Skip to content

Commit 8e5b7de

Browse files
committed
Update linux-install-manually.md
1 parent 29a1b37 commit 8e5b7de

File tree

1 file changed

+36
-38
lines changed

1 file changed

+36
-38
lines changed

defender-endpoint/linux-install-manually.md

Lines changed: 36 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The choice of the channel determines the type and frequency of updates that are
6464
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
6565

6666
> [!WARNING]
67-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
67+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, reconfigure your device to use the new channel, and follow the steps in this document to install the package from the new location.
6868
6969
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
7070

@@ -238,7 +238,7 @@ In order to preview new features and provide early feedback, it's recommended th
238238
2. Configure and enable the required repositories.
239239
240240
> [!NOTE]
241-
> On Mariner, Insider Fast Channel is not available.
241+
> On Mariner, Insider Fast Channel isn't available.
242242

243243
If you want to deploy Defender for Endpoint on Linux from the `prod` channel. Use the following commands
244244

@@ -357,11 +357,11 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
357357
> [!IMPORTANT]
358358
> If you miss this step, any command executed shows a warning message indicating that the product is unlicensed. Also the `mdatp health` command returns a value of `false`.
359359
360-
1. In the Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
360+
1. In the Microsoft Defender portal, go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
361361
362362
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script** as the deployment method.
363363
364-
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
364+
3. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
365365
366366
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal":::
367367
@@ -387,7 +387,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
387387
388388
## Client configuration
389389
390-
1. Copy MicrosoftDefenderATPOnboardingLinuxServer.py to the target device.
390+
1. Copy `MicrosoftDefenderATPOnboardingLinuxServer.py` to the target device.
391391
392392
> [!NOTE]
393393
> Initially the client device isn't associated with an organization and the *orgId* attribute is blank.
@@ -396,12 +396,11 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
396396
mdatp health --field org_id
397397
```
398398

399-
2. Run MicrosoftDefenderATPOnboardingLinuxServer.py.
399+
2. Run `MicrosoftDefenderATPOnboardingLinuxServer.py`.
400400

401401
> [!NOTE]
402402
> To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
403-
404-
> [!NOTE]
403+
>
405404
> To onboard a device that was previously offboard, you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
406405

407406
If you're running RHEL 8.x or Ubuntu 20.04 or higher, you need to use `python3`.
@@ -437,59 +436,61 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
437436
>
438437
> You might also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
439438
440-
1. Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
439+
5. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
441440
442-
- Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
441+
1. Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
443442
444-
```bash
445-
mdatp health --field real_time_protection_enabled
446-
```
443+
```bash
444+
mdatp health --field real_time_protection_enabled
445+
```
447446
448-
If it isn't enabled, execute the following command:
447+
If it isn't enabled, execute the following command:
449448

450-
```bash
451-
mdatp config real-time-protection --value enabled
452-
```
449+
```bash
450+
mdatp config real-time-protection --value enabled
451+
```
453452

454-
- Open a Terminal window and execute the following command to run a detection test:
453+
2. Open a Terminal window and execute the following command to run a detection test:
455454

456-
``` bash
457-
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
458-
```
455+
``` bash
456+
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
457+
```
459458

460-
- You can run more detection tests on zip files using either of the following commands:
459+
3. You can run more detection tests on zip files using either of the following commands:
461460

462461
```bash
463462
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
464463
curl -o /tmp/eicarcom2.zip https://secure.eicar.org/eicarcom2.zip
465464
```
466465

467-
- The files should be quarantined by Defender for Endpoint on Linux. Use the following command to list all the detected threats:
466+
The files should be quarantined by Defender for Endpoint on Linux.
467+
468+
4. Use the following command to list all the detected threats:
468469

469-
```bash
470-
mdatp threat list
471-
```
470+
```bash
471+
mdatp threat list
472+
```
472473

473-
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
474+
6. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
474475

475-
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
476+
1. Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
476477

477-
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
478+
2. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, and then run the following command: `./mde_linux_edr_diy.sh`
478479

479-
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
480+
After a few minutes, a detection should be raised in Microsoft Defender XDR.
480481

481-
- Look at the alert details, machine timeline, and perform your typical investigation steps.
482+
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
482483

483484
## Microsoft Defender for Endpoint package external package dependencies
484485

485-
The following external package dependencies exist for the mdatp package:
486+
The following external package dependencies exist for the `mdatp` package:
486487

487488
- The mdatp RPM package requires `glibc >= 2.17`, `policycoreutils`, `selinux-policy-targeted`, `mde-netfilter`
488489
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
489490
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
490491

491492
> [!NOTE]
492-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
493+
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
493494
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
494495
> - The mdatp RPM package requires `audit`, `semanage`.
495496
> - For DEBIAN, the mdatp package requires `auditd`.
@@ -503,7 +504,6 @@ The `mde-netfilter` package also has the following package dependencies:
503504

504505
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
505506

506-
507507
## Troubleshoot installation issues
508508

509509
- For details on how to find the log that's generated when an installation error occurs, see [Log installation issues](/defender-endpoint/linux-resources#log-installation-issues).
@@ -518,7 +518,6 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
518518
519519
- To get support from Microsoft, open a support ticket, and provide the log files created by using the [Microsoft Defender for Endpoint client analyzer tool](run-analyzer-linux.md).
520520
521-
522521
## How to switch between channels
523522
524523
For example, to change channel from Insiders-Fast to Production, do the following:
@@ -535,8 +534,7 @@ For example, to change channel from Insiders-Fast to Production, do the followin
535534
sudo yum-config-manager --disable packages-microsoft-com-fast-prod
536535
```
537536
538-
3. Re-install Microsoft Defender for Endpoint on Linux using the 'Production channel' and onboard the device to Defender Portal.
539-
537+
3. Reinstall Microsoft Defender for Endpoint on Linux using the `Production channel`, and onboard the device in the [Microsoft Defender portal](https://security.microsoft.com).
540538
541539
## How to configure policies for Microsoft Defender for Endpoint on Linux
542540
@@ -547,7 +545,7 @@ You can configure antivirus and EDR settings on your endpoints. For more informa
547545
548546
## Uninstall Microsoft Defender for Endpoint on Linux
549547
550-
For manual uninstallation, execute the below command as per your Linux distribution.
548+
For manual uninstallation, execute the following command for your Linux distribution.
551549
552550
- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux).
553551
- `sudo zypper remove mdatp` for SLES and variants.

0 commit comments

Comments
 (0)