
237
@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311
311
312
312
## Supported output pipes
313
313
314
-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314
+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-compatibility.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
4
4
ms.service: defender-endpoint
5
5
ms.subservice: ngp
6
6
ms.localizationpriority: medium
7
-
ms.date: 10/17/2024
7
+
ms.date: 01/10/2025
8
8
ms.topic: conceptual
9
9
author: emmwalshh
10
10
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132
132
133
133
- Endpoints must be onboarded to Defender for Endpoint.
134
134
135
+
- Windows Security Center Service must be enabled.
136
+
137
+
> [!WARNING]
138
+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139
+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140
+
135
141
> [!IMPORTANT]
136
142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137
143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 01/07/2025
18
+
ms.date: 01/10/2025
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
45
45
46
46
> [!NOTE]
47
47
> Linux distribution using system manager supports both SystemV and Upstart.
48
-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48
+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
49
49
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
50
50
51
51
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106
106
107
107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108
108
109
-
|RTP, Quick, Full Scan| Custom Scan|
110
-
|---|---|
111
-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112
-
|`ecryptfs`|`Efs`|
113
-
|`ext2`|`S3fs`|
114
-
|`ext3`|`Blobfuse`|
115
-
|`ext4`|`Lustr`|
116
-
|`fuse`|`glustrefs`|
117
-
|`fuseblk`|`Afs`|
118
-
|`jfs`|`sshfs`|
119
-
|`nfs` (v3 only)|`cifs`|
120
-
|`overlay`|`smb`|
121
-
|`ramfs`|`gcsfuse`|
122
-
|`reiserfs`|`sysfs`|
123
-
|`tmpfs`||
124
-
|`udf`||
125
-
|`vfat`||
126
-
|`xfs`||
127
-
109
+
|RTP, Quick, Full Scan| Custom Scan|
110
+
|---|---|
111
+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112
+
|`ecryptfs`|`Efs`|
113
+
|`ext2`|`S3fs`|
114
+
|`ext3`|`Blobfuse`|
115
+
|`ext4`|`Lustr`|
116
+
|`fuse`|`glustrefs`|
117
+
|`fuseblk`|`Afs`|
118
+
|`jfs`|`sshfs`|
119
+
|`nfs` (v3 only)|`cifs`|
120
+
|`overlay`|`smb`|
121
+
|`ramfs`|`gcsfuse`|
122
+
|`reiserfs`|`sysfs`|
123
+
|`tmpfs`||
124
+
|`udf`||
125
+
|`vfat`||
126
+
|`xfs`||
127
+
128
128
> [!NOTE]
129
-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129
+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130
130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131
131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132
-
132
+
133
133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
0 commit comments