You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+42-88Lines changed: 42 additions & 88 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/11/2024
18
+
ms.date: 10/21/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
@@ -24,7 +24,6 @@ ms.date: 10/11/2024
24
24
25
25
**Applies to:**
26
26
27
-
- Microsoft Defender for Servers
28
27
- Microsoft Defender XDR
29
28
30
29
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
@@ -41,11 +40,10 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
41
40
### Prerequisites
42
41
43
42
- Access to the Microsoft Defender portal
44
-
- Linux distribution using the [systemd](https://systemd.io/)system manager
43
+
- Linux distribution using the [systemd](https://systemd.io/)system manager
45
44
46
45
> [!NOTE]
47
46
> Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
48
-
49
47
- Beginner-level experience in Linux and BASH scripting
50
48
- Administrative privileges on the device (for manual deployment)
51
49
@@ -76,12 +74,17 @@ In general you need to take the following steps:
76
74
### System requirements
77
75
78
76
- Disk space: 2 GB
77
+
79
78
> [!NOTE]
80
79
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
80
+
81
81
- Cores: 2 minimum, 4 preferred
82
+
82
83
> [!NOTE]
83
84
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
85
+
84
86
- Memory: 1 GB minimum, 4 preferred
87
+
85
88
- List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
86
89
- Red Hat Enterprise Linux 6.7 or higher (In preview)
87
90
- Red Hat Enterprise Linux 7.2 or higher
@@ -108,87 +111,38 @@ In general you need to take the following steps:
108
111
- Alma 8.4 and higher
109
112
- Alma 9.2 and higher
110
113
- Mariner 2
111
-
112
-
> [!NOTE]
113
-
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
114
-
> With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; Defender for Endpoint on Linux support for RHEL 6 will also be deprecated by June 30, 2024
115
-
> Defender for Endpoint on Linux version `101.23082.0011` is the last Defender for Endpoint on Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
116
-
> Microsoft Defender Vulnerablity Management is not supported on Rocky and Alma currently.
117
-
118
-
- List of supported kernel versions
119
-
120
-
> [!NOTE]
121
-
> Microsoft Defender for Endpoint on Red Hat Enterprise Linux and CentOS - 6.7 to 6.10 is a Kernel based solution. You must verify that the kernel version is supported before updating to a newer kernel version.
122
-
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
123
-
124
-
- The `fanotify` kernel option must be enabled
125
-
126
-
- Red Hat Enterprise Linux 6 and CentOS 6:
127
-
- For 6.7: 2.6.32-573.* (except 2.6.32-573.el6.x86_64)
128
-
- For 6.8: 2.6.32-642.*
129
-
- For 6.9: 2.6.32-696.* (except 2.6.32-696.el6.x86_64)
130
-
- For 6.10:
131
-
- 2.6.32-754.10.1.el6.x86_64
132
-
- 2.6.32-754.11.1.el6.x86_64
133
-
- 2.6.32-754.12.1.el6.x86_64
134
-
- 2.6.32-754.14.2.el6.x86_64
135
-
- 2.6.32-754.15.3.el6.x86_64
136
-
- 2.6.32-754.17.1.el6.x86_64
137
-
- 2.6.32-754.18.2.el6.x86_64
138
-
- 2.6.32-754.2.1.el6.x86_64
139
-
- 2.6.32-754.22.1.el6.x86_64
140
-
- 2.6.32-754.23.1.el6.x86_64
141
-
- 2.6.32-754.24.2.el6.x86_64
142
-
- 2.6.32-754.24.3.el6.x86_64
143
-
- 2.6.32-754.25.1.el6.x86_64
144
-
- 2.6.32-754.27.1.el6.x86_64
145
-
- 2.6.32-754.28.1.el6.x86_64
146
-
- 2.6.32-754.29.1.el6.x86_64
147
-
- 2.6.32-754.29.2.el6.x86_64
148
-
- 2.6.32-754.3.5.el6.x86_64
149
-
- 2.6.32-754.30.2.el6.x86_64
150
-
- 2.6.32-754.33.1.el6.x86_64
151
-
- 2.6.32-754.35.1.el6.x86_64
152
-
- 2.6.32-754.39.1.el6.x86_64
153
-
- 2.6.32-754.41.2.el6.x86_64
154
-
- 2.6.32-754.43.1.el6.x86_64
155
-
- 2.6.32-754.47.1.el6.x86_64
156
-
- 2.6.32-754.48.1.el6.x86_64
157
-
- 2.6.32-754.49.1.el6.x86_64
158
-
- 2.6.32-754.6.3.el6.x86_64
159
-
- 2.6.32-754.9.1.el6.x86_64
160
-
161
-
> [!NOTE]
162
-
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
114
+
115
+
> [!NOTE]
116
+
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
117
+
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
118
+
> Microsoft Defender Vulnerablity Management is not supported on Rocky and Alma currently.
119
+
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
163
120
164
121
> [!CAUTION]
165
122
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
166
123
167
124
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
168
-
169
-
|RTP, Quick, Full Scan| Custom Scan|
170
-
|---|---|
171
-
|btrfs|All filesystems supported for RTP, Quick, Full Scan|
172
-
|ecryptfs|Efs|
173
-
|ext2|S3fs|
174
-
|ext3|Blobfuse|
175
-
|ext4|Lustr|
176
-
|fuse|glustrefs|
177
-
|fuseblk|Afs|
178
-
|jfs|sshfs|
179
-
|nfs (v3 only)|cifs|
180
-
|overlay|smb|
181
-
|ramfs|gcsfuse|
182
-
|reiserfs|sysfs|
183
-
|tmpfs|
184
-
|udf|
185
-
|vfat|
186
-
|xfs|
187
-
188
-
189
-
After you've enabled the service, you need to configure your network or firewall to allow outbound connections between it and your endpoints.
190
-
191
-
- Audit framework (`auditd`) must be enabled.
125
+
126
+
|RTP, Quick, Full Scan| Custom Scan|
127
+
|---|---|
128
+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
129
+
|`ecryptfs`|`Efs`|
130
+
|`ext2`|`S3fs`|
131
+
|`ext3`|`Blobfuse`|
132
+
|`ext4`|`Lustr`|
133
+
|`fuse`|`glustrefs`|
134
+
|`fuseblk`|`Afs`|
135
+
|`jfs`|`sshfs`|
136
+
|`nfs` (v3 only)|`cifs`|
137
+
|`overlay`|`smb`|
138
+
|`ramfs`|`gcsfuse`|
139
+
|`reiserfs`|`sysfs`|
140
+
|`tmpfs`||
141
+
|`udf`||
142
+
|`vfat`||
143
+
|`xfs`||
144
+
145
+
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
192
146
193
147
> [!NOTE]
194
148
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -197,17 +151,16 @@ After you've enabled the service, you need to configure your network or firewall
197
151
198
152
### External package dependency
199
153
200
-
The following external package dependencies exist for the mdatp package:
154
+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
204
-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
156
+
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage``selinux-policy-targeted`, and `mde-netfilter`
157
+
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
158
+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, and `mde-netfilter`
205
159
206
160
The mde-netfilter package also has the following package dependencies:
207
-
- For DEBIAN the mde-netfilter package requires `libnetfilter-queue1`, `libglib2.0-0`
208
-
- For RPM the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
209
161
210
-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies.
162
+
- For DEBIAN the mde-netfilter package requires `libnetfilter-queue1`, and `libglib2.0-0`
163
+
- For RPM the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
211
164
212
165
### Configuring Exclusions
213
166
@@ -226,7 +179,6 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
226
179
227
180
> [!WARNING]
228
181
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
229
-
>
230
182
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
231
183
232
184
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
@@ -250,7 +202,9 @@ High I/O workloads from certain applications can experience performance issues w
250
202
## Related articles
251
203
252
204
-[Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
205
+
253
206
-[Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
207
+
254
208
-[Turn on network protection for Linux](network-protection-linux.md)
255
209
256
210
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments