Skip to content

Commit 621dde7

Browse files
authored
Merge branch 'main' into docs-editor/minimum-requirements-1736520250
2 parents f13a20a + bdcb882 commit 621dde7

19 files changed

+577
-1074
lines changed

defender-endpoint/live-response.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/10/2025
1818
---
1919

2020
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229229

230230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231231

232-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233233

234-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235235

236236
#### To upload a file in the library
237237

@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311311
312312
## Supported output pipes
313313

314-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
315315

316316
Example:
317317

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 10/17/2024
7+
ms.date: 01/10/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132132

133133
- Endpoints must be onboarded to Defender for Endpoint.
134134

135+
- Windows Security Center Service must be enabled.
136+
137+
> [!WARNING]
138+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140+
135141
> [!IMPORTANT]
136142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/07/2025
18+
ms.date: 01/10/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4545

4646
> [!NOTE]
4747
> Linux distribution using system manager supports both SystemV and Upstart.
48-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
4949
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5050
5151
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106106
107107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108108

109-
|RTP, Quick, Full Scan| Custom Scan|
110-
|---|---|
111-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112-
|`ecryptfs`|`Efs`|
113-
|`ext2`|`S3fs`|
114-
|`ext3`|`Blobfuse`|
115-
|`ext4`|`Lustr`|
116-
|`fuse`|`glustrefs`|
117-
|`fuseblk`|`Afs`|
118-
|`jfs`|`sshfs`|
119-
|`nfs` (v3 only)|`cifs`|
120-
|`overlay`|`smb`|
121-
|`ramfs`|`gcsfuse`|
122-
|`reiserfs`|`sysfs`|
123-
|`tmpfs`||
124-
|`udf`||
125-
|`vfat`||
126-
|`xfs`||
127-
109+
|RTP, Quick, Full Scan| Custom Scan|
110+
|---|---|
111+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112+
|`ecryptfs`|`Efs`|
113+
|`ext2`|`S3fs`|
114+
|`ext3`|`Blobfuse`|
115+
|`ext4`|`Lustr`|
116+
|`fuse`|`glustrefs`|
117+
|`fuseblk`|`Afs`|
118+
|`jfs`|`sshfs`|
119+
|`nfs` (v3 only)|`cifs`|
120+
|`overlay`|`smb`|
121+
|`ramfs`|`gcsfuse`|
122+
|`reiserfs`|`sysfs`|
123+
|`tmpfs`||
124+
|`udf`||
125+
|`vfat`||
126+
|`xfs`||
127+
128128
> [!NOTE]
129-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132-
132+
133133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
134134

135135
### Installation instructions

0 commit comments

Comments
 (0)