You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
3
3
description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
4
4
ms.localizationpriority: medium
5
-
ms.date: 03/06/2023
5
+
ms.date: 08/22/2023
6
6
ms.topic: conceptual
7
7
author: siosulli
8
8
ms.author: siosulli
@@ -83,7 +83,7 @@ Security intelligence packages are typically published once every three to four
83
83
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption.
84
84
This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set this configuration up, follow these steps:
85
85
86
-
1. Create an SMB/CIFS file share.
86
+
1. Create an SMB/CIFS file share.
87
87
88
88
2. Use the following example to create a file share with the following share permissions.
89
89
@@ -231,6 +231,16 @@ This policy forces a scan if the VM has missed two or more consecutive scheduled
231
231
232
232
This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
233
233
234
+
## Run the "Windows Defender Cache Maintenance" scheduled task
235
+
236
+
Optimize the "Windows Defender Cache Maintenance" scheduled task for non-persistent and/or persistent VDI environments. Run this task on the main image before sealing.
237
+
238
+
1. Open up the **Task Scheduler** mmc (`taskschd.msc`).
239
+
240
+
2. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
241
+
242
+
3. Select **Run**, and let the scheduled task finish.
243
+
234
244
## Exclusions
235
245
236
246
If you think you need to add exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
@@ -247,4 +257,5 @@ If you're looking for information about Defender for Endpoint on non-Windows pla
247
257
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
248
258
-[Configure Defender for Endpoint on Android features](android-configure.md)
249
259
-[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
260
+
250
261
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-ebpf.md
+70-16Lines changed: 70 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 06/28/2024
18
+
ms.date: 08/22/2024
19
19
---
20
20
21
21
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -27,26 +27,26 @@ ms.date: 06/28/2024
27
27
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
28
28
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29
29
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
+
-
31
+
> [!NOTE]
32
+
> Starting with Defender for Endpoint on Linux, version `101.2408.0000`, AuditD is no longer be supported as a supplementary event provider. For more information, see the FAQs at the end of this article.
30
33
31
-
The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux provides supplementary event data for Linux operating systems. eBPF can be used as an alternative technology to auditd because eBPF helps address several classes of issues seen with the auditd event provider and is beneficial in the areas of performance and system stability.
34
+
The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux provides supplementary event data for Linux operating systems. eBPF helps address several classes of issues seen with the AuditD event provider and is beneficial in the areas of performance and system stability.
32
35
33
36
Key benefits include:
34
37
35
-
- Reduced system-wide auditd-related log noise
38
+
- Reduced system-wide AuditD-related log noise
36
39
- Optimized system-wide event rules otherwise causing conflict between applications
37
40
- Reduced overhead for file event (file read/open) monitoring
38
41
- Improved event rate throughput and reduced memory footprint
39
42
- Optimized performance for specific configurations
40
43
41
44
## How eBPF works
42
45
43
-
With eBPF, events previously obtained from the auditd event provider now flow from the eBPF sensor. This helps with system stability, improves CPU and memory utilization, and reduces disk usage. Also, when eBPF is enabled, all auditd-related custom rules are eliminated, which helps reduce the possibility of conflicts between applications. Data related to eBPF gets logged into the /var/log/microsoft/mdatp/microsoft_defender_core.log file.
46
+
With eBPF, events previously obtained from the AuditD event provider now flow from the eBPF sensor. This helps with system stability, improves CPU and memory utilization, and reduces disk usage. eBPF helps reduce the possibility of conflicts between applications as no custom rules are required. Data related to eBPF gets logged into the /var/log/microsoft/mdatp/microsoft_defender_core.log file.
44
47
45
48
In addition, the eBPF sensor uses capabilities of the Linux kernel without requiring the use of a kernel module that helps increase system stability.
46
49
47
-
> [!NOTE]
48
-
> eBPF is used in conjunction with auditd, whereas auditd is used only for user login events and captures these events without any custom rules and flow them automatically. Be aware that auditd will be gradually removed in future versions.
49
-
50
50
## System prerequisites
51
51
52
52
The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the following minimum distribution and kernel versions:
@@ -68,7 +68,7 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
68
68
69
69
## Use eBPF
70
70
71
-
The eBPF sensor is automatically enabled for all customers by default for agent versions "101.23082.0006" and later. Customers need to update to a supported version to experience the feature. When the eBPF sensor is enabled on an endpoint, Defender for Endpoint on Linux updates supplementary_events_subsystem to ebpf.
71
+
The eBPF sensor is automatically enabled for all customers by default for agent versions `101.23082.0006` and later. Customers need to update to a supported version to experience the feature. When the eBPF sensor is enabled on an endpoint, Defender for Endpoint on Linux updates supplementary_events_subsystem to ebpf.
72
72
73
73
:::image type="content" source="/defender/media/defender-endpoint/ebpf-subsystem-linux.png" alt-text="ebpf subsystem highlight in the mdatp health command" lightbox="/defender/media/defender-endpoint/ebpf-subsystem-linux.png":::
74
74
@@ -91,8 +91,7 @@ You can also update the mdatp_managed.json file:
91
91
Refer to the link for detailed sample json file - [Set preferences for Microsoft Defender for Endpoint on Linux.](linux-preferences.md)
92
92
93
93
> [!IMPORTANT]
94
-
> If you disable eBPF, the supplementary event provider switches back to auditd.
95
-
> In the event eBPF doesn't become enabled or is not supported on any specific kernel, it will automatically switch back to auditd and retain all auditd custom rules.
94
+
> If you disable eBPF or in the event eBPF is not supported on any specific kernel, supplementary event provider switches to Netlink. All process operations will continue to flow seamlessly, but you may miss out on specific file and socket-related events that eBPF would otherwise capture.
96
95
97
96
You can also check the status of eBPF (enabled/disabled) on your linux endpoints using advanced hunting in the Microsoft Defender Portal. Steps are as follows:
98
97
@@ -106,9 +105,9 @@ You can also check the status of eBPF (enabled/disabled) on your linux endpoints
106
105
107
106
5. In the output, in the **Additional fields** column, select **Show more**, and then look for **EBPF STATUS: true**.
108
107
109
-
## Immutable mode of Auditd
108
+
## Immutable mode of AuditD
110
109
111
-
For customers using auditd in immutable mode, a reboot is required post enablement of eBPF in order to clear the audit rules added by Microsoft Defender for Endpoint. This requirement is a limitation in immutable mode of auditd, which freezes the rules file and prohibits editing/overwriting. This issue is resolved with the reboot.
110
+
For customers using AuditD in immutable mode, a reboot is required post enablement of eBPF in order to clear the audit rules added by Microsoft Defender for Endpoint. This requirement is a limitation in immutable mode of AuditD, which freezes the rules file and prohibits editing/overwriting. This issue is resolved with the reboot.
112
111
113
112
Post reboot, run the following command to check if audit rules were cleared:
114
113
@@ -135,12 +134,12 @@ uname -a
135
134
1. Enabling eBPF on RHEL 8.1 version with SAP might result in kernel panic. To mitigate this issue, you can take one of the following steps:
136
135
137
136
- Use a distro version higher than RHEL 8.1.
138
-
- Switch to auditd mode if you need to use RHEL 8.1 version.
137
+
- Switch to AuditD mode if you need to use RHEL 8.1 version.
139
138
140
139
2. Using Oracle Linux 8.8 with kernel version **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** might result in kernel panic. To mitigate this issue, you can take one of the following steps:
141
140
142
141
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
143
-
- Switch to auditd mode if you need to use the same kernel version
142
+
- Switch to AuditD mode if you need to use the same kernel version
@@ -154,7 +153,7 @@ The following two sets of data help analyze potential issues and determine the m
154
153
155
154
#### Troubleshooting performance issues
156
155
157
-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible AV exclusions, if wdavdaemon (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
156
+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
158
157
159
158
```Bash
160
159
sudo mdatp diagnostic ebpf-statistics
@@ -187,7 +186,62 @@ Top syscall ids:
187
186
188
187
In the previous output, you can see that stress-ng is the top process generating large number of events and might result into performance issues. Most likely stress-ng is generating the system call with ID 82. You can create a ticket with Microsoft to get this process excluded. In future as part of upcoming enhancements, you have more control to apply such exclusions at your end.
189
188
190
-
Exclusions applied to auditd can't be migrated or copied to eBPF. Common concerns such as noisy logs, kernel panic, noisy syscalls are already taken care of by eBPF internally. In case you want to add any further exclusions, then reach out to Microsoft to get the necessary exclusions applied.
189
+
Exclusions applied to AuditD can't be migrated or copied to eBPF. Common concerns such as noisy logs, kernel panic, noisy syscalls are already taken care of by eBPF internally. In case you want to add any further exclusions, then reach out to Microsoft to get the necessary exclusions applied.
190
+
191
+
## FAQs - Transition to eBPF
192
+
193
+
**1. Why should you consider moving to eBPF?**
194
+
195
+
The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux serves as an efficient alternative to AuditD and addresses various challenges associated with the AuditD event provider while providing significant advantages in terms of performance and system stability. Some of the key benefits include -
196
+
197
+
- Performance: eBPF significantly improves performance by reducing the overhead on system resources compared to AuditD.
198
+
199
+
- Resource Efficiency: eBPF uses fewer resources, which helps maintain system stability even under heavy load conditions.
200
+
201
+
- Scalability: eBPF’s architecture is more scalable, making it a better choice for environments with growing or complex workloads.
202
+
203
+
- Modern Technology: eBPF represents a modern, forward-looking technology that aligns with future Linux kernel developments, ensuring better long-term support.
204
+
205
+
**2. How Can I Continue to Use AuditD?**
206
+
207
+
If you prefer to continue using AuditD:
208
+
209
+
- Supported Versions: You can remain on Defender for Endpoint on Linux version 101.24072.0000, which will support AuditD during validity of the build, which is approximately nine months. This provides a sufficient transition period to plan your move to eBPF. Expiry date can be checked by running the command `mdatp health` on the Linux server.
210
+
211
+
- Long-Term Plan: While staying on the `101.24072.0000` build is an option, we recommend planning your transition to eBPF within this timeframe to ensure you benefit from the latest security and performance improvements and also get continued support.
212
+
213
+
That said, our recommendation would be to plan a move to using eBPF as the primary event provider.
214
+
215
+
**3. What Happens If eBPF Is Not Supported in Some Scenarios?**
216
+
217
+
In cases where eBPF isn't supported:
218
+
219
+
- Netlink Fallback: The system falls back to using the Netlink event provider. While Netlink continues to capture process events (for example, `exec`, `exit`, `fork`, `gid`, or `tid`), it doesn't support file system-related events (for example, `rename`, `unlink`) or socket events.
220
+
221
+
- Impact: Your workloads won't be disrupted, but you could miss specific file and socket-related events that eBPF would otherwise capture.
222
+
223
+
**4. How Can I Manage Exclusions with the Updated Versions?**
224
+
225
+
Following are some common reasons for placing exclusions for AuditD:
226
+
227
+
- Performance as some syscall or process is generating lot of noise
228
+
229
+
- Kernel Panic, there are times where lot of syscalls specifically network/filesystem calls resulted in kernel panic.
230
+
231
+
- Noisy logs, where audit logs are using up the disk space. Customer placed the exclusions for the noisy processes in order to reduce the log size.
232
+
233
+
**While with eBPF, the first two use cases are the candidates for the migration. Logs are no longer an issue with eBPF. For the first two uses case, you can chose from the following options:**
234
+
235
+
- Contact support: Reach out to Microsoft to apply the exclusions from the backend.
236
+
237
+
- Global Exclusions: In the updated versions of Defender for Endpoint on Linux, exclusions can be managed with global exclusions. Global exclusions apply to both antivirus and EDR and can be configured through the managed json currently. For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-exclusions).
238
+
239
+
**5. What Should I Do in Case There Are Issues?**
240
+
241
+
- Contact Support: If you encounter any issues during or after your transition to eBPF, contact technical support for assistance. We're committed to ensuring a smooth transition and are available to help resolve any challenges you may face.
242
+
243
+
- Support Channels: You can contact support via the Microsoft Defender portal. Additionally, our knowledge base and community forums are valuable resources for troubleshooting common issues.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-whatsnew.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
6
6
author: dansimp
7
7
ms.reviewer: kumasumit, gopkr
8
8
ms.localizationpriority: medium
9
-
ms.date: 06/05/2024
9
+
ms.date: 08/22/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -33,6 +33,18 @@ This article is updated frequently to let you know what's new in the latest rele
33
33
-[What's new in Defender for Endpoint on macOS](mac-whatsnew.md)
34
34
-[What's new in Defender for Endpoint on iOS](ios-whatsnew.md)
35
35
36
+
> [!IMPORTANT]
37
+
> Starting with version `101.2408.0000`, Microsoft defender for Endpoint for Linux no longer supports the Auditd event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support has been available since August 2023 and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF is not supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
38
+
>
39
+
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build will continue to be supported for several months, so you have time to plan and execute your migration to eBPF.
40
+
>
41
+
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. In the event of a fallback, all process operations continue to flow seamlessly.
42
+
>
43
+
> Review your current Defender for Endpoint on Linux deployment, and begin planning your migration to the eBPF-supported build. For more information on eBPF and how it works, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-ebpf).
44
+
>
45
+
> If you have any concerns or need assistance during this transition, please reach out to our support team.
0 commit comments