Skip to content

Commit 6a51685

Browse files
committed
Update linux-preferences.md
1 parent 4a78e7c commit 6a51685

File tree

1 file changed

+28
-31
lines changed

1 file changed

+28
-31
lines changed

defender-endpoint/linux-preferences.md

Lines changed: 28 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
9-
ms.date: 03/28/2025
9+
ms.date: 05/09/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -82,7 +82,7 @@ To get started, we recommend using the first sample profile for your organizatio
8282

8383
##### Sample profile
8484

85-
It will help you to take advantage of important protection features that Defender for Endpoint on Linux provides. The following configuration profile:
85+
It helps you to take advantage of important protection features that Defender for Endpoint on Linux provides. The following configuration profile:
8686

8787
- Enables real-time protection (RTP)
8888
- Specifies how the following threat types are handled:
@@ -120,9 +120,6 @@ It will help you to take advantage of important protection features that Defende
120120

121121
The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over the product.
122122

123-
> [!NOTE]
124-
> It isn't possible to control all Microsoft Defender for Endpoint communication with only a proxy setting in this JSON.
125-
126123
```JSON
127124
{
128125
"antivirusEngine":{
@@ -266,15 +263,15 @@ Specifies the enforcement preference of antivirus engine. There are three values
266263
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in on-demand mode.
267264

268265
- Passive (`passive`): Runs the antivirus engine in passive mode. In this case, all of the following apply:
269-
- Real-time protection is turned off: Threats are not remediated by Microsoft Defender Antivirus.
266+
- Real-time protection is turned off: Threats aren't remediated by Microsoft Defender Antivirus.
270267
- On-demand scanning is turned on: Still use the scan capabilities on the endpoint.
271268
- Automatic threat remediation is turned off: No files are moved and your security administrator is expected to take required action.
272269
- Security intelligence updates are turned on: Alerts are available in the security administrator's tenant.
273270
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in passive mode.
274271

275272
> [!NOTE]
276273
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
277-
> It is recommended to also use [scheduled scans](/defender-endpoint/schedule-antivirus-scan-crontab) as per requirement.
274+
> It's recommended to also use [scheduled scans](/defender-endpoint/schedule-antivirus-scan-crontab) as per requirement.
278275
279276
### Enable or disable behavior monitoring (if RTP is enabled)
280277

@@ -320,7 +317,7 @@ Specifies whether to scan archives during on-demand antivirus scans.
320317

321318
> [!NOTE]
322319
> Available in Microsoft Defender for Endpoint version `101.45.00` or later.
323-
> Archive files are never scanned during real-time protection. When the files in an archive are extracted, they are scanned. The *scanArchives* option can be used to force the scan of archives only during on-demand scan.
320+
> Archive files are never scanned during real-time protection. When the files in an archive are extracted, they're scanned. The *scanArchives* option can be used to force the scan of archives only during on-demand scan.
324321
325322
### Degree of parallelism for on-demand scans
326323

@@ -349,7 +346,7 @@ As it is under antivirusEngine this policy is only applicable for `epp` exclusio
349346

350347
> [!NOTE]
351348
> Available in Defender for Endpoint version `100.83.73` or later.
352-
> We recommend to configure exclusions and the merge policy under [exclusionSettings](#exclusion-setting-preferences), which enables you to configure exclusion of both `epp` and `global` scope with a single `mergePolicy`.
349+
> We recommend configuring exclusions and the merge policy under [exclusionSettings](#exclusion-setting-preferences), which enables you to configure exclusion of both `epp` and `global` scope with a single `mergePolicy`.
353350
354351
### Scan exclusions
355352

@@ -416,7 +413,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
416413
|**Possible values**|any string|any string|
417414
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
418415

419-
### Muting non-exec mounts
416+
### Muting nonexec mounts
420417

421418
Specifies the behavior of RTP on mount point marked as `noexec`. There are two values for setting are:
422419

@@ -445,7 +442,7 @@ Configure filesystems to be unmonitored/excluded from real-time protection (RTP)
445442
|**Data type**|Array of strings|Dynamic String List|
446443

447444
> [!NOTE]
448-
> Configured filesystem will be unmonitored only if it is present in Microsoft's list of permitted unmonitored filesystems.
445+
> Configured filesystem is unmonitored only if it's present in Microsoft's list of permitted unmonitored filesystems.
449446
450447
By default, NFS and Fuse are unmonitored from RTP, Quick, and Full scans. However, they can still be scanned by a custom scan. For example, to remove NFS from the list of unmonitored filesystems list, update the managed config file as shown below. This will automatically add NFS to the list of monitored filesystems for RTP.
451448

@@ -474,7 +471,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, use the follow
474471
475472
### Configure file hash computation feature
476473

477-
Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans. Note that enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
474+
Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans. Enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
478475

479476
|Description|JSON Value|Microsoft Defender portal value|
480477
|---|---|---|
@@ -596,11 +593,11 @@ The `exclusionSettings` section of the configuration profile is used to configur
596593
|**Comments**|See the following sections for a description of the dictionary contents.|
597594

598595
> [!NOTE]
599-
> Already configured antivirus exclusions under (`antivirusEngine`) in managed JSON will continue to function as is with no impact. All new [exclusions](linux-exclusions.md) including antivirus exclusions can be added under this completely new section (`exclusionSettings`). This section is outside the (`antivirusEngine`) tag as its dedicated solely for configuring all types of exclusions that will come in future. You can also continue to use (`antivirusEngine`) for configuring antivirus exclusions.
596+
> Already configured antivirus exclusions under (`antivirusEngine`) in managed JSON continues to function as is with no impact. All new [exclusions](linux-exclusions.md) including antivirus exclusions can be added under this new section (`exclusionSettings`). This section is outside the (`antivirusEngine`) tag as its dedicated solely for configuring all types of exclusions that will come in future. You can also continue to use (`antivirusEngine`) for configuring antivirus exclusions.
600597
601598
### Merge policy
602599

603-
Specifies the merge policy for exclusions. It specifies if it can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions. It is applicable for exclusions of all scopes.
600+
Specifies the merge policy for exclusions. It specifies if it can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions. It's applicable for exclusions of all scopes.
604601

605602
|Description|JSON Value|
606603
|---|---|
@@ -611,7 +608,7 @@ Specifies the merge policy for exclusions. It specifies if it can be a combinati
611608

612609
### Exclusions
613610

614-
Entities that need to be excluded can be specified by full paths, extensions, or file names. Each exclusion entity, i.e., either full path, extension or file name has an optional scope that can be specified. If not specified, the default value of scope in this section is *global*. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
611+
Entities that need to be excluded can be specified by full paths, extensions, or file names. Each exclusion entity, that is, either full path, extension, or file name has an optional scope that can be specified. If not specified, the default value of scope in this section is *global*. (Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
615612

616613
|Description|JSON Value|
617614
|---|---|
@@ -636,7 +633,7 @@ Specifies the set of exclusion scopes of content excluded. Currently supported s
636633
If nothing is specified in for an exclusion under *exclusionSettings* in managed configuration, then `global` is considered as scope.
637634

638635
> [!NOTE]
639-
> Previously configured antivirus exclusions under (`antivirusEngine`) in managed JSON will continue to function and their scope is considered (`epp`) since they were added as antivirus exclusions.
636+
> Previously configured antivirus exclusions under (`antivirusEngine`) in managed JSON continues to function and their scope is considered (`epp`) since they were added as antivirus exclusions.
640637
641638
|Description|JSON Value|
642639
|---|---|
@@ -645,7 +642,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
645642
|**Possible values**|`epp` <br/>`global`|
646643

647644
> [!NOTE]
648-
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
645+
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions is (`epp`) since they were added under (`antivirusEngine`).
649646
650647
#### Path to excluded content
651648

@@ -699,11 +696,11 @@ Specifies a process for which all file activity is excluded from scanning. The p
699696
The following settings can be configured to enable certain advanced scanning features.
700697

701698
> [!IMPORTANT]
702-
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
699+
> Enabling these features might impact device performance. As such, it's recommended to keep the defaults unless recommended otherwise by Microsoft Support.
703700
704701
#### Configure scanning of file modify permissions events
705702

706-
When this feature is enabled, Defender for Endpoint will scan files when their permissions have been changed to set the execute bit(s).
703+
When this feature is enabled, Defender for Endpoint scans files when their permissions have been changed to set the executed bits.
707704

708705
> [!NOTE]
709706
> This feature is applicable only when the `enableFilePermissionEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-permissions-events) section below for details.
@@ -718,7 +715,7 @@ When this feature is enabled, Defender for Endpoint will scan files when their p
718715
719716
#### Configure scanning of file modify ownership events
720717

721-
When this feature is enabled, Defender for Endpoint will scan files for which ownership has changed.
718+
When this feature is enabled, Defender for Endpoint scans files for which ownership has changed.
722719

723720
> [!NOTE]
724721
> This feature is applicable only when the `enableFileOwnershipEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-ownership-events) section below for details.
@@ -734,7 +731,7 @@ When this feature is enabled, Defender for Endpoint will scan files for which ow
734731
735732
#### Configure scanning of raw socket events
736733

737-
When this feature is enabled, Defender for Endpoint will scan network socket events such as creation of raw sockets / packet sockets, or setting socket option.
734+
When this feature is enabled, Defender for Endpoint scans network socket events such as creation of raw sockets / packet sockets, or setting socket option.
738735

739736
> [!NOTE]
740737
> This feature is applicable only when Behavior Monitoring is enabled.
@@ -754,7 +751,7 @@ When this feature is enabled, Defender for Endpoint will scan network socket eve
754751
The *cloudService* entry in the configuration profile is used to configure the cloud-driven protection feature of the product.
755752

756753
> [!NOTE]
757-
> Cloud-delivered protection is applicable with any Enforcement level settings (real_time, on_demand, passive).
754+
> Cloud-delivered protection is applicable with any Enforcement level settings (real time, on_demand, passive).
758755
759756
|Description|JSON Value|Microsoft Defender portal value|
760757
|---|---|---|
@@ -774,7 +771,7 @@ Determines whether cloud-delivered protection is enabled on the device or not. T
774771

775772
### Diagnostic collection level
776773

777-
Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft. For more details, see [Privacy for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-privacy).
774+
Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft. For more information, see [Privacy for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-privacy).
778775

779776
|Description|JSON Value|Microsoft Defender portal value|
780777
|---|---|---|
@@ -784,13 +781,13 @@ Diagnostic data is used to keep Defender for Endpoint secure and up to date, det
784781

785782
### Configure cloud block level
786783

787-
This setting determines how aggressive Defender for Endpoint is in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan; otherwise, it is less aggressive and therefore blocks and scans with less frequency.
784+
This setting determines how aggressive Defender for Endpoint is in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan; otherwise, it's less aggressive and therefore blocks and scans with less frequency.
788785

789786
There are five values for setting cloud block level:
790787

791788
- Normal (`normal`): The default blocking level.
792789
- Moderate (`moderate`): Delivers verdict only for high confidence detections.
793-
- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking non-harmful files).
790+
- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking nonharmful files).
794791
- High Plus (`high_plus`): Aggressively blocks unknown files and applies additional protection measures (might impact client device performance).
795792
- Zero Tolerance (`zero_tolerance`): Blocks all unknown programs.
796793

@@ -834,7 +831,7 @@ Depending on the enforcement level, the automatic security intelligence updates
834831
The following settings can be configured to enable certain advanced features.
835832

836833
> [!IMPORTANT]
837-
> Enabling these features might impact device performance. It is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
834+
> Enabling these features might impact device performance. It's recommended to keep the defaults unless recommended otherwise by Microsoft Support.
838835
839836
|Description|JSON Value|Microsoft Defender portal value|
840837
|---|---|---|
@@ -858,7 +855,7 @@ Determines whether module load events (file open events on shared libraries) are
858855

859856
#### Remediate Infected File feature
860857

861-
Determines whether infected processes that open or load any infected file will get remediated or not.
858+
Determines whether infected processes that open or load any infected file gets remediated or not.
862859

863860
> [!NOTE]
864861
> When enabled, the processes that open or load any infected file are remediated in RTP mode. These processes don't appear in the threat list because they're not malicious, but are only terminated because they're loading the threat file in memory.
@@ -885,7 +882,7 @@ The following settings can be used to configure certain advanced supplementary s
885882
Determines whether file modify permissions events (`chmod`) are monitored.
886883

887884
> [!NOTE]
888-
> When this feature is enabled, Defender for Endpoint will monitor changes to the execute bits of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-permissions-events) section for more details.
885+
> When this feature is enabled, Defender for Endpoint monitors changes to the executed bits of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-permissions-events) section for more details.
889886
890887
|Description|JSON Value|Microsoft Defender portal value|
891888
|---|---|---|
@@ -899,7 +896,7 @@ Determines whether file modify permissions events (`chmod`) are monitored.
899896
Determines whether file modify ownership events (`chown`) are monitored.
900897

901898
> [!NOTE]
902-
> When this feature is enabled, Defender for Endpoint will monitor changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
899+
> When this feature is enabled, Defender for Endpoint monitors changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
903900
904901
|Description|JSON Value|Microsoft Defender portal value|
905902
|---|---|---|
@@ -914,7 +911,7 @@ Determines whether network socket events involving creation of raw sockets / pac
914911

915912
> [!NOTE]
916913
> This feature is applicable only when Behavior Monitoring is enabled.
917-
> When this feature is enabled, Defender for Endpoint will monitor these network socket events, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-raw-socket-events) section above for more details.
914+
> When this feature is enabled, Defender for Endpoint monitors these network socket events, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-raw-socket-events) section above for more details.
918915
919916
|Description|JSON Value|Microsoft Defender portal value|
920917
|---|---|---|
@@ -1094,7 +1091,7 @@ When you run the `mdatp health` command for the first time, the value for the ta
10941091
```
10951092

10961093
> [!NOTE]
1097-
> Add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (please see the above example). At the moment, the only supported key name for tags is `GROUP`.
1094+
> Add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (see the above example). At the moment, the only supported key name for tags is `GROUP`.
10981095
10991096
## Configuration profile validation
11001097

0 commit comments

Comments
 (0)