You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3.[How to configure the list of exclusions](#how-to-configure-the-list-of-exclusions)
30
-
4.[Validate exclusions lists with the EICAR test file](#validate-exclusions-lists-with-the-eicar-test-file)
31
-
5.[Allow threats](#allow-threats)
32
-
33
25
**Applies to:**
34
26
35
27
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -41,7 +33,7 @@ ms.date: 07/23/2024
41
33
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
42
34
43
35
> [!IMPORTANT]
44
-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
36
+
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
45
37
46
38
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
47
39
@@ -81,7 +73,8 @@ Process|A specific process (specified either by the full path or file name) and
81
73
File, folder, and process exclusions support the following wildcards:
82
74
83
75
> [!NOTE]
84
-
> Wildcards are not supported while configuring global exclusions.
76
+
> File path needs to be present before adding or removing file exclusions with scope as global.
77
+
> Wildcards are not supported while configuring global exclusions.
85
78
86
79
Wildcard|Description|Examples|
87
80
---|---|---
@@ -114,7 +107,7 @@ mdatp exclusion
114
107
115
108
Examples:
116
109
117
-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
110
+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
118
111
119
112
```bash
120
113
mdatp exclusion extension add --name .txt
@@ -132,7 +125,7 @@ Examples:
132
125
Extension exclusion removed successfully
133
126
```
134
127
135
-
- Add/Remove an exclusion for a file:
128
+
- Add/Remove an exclusion fora file *(File path should already be presentincase of adding or removing exclusion with global scope)*:
Copy file name to clipboardExpand all lines: defender-endpoint/linux-preferences.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Set preferences for Microsoft Defender for Endpoint on Linux
3
-
ms.reviewer: gopkr
3
+
ms.reviewer: gopkr, ardeshmukh
4
4
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
5
5
ms.service: defender-endpoint
6
6
ms.author: dansimp
7
7
author: dansimp
8
8
ms.localizationpriority: medium
9
-
ms.date: 07/23/2024
9
+
ms.date: 07/31/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -79,7 +79,7 @@ Specifies the enforcement preference of antivirus engine. There are three values
79
79
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
80
80
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
81
81
82
-
#### Enable/disable behavior-monitoring
82
+
#### Enable/disable behaviormonitoring
83
83
84
84
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
85
85
@@ -136,9 +136,6 @@ Specifies the degree of parallelism for on-demand scans. This corresponds to the
136
136
137
137
#### Exclusion merge policy
138
138
139
-
> [!NOTE]
140
-
> ExclusionSetting - you can use
141
-
142
139
Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). Administrator-defined (admin_only) are exclusions that are configured by Defender for Endpoint policy. This setting can be used to restrict local users from defining their own exclusions.
143
140
144
141
|Description|JSON Value|Defender Portal Value|
@@ -149,6 +146,7 @@ Specifies the merge policy for exclusions. It can be a combination of administra
149
146
150
147
> [!NOTE]
151
148
> Available in Defender for Endpoint version `100.83.73` or later.
149
+
> Can also configure exclusions under [exclusionSettings](#exclusion-setting-preferences)
152
150
153
151
#### Scan exclusions
154
152
@@ -215,7 +213,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
215
213
|**Possible values**|any string|any string|
216
214
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
217
215
218
-
#### Muting Non Exec mounts
216
+
#### Muting non-exec mounts
219
217
220
218
Specifies the behavior of RTP on mount point marked as noexec. There are two values for setting are:
221
219
@@ -234,7 +232,7 @@ Specifies the behavior of RTP on mount point marked as noexec. There are two val
234
232
> [!NOTE]
235
233
> Available in Defender for Endpoint version `101.85.27` or later.
236
234
237
-
#### Unmonitor Filesystems
235
+
#### Unmonitor filesystems
238
236
239
237
Configure filesystems to be unmonitored/excluded from real-time protection (RTP). The filesystems configured are validated against Microsoft Defender's list of permitted filesystems. Filesystems can only be monitored after successful validation. These configured unmonitored filesystems are still scanned by Quick, Full, and custom scans in Microsoft Defender Antivirus.
240
238
@@ -266,7 +264,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266
264
```
267
265
268
266
> [!NOTE]
269
-
> Here;s the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
267
+
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
270
268
>
271
269
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
272
270
@@ -380,10 +378,12 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380
378
> [!NOTE]
381
379
> Available in Defender for Endpoint version `101.04.76` or later.
382
380
383
-
### Exclusion Setting preferences [**PREVIEW**]
381
+
### Exclusion setting preferences
382
+
383
+
**Exlusion setting preferences are currently in preview**.
384
384
385
385
> [!NOTE]
386
-
> Available in Defender for Endpoint version `101.23092.0012` or later.
386
+
> Available in Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring.
387
387
388
388
The *exclusionSettings* section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
389
389
@@ -444,6 +444,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
444
444
445
445
> [!NOTE]
446
446
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
447
+
447
448
##### Path to excluded content
448
449
449
450
Used to exclude content from the scan by full file path.
@@ -457,7 +458,10 @@ Used to exclude content from the scan by full file path.
457
458
458
459
##### Path type (file / directory)
459
460
460
-
Indicates if the *path* property refers to a file or directory.
461
+
Indicates if the *path* property refers to a file or directory.
462
+
463
+
> [!NOTE]
464
+
> File path must already exist if adding file exclusion with global scope.
0 commit comments