You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-manually.md
+36-38Lines changed: 36 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ The choice of the channel determines the type and frequency of updates that are
64
64
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
65
65
66
66
> [!WARNING]
67
-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
67
+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, reconfigure your device to use the new channel, and follow the steps in this document to install the package from the new location.
68
68
69
69
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
70
70
@@ -238,7 +238,7 @@ In order to preview new features and provide early feedback, it's recommended th
238
238
2. Configure and enable the required repositories.
239
239
240
240
> [!NOTE]
241
-
> On Mariner, Insider Fast Channel is not available.
241
+
> On Mariner, Insider Fast Channel isn't available.
242
242
243
243
If you want to deploy Defender for Endpoint on Linux from the `prod` channel. Use the following commands
244
244
@@ -357,11 +357,11 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
357
357
> [!IMPORTANT]
358
358
> If you miss this step, any command executed shows a warning message indicating that the product is unlicensed. Also the `mdatp health` command returns a value of `false`.
359
359
360
-
1. In the Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
360
+
1. In the Microsoft Defender portal, go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
361
361
362
362
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script** as the deployment method.
363
363
364
-
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
364
+
3. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
365
365
366
366
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal":::
367
367
@@ -387,7 +387,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
387
387
388
388
## Client configuration
389
389
390
-
1. Copy MicrosoftDefenderATPOnboardingLinuxServer.py to the target device.
390
+
1. Copy `MicrosoftDefenderATPOnboardingLinuxServer.py` to the target device.
391
391
392
392
> [!NOTE]
393
393
> Initially the client device isn't associated with an organization and the *orgId* attribute is blank.
@@ -396,12 +396,11 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
396
396
mdatp health --field org_id
397
397
```
398
398
399
-
2. Run MicrosoftDefenderATPOnboardingLinuxServer.py.
399
+
2. Run `MicrosoftDefenderATPOnboardingLinuxServer.py`.
400
400
401
401
> [!NOTE]
402
402
> To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
403
-
404
-
> [!NOTE]
403
+
>
405
404
> To onboard a device that was previously offboard, you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
406
405
407
406
If you're running RHEL 8.x or Ubuntu 20.04 or higher, you need to use `python3`.
@@ -437,59 +436,61 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
437
436
>
438
437
> You might also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
439
438
440
-
1. Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
439
+
5. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
441
440
442
-
- Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
441
+
1. Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
443
442
444
-
```bash
445
-
mdatp health --field real_time_protection_enabled
446
-
```
443
+
```bash
444
+
mdatp health --field real_time_protection_enabled
445
+
```
447
446
448
-
If it isn't enabled, execute the following command:
447
+
If it isn't enabled, execute the following command:
449
448
450
-
```bash
451
-
mdatp config real-time-protection --value enabled
452
-
```
449
+
```bash
450
+
mdatp config real-time-protection --value enabled
451
+
```
453
452
454
-
- Open a Terminal window and execute the following command to run a detection test:
453
+
2. Open a Terminal window and execute the following command to run a detection test:
- The files should be quarantined by Defender for Endpoint on Linux. Use the following command to list all the detected threats:
466
+
The files should be quarantined by Defender for Endpoint on Linux.
467
+
468
+
4. Use the following command to list all the detected threats:
468
469
469
-
```bash
470
-
mdatp threat list
471
-
```
470
+
```bash
471
+
mdatp threat list
472
+
```
472
473
473
-
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
474
+
6. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
474
475
475
-
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
476
+
1. Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
476
477
477
-
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
478
+
2. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, andthen run the following command: `./mde_linux_edr_diy.sh`
478
479
479
-
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
480
+
After a few minutes, a detection should be raised in Microsoft Defender XDR.
480
481
481
-
- Look at the alert details, machine timeline, and perform your typical investigation steps.
482
+
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
482
483
483
484
## Microsoft Defender for Endpoint package external package dependencies
484
485
485
-
The following external package dependencies exist for the mdatp package:
486
+
The following external package dependencies exist for the `mdatp` package:
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
489
490
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
490
491
491
492
> [!NOTE]
492
-
>Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
493
+
>Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
493
494
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
494
495
> - The mdatp RPM package requires `audit`, `semanage`.
495
496
> - For DEBIAN, the mdatp package requires `auditd`.
@@ -503,7 +504,6 @@ The `mde-netfilter` package also has the following package dependencies:
503
504
504
505
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
505
506
506
-
507
507
## Troubleshoot installation issues
508
508
509
509
- For details on how to find the log that's generated when an installation error occurs, see [Log installation issues](/defender-endpoint/linux-resources#log-installation-issues).
@@ -518,7 +518,6 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
518
518
519
519
- To get support from Microsoft, open a support ticket, and provide the log files created by using the [Microsoft Defender for Endpoint client analyzer tool](run-analyzer-linux.md).
520
520
521
-
522
521
## How to switch between channels
523
522
524
523
For example, to change channel from Insiders-Fast to Production, do the following:
@@ -535,8 +534,7 @@ For example, to change channel from Insiders-Fast to Production, do the followin
3. Re-install Microsoft Defender for Endpoint on Linux using the 'Production channel' and onboard the device to Defender Portal.
539
-
537
+
3. Reinstall Microsoft Defender for Endpoint on Linux using the `Production channel`, and onboard the device in the [Microsoft Defender portal](https://security.microsoft.com).
540
538
541
539
## How to configure policies for Microsoft Defender for Endpoint on Linux
542
540
@@ -547,7 +545,7 @@ You can configure antivirus and EDR settings on your endpoints. For more informa
547
545
548
546
## Uninstall Microsoft Defender for Endpoint on Linux
549
547
550
-
For manual uninstallation, execute the below command as per your Linux distribution.
548
+
For manual uninstallation, execute the following command for your Linux distribution.
551
549
552
550
- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux).
553
551
- `sudo zypper remove mdatp` for SLES and variants.
0 commit comments