Skip to content

Commit 83900dd

Browse files
Learn Editor: Update linux-exclusions.md
1 parent f8932cf commit 83900dd

File tree

1 file changed

+22
-14
lines changed

1 file changed

+22
-14
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -63,29 +63,27 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
6363

6464
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
6565

66-
Exclusion|Definition|Examples
67-
---|---|---
68-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66+
|Exclusion|Definition|Examples|
67+
|---|---|---|
68+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`|
69+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`|
70+
|Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`|
71+
|Process|A specific process (specified either by the full path or file name) and all files opened by it.<br/>*We recommend using full and trusted process launch path.*|`/bin/cat`<br/>`cat`<br/>`c?t`|
7272

7373
> [!IMPORTANT]
74-
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
75-
76-
File, folder, and process exclusions support the following wildcards:
74+
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`. When implementing global process exclusions, exclude only what is absolutely necessary to ensure system reliability and security. Verify that the process is known and trusted, specify the complete path to the process location, and confirm that the process will consistently launch from the same trusted full path.
7775
78-
> [!NOTE]
79-
> File path needs to be present before adding or removing file exclusions with scope as global.
80-
> Wildcards aren't supported while configuring global exclusions.
76+
### File, folder, and process exclusions support the following wildcards:
8177

8278
Wildcard|Description|Examples|
8379
---|---|---
8480
\*|Matches any number of any characters including none <br/> *(note if this wildcard isn't used at the end of the path then it substitutes only one folder)* | `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It doesn't include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
8581
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
8682

8783
> [!NOTE]
84+
> Wildcards aren't supported while configuring global exclusions.
8885
> For antivirus exclusions, when using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
86+
> File path needs to be present before adding or removing file exclusions with scope as global.
8987
9088
## How to configure the list of exclusions
9189

@@ -140,10 +138,20 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140138

141139
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142140

143-
### Using the command line
141+
### Using Defender for Endpoint security settings management
142+
> [!NOTE]
143+
> Please review the prerequisites: [Defender for Endpoint security settings management Prerequisites](https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration#prerequisites.md)
144144
145-
Run the following command to see the available switches for managing exclusions:
145+
As a security administrator, you can configure different Microsoft Defender exclusions using security policy settings in the Microsoft Defender portal. If you are using security settings management for the first time, you need to refer the following steps:
146+
147+
- **Configure your tenant to support security settings management** - First step is to enable security settings management on your tenant if you haven’t already. Sign in to the Microsoft Defender portal and go to `Settings > Endpoints > Configuration Management > Enforcement Scope` and enable security settings management for Linux platform. Initially we recommend testing the feature for each platform by selecting the platforms option for on tagged devices and then tagging the devices with the “MDE-Management” tag. Once devices have been tagged, most devices complete enrollment and apply assigned policy within a few minutes, a device can sometimes take up to 24 hours to complete enrollment. For more information refer-[configure-your-tenant-to-support-defender-for-endpoint-security-settings-management](https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration#configure-your-tenant-to-support-defender-for-endpoint-security-settings-management.md)
148+
149+
- **Creating a dynamic Microsoft Entra group** - Create a dynamic Microsoft Entra group based on device OS Type to ensure all devices in Defender for Endpoint receive policies. This allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually.
146150

151+
- **Create an endpoint security policy**:
152+
153+
### Using the command line
154+
Run the following command to see the available switches for managing exclusions:
147155
> [!NOTE]
148156
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
149157
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.

0 commit comments

Comments
 (0)