Skip to content

Commit 79bb351

Browse files
authored
Merge branch 'main' into docs-editor/troubleshoot-asr-1736519781
2 parents c7bca17 + 9d7f6b8 commit 79bb351

File tree

3 files changed

+32
-32
lines changed

3 files changed

+32
-32
lines changed

defender-endpoint/attack-surface-reduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 05/02/2024
19+
ms.date: 01/10/2025
2020
---
2121

2222
# Attack surface reduction rules overview
@@ -79,7 +79,7 @@ For information about configuring per-rule exclusions, see the section titled **
7979

8080
## Warn mode for users
8181

82-
(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
82+
Whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
8383

8484
Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
8585

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/07/2025
18+
ms.date: 01/10/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4545

4646
> [!NOTE]
4747
> Linux distribution using system manager supports both SystemV and Upstart.
48-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
4949
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5050
5151
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106106
107107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108108

109-
|RTP, Quick, Full Scan| Custom Scan|
110-
|---|---|
111-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112-
|`ecryptfs`|`Efs`|
113-
|`ext2`|`S3fs`|
114-
|`ext3`|`Blobfuse`|
115-
|`ext4`|`Lustr`|
116-
|`fuse`|`glustrefs`|
117-
|`fuseblk`|`Afs`|
118-
|`jfs`|`sshfs`|
119-
|`nfs` (v3 only)|`cifs`|
120-
|`overlay`|`smb`|
121-
|`ramfs`|`gcsfuse`|
122-
|`reiserfs`|`sysfs`|
123-
|`tmpfs`||
124-
|`udf`||
125-
|`vfat`||
126-
|`xfs`||
127-
109+
|RTP, Quick, Full Scan| Custom Scan|
110+
|---|---|
111+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112+
|`ecryptfs`|`Efs`|
113+
|`ext2`|`S3fs`|
114+
|`ext3`|`Blobfuse`|
115+
|`ext4`|`Lustr`|
116+
|`fuse`|`glustrefs`|
117+
|`fuseblk`|`Afs`|
118+
|`jfs`|`sshfs`|
119+
|`nfs` (v3 only)|`cifs`|
120+
|`overlay`|`smb`|
121+
|`ramfs`|`gcsfuse`|
122+
|`reiserfs`|`sysfs`|
123+
|`tmpfs`||
124+
|`udf`||
125+
|`vfat`||
126+
|`xfs`||
127+
128128
> [!NOTE]
129-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132-
132+
133133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
134134

135135
### Installation instructions

defender-endpoint/minimum-requirements.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 01/06/2025
9+
ms.date: 01/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -85,7 +85,7 @@ Supported versions of Windows include:
8585
- Windows 10 Education
8686
- Windows 10 Pro
8787
- Windows 10 Pro Education
88-
- Windows server
88+
- Windows Server
8989
- Windows Server 2012 R2
9090
- Windows Server 2016
9191
- Windows Server, version 1803 or later
@@ -130,23 +130,23 @@ To add anti-malware protection to these older operating systems, you can use [Sy
130130

131131
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
132132

133-
- Cores: Two minimum, four preferred
134-
- Memory: One GB minimum, four preferred
133+
- Cores: 2 minimum, 4 preferred
134+
135+
- Memory: 1GB minimum, 4 GB preferred
135136

136137
### Network and data storage and configuration requirements
137138

138139
When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
139140

140141
> [!NOTE]
141-
>
142142
> - You can't change your data storage location after the first-time setup.
143143
> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
144144
145145
#### IP stack
146146

147-
IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
147+
Internet Protocol Version 4 (IPv4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
148148

149-
Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
149+
Alternatively, if you must use an Internet Protocol Version 6 (IPv6) only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
150150

151151
#### Internet connectivity
152152

0 commit comments

Comments
 (0)