You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -45,26 +45,23 @@ Before you get started, see [the main Defender for Endpoint on Linux page](micro
45
45
46
46
In addition, for Saltstack deployment, you need to be familiar with Saltstack administration, have Saltstack installed, configure the Master and Minions, and know how to apply states. Saltstack has many ways to complete the same task. These instructions assume availability of supported Saltstack modules, such as *apt* and *unarchive* to help deploy the package. Your organization might use a different workflow. Refer to the [Saltstack documentation](https://docs.saltproject.io/) for details.
47
47
48
+
Here are a few important points:
49
+
48
50
- Saltstack is installed on at least one computer (Saltstack calls the computer as the master).
49
51
- The Saltstack master accepted the managed nodes (Saltstack calls the nodes as minions) connections.
50
52
- The Saltstack minions are able to resolve communication to the Saltstack master (be default the minions try to communicate with a machine named 'salt').
51
-
- Rung this ping test:
52
-
53
-
```bash
54
-
sudo salt '*' test.ping
55
-
```
56
-
57
-
- The Saltstack master has a file server location where the Microsoft Defender for Endpoint files can be distributed from (by default Saltstack uses the /srv/salt folder as the default distribution point)
53
+
- Run the following ping test: `sudo salt '*' test.ping`
54
+
- The Saltstack master has a file server location where the Microsoft Defender for Endpoint files can be distributed from (by default Saltstack uses the `/srv/salt` folder as the default distribution point)
58
55
59
56
## Download the onboarding package
60
57
61
-
Download the onboarding package from Microsoft Defender portal.
62
-
63
58
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
64
59
65
-
1. In Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
60
+
1. In Microsoft Defender portal, go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
61
+
66
62
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Your preferred Linux configuration management tool** as the deployment method.
67
-
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
63
+
64
+
3. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
@@ -90,180 +87,182 @@ Download the onboarding package from Microsoft Defender portal.
90
87
91
88
## Create Saltstack state files
92
89
93
-
Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to deploy and onboard Defender for Endpoint. Add the Defender for Endpoint repository and key, `install_mdatp.sls`:
94
-
95
-
Defender for Endpoint on Linux can be deployed from one of the following channels:
96
-
97
-
- *insiders-fast*, denoted as `[channel]`
98
-
- *insiders-slow*, denoted as `[channel]`
99
-
- *prod*, denoted as `[channel]` using the version name (see [Linux Software Repository for Microsoft Products](/linux/packages))
100
-
101
-
Each channel corresponds to a Linux software repository.
90
+
In this step, you create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to deploy and onboard Defender for Endpoint. Then, you add the Defender for Endpoint repository and key: `install_mdatp.sls`.
102
91
103
-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
104
-
105
-
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
92
+
> [!NOTE]
93
+
> Defender for Endpoint on Linux can be deployed from one of the following channels:
94
+
>
95
+
> - *insiders-fast*, denoted as `[channel]`
96
+
> - *insiders-slow*, denoted as `[channel]`
97
+
> - *prod*, denoted as `[channel]` using the version name (see [Linux Software Repository for Microsoft Products](/linux/packages))
98
+
>
99
+
> Each channel corresponds to a Linux software repository.
100
+
>
101
+
> The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in*insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
102
+
>
103
+
> In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
106
104
107
105
> [!WARNING]
108
106
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
109
107
110
-
Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
111
-
112
-
In the following commands, replace *[distro]* and *[version]* with your information.
113
-
114
-
> [!NOTE]
115
-
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
116
-
117
-
```bash
118
-
cat /srv/salt/install_mdatp.sls
119
-
```
120
-
121
-
```output
122
-
add_ms_repo:
123
-
pkgrepo.managed:
124
-
- humanname: Microsoft Defender Repository
125
-
{% if grains['os_family'] == 'Debian' %}
126
-
- name: deb [arch=amd64,armhf,arm64] https://packages.microsoft.com/[distro]/[version]/[channel] [codename] main
Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender forEndpoint. Before using the offboarding state file, you need to download the offboarding package from the Security portal and extract itin the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
192
-
193
-
Create an Uninstall state file `uninstall_mdapt.sls` and add the state to remove the `mdatp_onboard.json` file.
- Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.
206
-
207
-
```Output
108
+
1. Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
109
+
110
+
In the following commands, replace *[distro]* and *[version]* with your information.
111
+
112
+
> [!NOTE]
113
+
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
114
+
115
+
```bash
116
+
cat /srv/salt/install_mdatp.sls
117
+
```
118
+
119
+
```output
120
+
add_ms_repo:
121
+
pkgrepo.managed:
122
+
- humanname: Microsoft Defender Repository
123
+
{% if grains['os_family'] == 'Debian' %}
124
+
- name: deb [arch=amd64,armhf,arm64] https://packages.microsoft.com/[distro]/[version]/[channel] [codename] main
5. Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the Security portal and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
190
+
191
+
6. Create an Uninstall state file `uninstall_mdapt.sls` and add the state to remove the `mdatp_onboard.json` file.
Now apply the state to the minions. The belowcommand applies the state to machines with the name that begins with `mdetest`.
239
+
In this step, you apply the state to the minions. The following command applies the state to machines with the name that begins with `mdetest`.
242
240
243
-
- Installation:
244
241
245
-
```bash
246
-
salt 'mdetest*' state.apply install_mdatp
247
-
```
242
+
1. Installation:
248
243
249
-
> [!IMPORTANT]
250
-
> When the product starts for the first time, it downloads the latest antimalware definitions. Depending on your Internet connection, this can take up to a few minutes.
244
+
```bash
245
+
salt 'mdetest*' state.apply install_mdatp
246
+
```
251
247
252
-
- Validation/configuration:
248
+
> [!IMPORTANT]
249
+
> When the product starts for the first time, it downloads the latest antimalware definitions. Depending on your Internet connection, this can take up to a few minutes.
253
250
254
-
```bash
255
-
salt 'mdetest*' cmd.run 'mdatp connectivity test'
256
-
```
251
+
2. Validation/configuration:
257
252
258
-
```bash
259
-
salt 'mdetest*' cmd.run 'mdatp health'
260
-
```
253
+
```bash
254
+
salt 'mdetest*' cmd.run 'mdatp connectivity test'
255
+
```
261
256
262
-
- Uninstallation:
257
+
```bash
258
+
salt 'mdetest*' cmd.run 'mdatp health'
259
+
```
263
260
264
-
```bash
265
-
salt 'mdetest*' state.apply uninstall_mdatp
266
-
```
261
+
3. Uninstallation:
262
+
263
+
```bash
264
+
salt 'mdetest*' state.apply uninstall_mdatp
265
+
```
267
266
268
267
## Log installation issues
269
268
@@ -280,4 +279,5 @@ When upgrading your operating system to a new major version, you must first unin
280
279
## See also
281
280
282
281
- [Investigate agent health issues](health-status.md)
282
+
283
283
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments