You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-preferences.md
+28-31Lines changed: 28 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: ewalsh
7
7
author: emmwalshh
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/28/2025
9
+
ms.date: 05/09/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -82,7 +82,7 @@ To get started, we recommend using the first sample profile for your organizatio
82
82
83
83
##### Sample profile
84
84
85
-
It will help you to take advantage of important protection features that Defender for Endpoint on Linux provides. The following configuration profile:
85
+
It helps you to take advantage of important protection features that Defender for Endpoint on Linux provides. The following configuration profile:
86
86
87
87
- Enables real-time protection (RTP)
88
88
- Specifies how the following threat types are handled:
@@ -120,9 +120,6 @@ It will help you to take advantage of important protection features that Defende
120
120
121
121
The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over the product.
122
122
123
-
> [!NOTE]
124
-
> It isn't possible to control all Microsoft Defender for Endpoint communication with only a proxy setting in this JSON.
125
-
126
123
```JSON
127
124
{
128
125
"antivirusEngine":{
@@ -266,15 +263,15 @@ Specifies the enforcement preference of antivirus engine. There are three values
266
263
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in on-demand mode.
267
264
268
265
- Passive (`passive`): Runs the antivirus engine in passive mode. In this case, all of the following apply:
269
-
- Real-time protection is turned off: Threats are not remediated by Microsoft Defender Antivirus.
266
+
- Real-time protection is turned off: Threats aren't remediated by Microsoft Defender Antivirus.
270
267
- On-demand scanning is turned on: Still use the scan capabilities on the endpoint.
271
268
- Automatic threat remediation is turned off: No files are moved and your security administrator is expected to take required action.
272
269
- Security intelligence updates are turned on: Alerts are available in the security administrator's tenant.
273
270
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in passive mode.
274
271
275
272
> [!NOTE]
276
273
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
277
-
> It is recommended to also use [scheduled scans](/defender-endpoint/schedule-antivirus-scan-crontab) as per requirement.
274
+
> It's recommended to also use [scheduled scans](/defender-endpoint/schedule-antivirus-scan-crontab) as per requirement.
278
275
279
276
### Enable or disable behavior monitoring (if RTP is enabled)
280
277
@@ -320,7 +317,7 @@ Specifies whether to scan archives during on-demand antivirus scans.
320
317
321
318
> [!NOTE]
322
319
> Available in Microsoft Defender for Endpoint version `101.45.00` or later.
323
-
> Archive files are never scanned during real-time protection. When the files in an archive are extracted, they are scanned. The *scanArchives* option can be used to force the scan of archives only during on-demand scan.
320
+
> Archive files are never scanned during real-time protection. When the files in an archive are extracted, they're scanned. The *scanArchives* option can be used to force the scan of archives only during on-demand scan.
324
321
325
322
### Degree of parallelism for on-demand scans
326
323
@@ -349,7 +346,7 @@ As it is under antivirusEngine this policy is only applicable for `epp` exclusio
349
346
350
347
> [!NOTE]
351
348
> Available in Defender for Endpoint version `100.83.73` or later.
352
-
> We recommend to configure exclusions and the merge policy under [exclusionSettings](#exclusion-setting-preferences), which enables you to configure exclusion of both `epp` and `global` scope with a single `mergePolicy`.
349
+
> We recommend configuring exclusions and the merge policy under [exclusionSettings](#exclusion-setting-preferences), which enables you to configure exclusion of both `epp` and `global` scope with a single `mergePolicy`.
353
350
354
351
### Scan exclusions
355
352
@@ -416,7 +413,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
416
413
|**Possible values**|any string|any string|
417
414
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
418
415
419
-
### Muting non-exec mounts
416
+
### Muting nonexec mounts
420
417
421
418
Specifies the behavior of RTP on mount point marked as `noexec`. There are two values for setting are:
422
419
@@ -445,7 +442,7 @@ Configure filesystems to be unmonitored/excluded from real-time protection (RTP)
445
442
|**Data type**|Array of strings|Dynamic String List|
446
443
447
444
> [!NOTE]
448
-
> Configured filesystem will be unmonitored only if it is present in Microsoft's list of permitted unmonitored filesystems.
445
+
> Configured filesystem is unmonitored only if it's present in Microsoft's list of permitted unmonitored filesystems.
449
446
450
447
By default, NFS and Fuse are unmonitored from RTP, Quick, and Full scans. However, they can still be scanned by a custom scan. For example, to remove NFS from the list of unmonitored filesystems list, update the managed config file as shown below. This will automatically add NFS to the list of monitored filesystems for RTP.
451
448
@@ -474,7 +471,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, use the follow
474
471
475
472
### Configure file hash computation feature
476
473
477
-
Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans. Note that enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
474
+
Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans. Enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
@@ -596,11 +593,11 @@ The `exclusionSettings` section of the configuration profile is used to configur
596
593
|**Comments**|See the following sections for a description of the dictionary contents.|
597
594
598
595
> [!NOTE]
599
-
> Already configured antivirus exclusions under (`antivirusEngine`) in managed JSON will continue to function as is with no impact. All new [exclusions](linux-exclusions.md) including antivirus exclusions can be added under this completely new section (`exclusionSettings`). This section is outside the (`antivirusEngine`) tag as its dedicated solely for configuring all types of exclusions that will come in future. You can also continue to use (`antivirusEngine`) for configuring antivirus exclusions.
596
+
> Already configured antivirus exclusions under (`antivirusEngine`) in managed JSON continues to function as is with no impact. All new [exclusions](linux-exclusions.md) including antivirus exclusions can be added under this new section (`exclusionSettings`). This section is outside the (`antivirusEngine`) tag as its dedicated solely for configuring all types of exclusions that will come in future. You can also continue to use (`antivirusEngine`) for configuring antivirus exclusions.
600
597
601
598
### Merge policy
602
599
603
-
Specifies the merge policy for exclusions. It specifies if it can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions. It is applicable for exclusions of all scopes.
600
+
Specifies the merge policy for exclusions. It specifies if it can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions. It's applicable for exclusions of all scopes.
604
601
605
602
|Description|JSON Value|
606
603
|---|---|
@@ -611,7 +608,7 @@ Specifies the merge policy for exclusions. It specifies if it can be a combinati
611
608
612
609
### Exclusions
613
610
614
-
Entities that need to be excluded can be specified by full paths, extensions, or file names. Each exclusion entity, i.e., either full path, extension or file name has an optional scope that can be specified. If not specified, the default value of scope in this section is *global*. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
611
+
Entities that need to be excluded can be specified by full paths, extensions, or file names. Each exclusion entity, that is, either full path, extension, or file name has an optional scope that can be specified. If not specified, the default value of scope in this section is *global*. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
615
612
616
613
|Description|JSON Value|
617
614
|---|---|
@@ -636,7 +633,7 @@ Specifies the set of exclusion scopes of content excluded. Currently supported s
636
633
If nothing is specified in for an exclusion under *exclusionSettings* in managed configuration, then `global` is considered as scope.
637
634
638
635
> [!NOTE]
639
-
> Previously configured antivirus exclusions under (`antivirusEngine`) in managed JSON will continue to function and their scope is considered (`epp`) since they were added as antivirus exclusions.
636
+
> Previously configured antivirus exclusions under (`antivirusEngine`) in managed JSON continues to function and their scope is considered (`epp`) since they were added as antivirus exclusions.
640
637
641
638
|Description|JSON Value|
642
639
|---|---|
@@ -645,7 +642,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
645
642
|**Possible values**|`epp` <br/>`global`|
646
643
647
644
> [!NOTE]
648
-
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
645
+
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions is (`epp`) since they were added under (`antivirusEngine`).
649
646
650
647
#### Path to excluded content
651
648
@@ -699,11 +696,11 @@ Specifies a process for which all file activity is excluded from scanning. The p
699
696
The following settings can be configured to enable certain advanced scanning features.
700
697
701
698
> [!IMPORTANT]
702
-
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
699
+
> Enabling these features might impact device performance. As such, it's recommended to keep the defaults unless recommended otherwise by Microsoft Support.
703
700
704
701
#### Configure scanning of file modify permissions events
705
702
706
-
When this feature is enabled, Defender for Endpoint will scan files when their permissions have been changed to set the execute bit(s).
703
+
When this feature is enabled, Defender for Endpoint scans files when their permissions have been changed to set the executed bits.
707
704
708
705
> [!NOTE]
709
706
> This feature is applicable only when the `enableFilePermissionEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-permissions-events) section below for details.
@@ -718,7 +715,7 @@ When this feature is enabled, Defender for Endpoint will scan files when their p
718
715
719
716
#### Configure scanning of file modify ownership events
720
717
721
-
When this feature is enabled, Defender for Endpoint will scan files for which ownership has changed.
718
+
When this feature is enabled, Defender for Endpoint scans files for which ownership has changed.
722
719
723
720
> [!NOTE]
724
721
> This feature is applicable only when the `enableFileOwnershipEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-ownership-events) section below for details.
@@ -734,7 +731,7 @@ When this feature is enabled, Defender for Endpoint will scan files for which ow
734
731
735
732
#### Configure scanning of raw socket events
736
733
737
-
When this feature is enabled, Defender for Endpoint will scan network socket events such as creation of raw sockets / packet sockets, or setting socket option.
734
+
When this feature is enabled, Defender for Endpoint scans network socket events such as creation of raw sockets / packet sockets, or setting socket option.
738
735
739
736
> [!NOTE]
740
737
> This feature is applicable only when Behavior Monitoring is enabled.
@@ -754,7 +751,7 @@ When this feature is enabled, Defender for Endpoint will scan network socket eve
754
751
The *cloudService* entry in the configuration profile is used to configure the cloud-driven protection feature of the product.
755
752
756
753
> [!NOTE]
757
-
> Cloud-delivered protection is applicable with any Enforcement level settings (real_time, on_demand, passive).
754
+
> Cloud-delivered protection is applicable with any Enforcement level settings (real time, on_demand, passive).
@@ -774,7 +771,7 @@ Determines whether cloud-delivered protection is enabled on the device or not. T
774
771
775
772
### Diagnostic collection level
776
773
777
-
Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft. For more details, see [Privacy for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-privacy).
774
+
Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft. For more information, see [Privacy for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-privacy).
@@ -784,13 +781,13 @@ Diagnostic data is used to keep Defender for Endpoint secure and up to date, det
784
781
785
782
### Configure cloud block level
786
783
787
-
This setting determines how aggressive Defender for Endpoint is in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan; otherwise, it is less aggressive and therefore blocks and scans with less frequency.
784
+
This setting determines how aggressive Defender for Endpoint is in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan; otherwise, it's less aggressive and therefore blocks and scans with less frequency.
788
785
789
786
There are five values for setting cloud block level:
790
787
791
788
- Normal (`normal`): The default blocking level.
792
789
- Moderate (`moderate`): Delivers verdict only for high confidence detections.
793
-
- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking non-harmful files).
790
+
- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking nonharmful files).
794
791
- High Plus (`high_plus`): Aggressively blocks unknown files and applies additional protection measures (might impact client device performance).
795
792
- Zero Tolerance (`zero_tolerance`): Blocks all unknown programs.
796
793
@@ -834,7 +831,7 @@ Depending on the enforcement level, the automatic security intelligence updates
834
831
The following settings can be configured to enable certain advanced features.
835
832
836
833
> [!IMPORTANT]
837
-
> Enabling these features might impact device performance. It is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
834
+
> Enabling these features might impact device performance. It's recommended to keep the defaults unless recommended otherwise by Microsoft Support.
@@ -858,7 +855,7 @@ Determines whether module load events (file open events on shared libraries) are
858
855
859
856
#### Remediate Infected File feature
860
857
861
-
Determines whether infected processes that open or load any infected file will get remediated or not.
858
+
Determines whether infected processes that open or load any infected file gets remediated or not.
862
859
863
860
> [!NOTE]
864
861
> When enabled, the processes that open or load any infected file are remediated in RTP mode. These processes don't appear in the threat list because they're not malicious, but are only terminated because they're loading the threat file in memory.
@@ -885,7 +882,7 @@ The following settings can be used to configure certain advanced supplementary s
885
882
Determines whether file modify permissions events (`chmod`) are monitored.
886
883
887
884
> [!NOTE]
888
-
> When this feature is enabled, Defender for Endpoint will monitor changes to the execute bits of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-permissions-events) section for more details.
885
+
> When this feature is enabled, Defender for Endpoint monitors changes to the executed bits of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-permissions-events) section for more details.
Determines whether file modify ownership events (`chown`) are monitored.
900
897
901
898
> [!NOTE]
902
-
> When this feature is enabled, Defender for Endpoint will monitor changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
899
+
> When this feature is enabled, Defender for Endpoint monitors changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
@@ -914,7 +911,7 @@ Determines whether network socket events involving creation of raw sockets / pac
914
911
915
912
> [!NOTE]
916
913
> This feature is applicable only when Behavior Monitoring is enabled.
917
-
> When this feature is enabled, Defender for Endpoint will monitor these network socket events, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-raw-socket-events) section above for more details.
914
+
> When this feature is enabled, Defender for Endpoint monitors these network socket events, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-raw-socket-events) section above for more details.
@@ -1094,7 +1091,7 @@ When you run the `mdatp health` command for the first time, the value for the ta
1094
1091
```
1095
1092
1096
1093
> [!NOTE]
1097
-
> Add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (please see the above example). At the moment, the only supported key name for tags is `GROUP`.
1094
+
> Add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (see the above example). At the moment, the only supported key name for tags is `GROUP`.
0 commit comments