You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+39-32Lines changed: 39 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,14 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 12/04/2024
18
+
ms.date: 12/10/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
22
22
23
+
> [!TIP]
24
+
> We are excited to share that Microsoft Defender for Endpoint on Linux now extends support for ARM64-based Linux servers in preview! For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
@@ -47,37 +50,13 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
47
50
> [!NOTE]
48
51
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent). Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
49
52
50
-
### Installation instructions
51
-
52
-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
53
-
54
-
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
55
-
56
-
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
57
-
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
58
-
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
59
-
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
60
-
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
61
-
62
-
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
63
-
64
-
> [!IMPORTANT]
65
-
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
66
-
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
67
-
68
53
### System requirements
69
54
70
-
- Disk space: 2 GB
71
-
72
-
> [!NOTE]
73
-
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
74
-
75
-
- Cores: Two minimum, four preferred
55
+
- 1 CPU core minimum. For high-performance workloads, more cores are recommended.
76
56
77
-
> [!NOTE]
78
-
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
57
+
- Memory: At least 1 GB of RAM. For high-performance workloads, more memory might be needed.
79
58
80
-
-Memory: 1 GB minimum, 4 GB preferred
59
+
-Performance tuning might be needed based on workloads. See [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
81
60
82
61
- The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
83
62
- Red Hat Enterprise Linux 7.2 or higher
@@ -100,19 +79,28 @@ If you experience any installation failures, see [Troubleshooting installation f
100
79
- Fedora 33-38
101
80
- Rocky 8.7 and higher
102
81
- Rocky 9.2 and higher
103
-
- Alma 8.4 and higher
82
+
- Alma 8.4 and higher
104
83
- Alma 9.2 and higher
105
84
- Mariner 2
85
+
86
+
- The following Linux server distributions on ARM64 are now supported in preview:
87
+
- Ubuntu 20.04 ARM64
88
+
- Ubuntu 22.04 ARM64
89
+
- Amazon Linux 2 ARM64
90
+
- Amazon Linux 2023 ARM64
106
91
92
+
> [!IMPORTANT]
93
+
> Support for Microsoft Defender for Endpoint on Linux for ARM64-based Linux devices is now in preview. For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
94
+
107
95
> [!NOTE]
108
96
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
109
97
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
110
98
> Microsoft Defender Vulnerability Management is not supported on Rocky and Alma currently.
111
99
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
112
-
100
+
113
101
> [!CAUTION]
114
102
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
115
-
103
+
116
104
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
117
105
118
106
|RTP, Quick, Full Scan| Custom Scan|
@@ -141,6 +129,25 @@ If you experience any installation failures, see [Troubleshooting installation f
141
129
142
130
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
143
131
132
+
### Installation instructions
133
+
134
+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
135
+
136
+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
137
+
138
+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
139
+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
140
+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
141
+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
142
+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
143
+
- To install on ARM64-based Linux servers, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
144
+
145
+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
146
+
147
+
> [!IMPORTANT]
148
+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
149
+
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
150
+
144
151
### External package dependency
145
152
146
153
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
@@ -149,7 +156,7 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
149
156
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
150
157
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, and `mde-netfilter`
151
158
152
-
Themde-netfilter package also has the following package dependencies:
159
+
The`mde-netfilter` package also has the following package dependencies:
153
160
154
161
- For DEBIAN the mde-netfilter package requires `libnetfilter-queue1`, and `libglib2.0-0`
155
162
- For RPM the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
0 commit comments