Skip to content

Commit 8c1d678

Browse files
authored
Update comprehensive-guidance-on-linux-deployment.md
Added a link that explains in great detail what the enterprise certificate pinning process Defender for Endpoint uses to keep the traffic between Endpoints and the backend cloud service secure. This is part of the important note that mentions this traffic should not be SSL inspected because it will break the certificate pinning chain.
1 parent 2f10f42 commit 8c1d678

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,8 @@ The following table lists the supported proxy settings:
130130

131131
#### Step 3: Verify SSL inspection isn't being performed on the network traffic
132132

133-
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You have to bypass SSL inspection for Microsoft Defender for Endpoint URLs.
133+
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You have to bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, please visit the following link:
134+
https://learn.microsoft.com/en-us/windows/security/identity-protection/enterprise-certificate-pinning
134135

135136
##### Troubleshoot cloud connectivity issues
136137

0 commit comments

Comments
 (0)