Skip to content

Commit 8b93e40

Browse files
authored
Merge pull request #2066 from MicrosoftDocs/main
Publish main to live, 10:30AM PST, 12/02
2 parents d8df438 + a8768b0 commit 8b93e40

File tree

5 files changed

+55
-45
lines changed

5 files changed

+55
-45
lines changed

CloudAppSecurityDocs/get-started.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,15 @@ To set up Defender for Cloud Apps, you must at least be a Security Administrator
2020

2121
Users with admin roles have the same admin permissions across any cloud apps your organization is subscribed to, regardless of where you've assigned the role. For more information, see [Assign admin roles](/microsoft-365/admin/add-users/assign-admin-roles) and [Assigning administrator roles in Microsoft Entra ID](/azure/active-directory/roles/permissions-reference).
2222

23+
2324
Microsoft Defender for Cloud Apps is a security tool and therefore doesn't require Microsoft 365 productivity suite licenses. For Microsoft 365 Cloud App Security (Microsoft Defender for Cloud Apps only for Microsoft 365), see [What are the differences between Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security?](editions-cloud-app-security-o365.md).
2425

2526
Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID applications to function properly. Do not disable these applications in Microsoft Entra ID:
2627

2728
- Microsoft Defender for Cloud Apps - APIs
2829
- Microsoft Defender for Cloud Apps - Customer Experience
2930
- Microsoft Defender for Cloud Apps - Information Protection
31+
- Microsoft Defender for Cloud Apps - MIP Server
3032

3133
## Access Defender for Cloud Apps
3234

defender-endpoint/linux-install-manually.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/28/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -495,9 +495,16 @@ Download the onboarding package from Microsoft Defender portal.
495495
496496
The following external package dependencies exist for the mdatp package:
497497
498-
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
499-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
500-
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
498+
- The mdatp RPM package requires `glibc >= 2.17`, `policycoreutils`, `selinux-policy-targeted`, `mde-netfilter`
499+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
500+
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
501+
502+
> [!NOTE]
503+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
504+
> If eBPF is not supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following additional dependency on the auditd package exists for mdatp:
505+
> - The mdatp RPM package requires `audit`, `semanage`.
506+
> - For DEBIAN the mdatp package requires `auditd`.
507+
> - For Mariner the mdatp package requires `audit`.
501508
502509
The mde-netfilter package also has the following package dependencies:
503510

defender-endpoint/linux-support-ebpf.md

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -116,7 +116,9 @@ Post reboot, run the following command to check if audit rules were cleared:
116116
The output of previous command should show no rules or any user added rules. In case where the rules weren't removed, do the following steps to clear the audit rules file:
117117

118118
1. Switch to ebpf mode.
119+
119120
2. Remove the file `/etc/audit/rules.d/mdatp.rules`.
121+
120122
3. Reboot the machine.
121123

122124
### Troubleshooting and Diagnostics
@@ -131,23 +133,29 @@ uname -a
131133

132134
1. Enabling eBPF on RHEL 8.1 version with SAP might result in kernel panic. To mitigate this issue, you can take one of the following steps:
133135

134-
- Use a distro version higher than RHEL 8.1.
135-
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136+
- Use a distro version higher than RHEL 8.1.
137+
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136138

137139
2. Using Oracle Linux 8.8 with kernel version **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** might result in kernel panic. To mitigate this issue, you can take one of the following steps:
138140

139-
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
140-
- Switch to AuditD mode if you need to use the same kernel version
141+
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
142+
- Switch to AuditD mode if you need to use the same kernel version
141143

142-
```bash
143-
sudo mdatp config ebpf-supplementary-event-provider --value disabled
144-
```
144+
```bash
145+
sudo mdatp config ebpf-supplementary-event-provider --value disabled
146+
```
147+
148+
- The following two sets of data help analyze potential issues and determine the most effective resolution options.
149+
150+
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
145151

146-
The following two sets of data help analyze potential issues and determine the most effective resolution options.
152+
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
147153

148-
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
154+
3. System hangs on Oracle Linux 7.9 running Defender for Linux when ksplice is used for live kernel patching.
149155

150-
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
156+
- Auto-install patching of ksplice simply adds a cron job to the endpoint.
157+
- To mitigate the hang issue, you can create a cron job which will first stop the mdatp service, apply ksplice based patching, then start the service.
158+
- As kernel patching is few seconds activity so this will not have major exposure in terms of security.
151159

152160
#### Troubleshooting performance issues
153161

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
@@ -165,7 +165,9 @@ Once hosted, copy the absolute path of the hosted server (up to and not includin
165165

166166
For example, if the script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, the corresponding URI is: `www.example.server.com:8000/linux/production/`
167167

168-
Once the Mirror Server is set up, we need to propagate this URL to the Linux endpoints using the Managed Configuration as described in the next section.
168+
We can also use the absolute path of directory (local / remote mount point) like `/tmp/wdav-update/linux/production`.
169+
170+
Once the Mirror Server is set up, we need to propagate this URL to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
169171

170172
## Configure the Endpoints
171173

@@ -182,17 +184,17 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
182184
"offlineDefintionUpdateFallbackToCloud":false,
183185
"offlineDefinitionUpdate": "enabled"
184186
},
185-
"features": {
186-
"offlineDefinitionUpdateVerifySig": "enabled"
187-
}
187+
"features": {
188+
"offlineDefinitionUpdateVerifySig": "enabled"
189+
}
188190
}
189191
```
190192

191193
| Field Name | Values | Comments |
192194
|-------------------------------------------|----------------------|-----------------------------------------------------|
193195
| `automaticDefinitionUpdateEnabled` | `True` / `False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
194196
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
195-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. |
197+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. This can be either in terms of the remote server URL, or a directory (local / remote mount point). |
196198
| `offlineDefinitionUpdate` | `enabled` / `disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
197199
| `offlineDefinitionUpdateFallbackToCloud` | `True` / `False` | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
198200
| `offlineDefinitionUpdateVerifySig` | `enabled` / `disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
@@ -287,16 +289,6 @@ offline_definition_update_fallback_to_cloud : false[managed]
287289
mdatp definitions update
288290
```
289291

290-
### Known Issues:
291-
292-
Offline signature update might fail in the following scenario:
293-
294-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
295-
296-
Mitigation steps:
297-
298-
A fix for this issue is planned to release soon.
299-
300292
## Useful Links
301293

302294
### Downloader script

defender-xdr/virus-initiative-criteria.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,37 +13,38 @@ ms.collection:
1313
- tier2
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 09/12/2024
16+
ms.date: 12/2/2024
1717
---
1818

1919
# Microsoft Virus Initiative
2020

2121
The Microsoft Virus Initiative (MVI) helps organizations improve the security solutions our customers rely on to keep them safe. We provide tools, resources, and knowledge to support better-together experiences with great performance, reliability, and compatibility.
2222

23-
Microsoft collaborates with MVI partners to define and follow Safe Deployment Practices (SDP) to support the safety and resiliency of our mutual customers. In addition, Microsoft engages MVI partners in the development of new platform capabilities to create highly available security solutions building on the foundational security features in Windows 11.
23+
Microsoft collaborates with MVI partners to define and follow Safe Deployment Practices (SDP) to support the safety and resiliency of our mutual customers. Microsoft also engages MVI partners in the development of new platform capabilities to create highly available security solutions building on the foundational security features in Windows 11.
2424

2525
## Become a member
2626

2727
You can request membership if you're a representative of an organization that develops antimalware technology. Not all applicants are accepted into the program.
28+
2829
To be considered for the MVI program, your organization must meet all the following requirements:
2930

3031
1. Your commercially available security solution must provide real-time protection that detects, prevents, and remediates malicious software.
3132
2. Your organization is responsible for both developing and distributing updates to end-customers that address compatibility with Windows.
32-
3. Your organization must be active in the antimalware industry and have a positive reputation, as evidenced by participation in industry conferences, membership in industry organizations, or being reviewed in industry-standard reports such as AV-Comparatives, OPSWAT, or Gartner.
33-
4. Your organization must sign a non-disclosure agreement (NDA) with Microsoft.
33+
3. Your organization must be active in the antimalware industry with a positive reputation, shown by participation in industry conferences, membership in industry organizations, or reviews in reports like AV-Comparatives, OPSWAT, or Gartner.
34+
4. Your organization must sign a non-disclosure agreement with Microsoft.
3435
5. Your organization must sign a program license agreement.
3536
6. Your organization must be active in the program and meet all program requirements.
3637
7. Your security solution must meet all program requirements, which requires use of [Trusted Signing](/azure/trusted-signing).
37-
8. Your security solution must have been certified within the last 12 months through independent testing by at least one of the organizations listed below. Yearly certification must be maintained.
38-
39-
|Test Provider|Lab Test Type|Minimum Level / Score|
40-
|---|---|---|
41-
|[AV-Comparatives](https://www.av-comparatives.org/testmethod/real-world-protection-tests)|Real-World Protection Test.|Approved rating|
42-
|[AV-Test](https://www.av-test.org/en/about-the-institute/certification)|Must pass tests for Windows. Certifications for Mac and Linux aren't accepted.|- AV-TEST Certified (home)<br/>- AV-TEST Approved (corporate)|
43-
|[SKD Labs](http://www.skdlabs.com)|Certification Requirements Product: Anti-virus or Antimalware.|Score >= 98.5% with On Demand, On Access and Total Detection tests|
44-
|[VB 100](https://www.virusbulletin.com/testing/vb100/vb100-methodology/vb100-methodology-ver1-1)|VB100 Certification Test V1.1|VB100 Certification|
45-
|[West Coast Labs](https://www.westcoastlabs.com/wclvalid)|West Coast Labs Verified|Product rating of A or higher with both Malware Detection and Malware Remediation|
46-
|[SE Labs](https://selabs.uk/en/reports/)|Protection, Small Business, or Enterprise EP Protection Test.|- Protection A rating <br/>- Small Business EP A rating<br/>- Enterprise EP Protection A rating |
38+
8. Your security solution must be certified within the last 12 months by at least one of the organizations listed below through independent testing. Yearly certification must be maintained.
39+
40+
|Test Provider|Lab Test Type|Minimum Level/Score|
41+
| -------- | -------- | -------- |
42+
|[AV-Comparatives](https://www.av-comparatives.org/testmethod/real-world-protection-tests)|Real-World Protection Test or Malware Protection Test|Certified/Approved/Standard|
43+
|[AV-Test](https://www.av-test.org/en/about-the-institute/certification)|Real-World Protection Test for MVI, AV-Test |97% (Real-World Protection test for MVI)/Certified (AV-Test Home)/ Approved (AV-Test Enterprise)|
44+
|[SE Labs](https://selabs.uk/en/reports/)|Endpoint Security (EPS) or Enterprise Advanced Security (EAS)|AAA|
45+
|[SKD Labs](https://www.skdlabs.com/html/english/)|Starcheck Anti-malware Real-time protection and cleaning|Starcheck Certified|
46+
|[VB 100](https://www.virusbulletin.com/testing/vb100/vb100-methodology/vb100-methodology-ver1-1)|VB100|Detection rate of 95% with Grade C or higher|
47+
|[West Coast Labs](https://www.westcoastlabs.com/wclvalid)|WCL Validated for Malware Detection and Malware Remediation technologies|Product Rating A|
4748

4849
## Apply now
4950

0 commit comments

Comments
 (0)