You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-exclusions.md
+22-14Lines changed: 22 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,29 +63,27 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
63
63
64
64
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
65
65
66
-
Exclusion|Definition|Examples
67
-
---|---|---
68
-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69
-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70
-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71
-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66
+
|Exclusion|Definition|Examples|
67
+
|---|---|---|
68
+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`|
69
+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`|
70
+
|Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`|
71
+
|Process|A specific process (specified either by the full path or file name) and all files opened by it.<br/>*We recommend using full and trusted process launch path.*|`/bin/cat`<br/>`cat`<br/>`c?t`|
72
72
73
73
> [!IMPORTANT]
74
-
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
75
-
76
-
File, folder, and process exclusions support the following wildcards:
74
+
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`. When implementing global process exclusions, exclude only what is absolutely necessary to ensure system reliability and security. Verify that the process is known and trusted, specify the complete path to the process location, and confirm that the process will consistently launch from the same trusted full path.
77
75
78
-
> [!NOTE]
79
-
> File path needs to be present before adding or removing file exclusions with scope as global.
80
-
> Wildcards aren't supported while configuring global exclusions.
76
+
### File, folder, and process exclusions support the following wildcards:
81
77
82
78
Wildcard|Description|Examples|
83
79
---|---|---
84
80
\*|Matches any number of any characters including none <br/> *(note if this wildcard isn't used at the end of the path then it substitutes only one folder)* | `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It doesn't include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
85
81
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
86
82
87
83
> [!NOTE]
84
+
> Wildcards aren't supported while configuring global exclusions.
88
85
> For antivirus exclusions, when using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
86
+
> File path needs to be present before adding or removing file exclusions with scope as global.
89
87
90
88
## How to configure the list of exclusions
91
89
@@ -140,10 +138,20 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140
138
141
139
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142
140
143
-
### Using the command line
141
+
### Using Defender for Endpoint security settings management
142
+
> [!NOTE]
143
+
> Please review the prerequisites: [Defender for Endpoint security settings management Prerequisites](https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration#prerequisites.md)
144
144
145
-
Run the following command to see the available switches for managing exclusions:
145
+
As a security administrator, you can configure different Microsoft Defender exclusions using security policy settings in the Microsoft Defender portal. If you are using security settings management for the first time, you need to refer the following steps:
146
+
147
+
-**Configure your tenant to support security settings management** - First step is to enable security settings management on your tenant if you haven’t already. Sign in to the Microsoft Defender portal and go to `Settings > Endpoints > Configuration Management > Enforcement Scope` and enable security settings management for Linux platform. Initially we recommend testing the feature for each platform by selecting the platforms option for on tagged devices and then tagging the devices with the “MDE-Management” tag. Once devices have been tagged, most devices complete enrollment and apply assigned policy within a few minutes, a device can sometimes take up to 24 hours to complete enrollment. For more information refer-[configure-your-tenant-to-support-defender-for-endpoint-security-settings-management](https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration#configure-your-tenant-to-support-defender-for-endpoint-security-settings-management.md)
148
+
149
+
-**Creating a dynamic Microsoft Entra group** - Create a dynamic Microsoft Entra group based on device OS Type to ensure all devices in Defender for Endpoint receive policies. This allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually.
146
150
151
+
-**Create an endpoint security policy**:
152
+
153
+
### Using the command line
154
+
Run the following command to see the available switches for managing exclusions:
147
155
> [!NOTE]
148
156
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
149
157
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
0 commit comments