You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-manually.md
+2-22Lines changed: 2 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: install-set-up-deploy
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 08/11/2025
18
+
ms.date: 11/03/2025
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -492,27 +492,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
492
492
493
493
## Defender for Endpoint package external package dependencies
494
494
495
-
The following external package dependencies exist for the `mdatp` package:
496
-
497
-
- The mdatp RPM package requires `glibc >= 2.17`
498
-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`
499
-
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
500
-
501
-
> [!NOTE]
502
-
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
503
-
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
504
-
> - The mdatp RPM package requires `audit`, `semanage`.
505
-
> - For DEBIAN, the mdatp package requires `auditd`.
506
-
> - For Mariner, the mdatp package requires `audit`.
> - The `mde-netfilter` package also has the following package dependencies:
511
-
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
512
-
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
513
-
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
514
-
515
-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
495
+
For information, see [Prerequisites for Microsoft Defender for Endpoint on Linux: External package dependency](./mde-linux-prerequisites.md#external-package-dependency).
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-downlevel.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,9 +91,9 @@ Review the following details to verify minimum system requirements:
91
91
> Due to the [deprecation of SHA-1 support by the MMA agent](/azure/azure-monitor/agents/agent-windows#sha-2-code-signing-support-requirement), the MMA agent needs to be version 10.20.18029 or newer.
92
92
93
93
2. Obtain the workspace ID:
94
-
- In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**
95
-
- Select the operating system
96
-
- Copy the workspace ID and workspace key
94
+
- In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**.
95
+
- Select the operating system.
96
+
- Copy the workspace ID and workspace key.
97
97
98
98
3. Using the Workspace ID and Workspace key choose any of the following installation methods to install the agent:
99
99
-[Manually install the agent using setup](/previous-versions/azure/azure-monitor/agents/agent-windows?tabs=setup-wizard#install-the-agent).
@@ -145,10 +145,10 @@ After completing the onboarding steps, you'll need to [Configure and update Syst
145
145
Verify that Microsoft Defender Antivirus and Microsoft Defender for Endpoint are running.
146
146
147
147
> [!NOTE]
148
-
> Running Microsoft Defender Antivirus is not required but it is recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
148
+
> Running Microsoft Defender Antivirus isn't required but it's recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
149
149
150
150
> [!NOTE]
151
-
> As Microsoft Defender Antivirus is only supported for Windows 10 and Windows 11, step 1 does not apply when running Windows Server 2008 R2 SP1.
151
+
> As Microsoft Defender Antivirus is only supported for Windows 10 and Windows 11, step 1 doesn't apply when running Windows Server 2008 R2 SP1.
152
152
153
153
1. Run the following command to verify that Microsoft Defender Antivirus is installed:
154
154
@@ -181,16 +181,16 @@ Follow the steps in [Run a detection test on a newly onboarded device](run-detec
181
181
182
182
For Windows Server 2008 R2 SP1, following updates are also required:
183
183
184
-
February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
184
+
-February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
:::image type="content" source="media/grppolicyconfig1.png" alt-text="Screenshot of the folders location." lightbox="media/grppolicyconfig1.png":::
227
227
228
228
**This will add a new folder on every server that gets the GPO applied, called MMA, and will be stored in c:\windows. This will contain the installation files for the MMA, prerequisites, and install script.**
229
229
230
230
- Create a Group Policy Files preference for each of the files stored in Net logon.
231
231
232
-
:::image type="content" source="media/grppolicyconfig2.png" alt-text="The group policy - 1" lightbox="media/grppolicyconfig2.png":::
232
+
:::image type="content" source="media/grppolicyconfig2.png" alt-text="Screenshot of the group policy - 1." lightbox="media/grppolicyconfig2.png":::
233
233
234
234
It copies the files from DOMAIN\NETLOGON\MMA\filename to
235
235
C:\windows\MMA\filename - **so the installation files are local to the server**:
:::image type="content" source="media/deploymma.png" alt-text="Screenshot of the deploy mma cmd properties." lightbox="media/deploymma.png":::
238
238
239
239
Repeat the process but create item level targeting on the COMMON tab, so the file only gets copied to the appropriate platform/Operating system version in scope:
:::image type="content" source="media/targeteditor.png" alt-text="Screenshot of the target editor." lightbox="media/targeteditor.png":::
242
242
243
243
For Windows Server 2008 R2 you'll need (and it will only copy down) the following:
244
244
@@ -248,9 +248,9 @@ For Windows Server 2008 R2 you'll need (and it will only copy down) the followin
248
248
249
249
Once this is done, you'll need to create a start-up script policy:
250
250
251
-
:::image type="content" source="media/startupprops.png" alt-text="The start up properties" lightbox="media/startupprops.png":::
251
+
:::image type="content" source="media/startupprops.png" alt-text="Screenshot of the start up properties." lightbox="media/startupprops.png":::
252
252
253
-
The name of the file to run here is c:\windows\MMA\DeployMMA.cmd.
253
+
The name of the file to run here's c:\windows\MMA\DeployMMA.cmd.
254
254
Once the server is restarted as part of the start-up process it will install the Update for customer experience and diagnostic telemetry KB, and then install the MMA Agent, while setting the Workspace ID and Key, and the server will be onboarded.
255
255
256
256
You could also use an **immediate task** to run the deployMMA.cmd if you don't want to reboot all the servers.
@@ -259,21 +259,21 @@ This could be done in two phases. First create **the files and the folder in** G
259
259
260
260
As the Script has an exit method and won't re-run if the MMA is installed, you could also use a daily scheduled task to achieve the same result. Similar to a Configuration Manager compliance policy it will check daily to ensure the MMA is present.
:::image type="content" source="media/tasksch.png" alt-text="Screenshot of the task scheduler." lightbox="media/tasksch.png":::
269
269
270
270
As mentioned in the onboarding documentation for Server specifically around Server 2008 R2 please see below:
271
271
For Windows Server 2008 R2 SP1, ensure that you fulfill the following requirements:
272
272
273
273
- Install the [February 2018 monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
274
274
- Install either [.NET framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
275
275
276
-
Please check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
276
+
Check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
277
277
278
278
## Offboard endpoints
279
279
@@ -303,7 +303,7 @@ You can use either of the following methods:
303
303
304
304
2. Select the Defender for Endpoint workspace, and click **Remove**.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,8 @@ Select a category to go to the [**Security recommendations**](tvm-security-recom
40
40
> [!TIP]
41
41
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
42
42
43
+
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and Secure Score.
By default, Copilot generates a summary for each incident, but you can change this setting to display incident summaries only in specific instances. You can choose to have summaries generated:
88
+
By default, Copilot generates a summary for each incident the user opens, but you can change this setting to display incident summaries only in specific instances. You can choose to have summaries generated:
89
89
90
-
- Always
91
-
- Based on the severity level of the incident
90
+
- Always (for every incident opened)
91
+
- Based on the severity level of the incident
92
92
- On demand only
93
93
94
94
To change the settings for Copilot incident summaries in Microsoft Sentinel, follow these steps:
@@ -105,11 +105,11 @@ To change the settings for Copilot incident summaries in Microsoft Sentinel, fol
105
105
106
106
1. Select **Save**.
107
107
108
-
- When you select **Incident severity**, an estimate of the number of incidents of each severity level reviewed per day is displayed, along with the estimated SCU cost.
108
+
- When you select **Incident severity**, an estimate of the number of incidents of each severity level reviewed per day is displayed, along with the estimated SCU consumption.
109
109
110
110
:::image type="content" source="./media/security-copilot-m365d-incident-summary/incident-severity.png" alt-text="Screenshot that shows the approximate number of incidents of each severity level.":::
111
111
112
-
- Copilot saves generated incident summaries for a week. If you select an incident whose summary is in the cache, the summary is automatically redisplayed at no cost regardless of the setting.
112
+
- Copilot saves generated incident summaries for a week. If you select an incident whose summary is in the cache, and the incident hasn't changed significantly, the summary is automatically redisplayed at no cost regardless of the setting.
113
113
- To generate a summary on demand for an incident that's not automatically generated, select the **Generate** button.
114
114
115
115
:::image type="content" source="media/security-copilot-m365d-incident-summary/generate-summary.png" alt-text="Screenshot that shows the Generate summary button on the incident page.":::
0 commit comments