Skip to content

Commit 970b385

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/defender-docs-pr (branch live)
2 parents cc90c1d + 23c21c6 commit 970b385

File tree

9 files changed

+325
-36
lines changed

9 files changed

+325
-36
lines changed

defender-endpoint/android-support-signin.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -108,19 +108,42 @@ Defender App asks for Battery Optimization/Permanent Protection permission on de
108108

109109
**Cause:**
110110

111-
Xiaomi changed the battery optimization permissions in Android 11. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations.
111+
Xiaomi changed the battery optimization permissions from Android 11 onwards. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations.
112112

113-
**Solution:**
114-
1. Install MDE app in personal profile. (Sign-in isn't required.)
113+
**Solution 1:**
114+
115+
The Android devices Battery Optimization screen opens automatically as part of the onboarding flow where the user needs to give the permissions. The user must then follow these steps to get on-boarded:
116+
117+
1. Select Work Profile to see all of the work profile apps
118+
119+
![Image of Battery Optimisation screen](media/android-support-signin/image.png)
120+
2. Tap on **Not optimised** and select **All Apps**
121+
122+
![Image of Optimisation dropdown menu](media/android-support-signin/image1.png)
123+
124+
![Image of All Apps option in the dropdown](media/android-support-signin/image2.png)
125+
126+
3. Scroll down to find **Microsoft Defender** and tap on it
127+
128+
![Image of All Apps including Microsoft Defender](media/android-support-signin/image3.png)
129+
130+
4. Select **Don’t Optimise** option and tap on **Done**
131+
132+
![Image of the Microsoft Defende Optimise drop down](media/android-support-signin/image4.png)
133+
134+
5. Navigate back to Defender
135+
136+
**Solution 2** (needed in case the Solution 1 does not work):
137+
138+
1. Install MDE app in personal profile. (Sign-in isn't required.)
115139
2. Open the Company Portal and tap on Settings.
116140
3. Go to the Battery Optimization section, tap on the **Turn Off** button, and then select on **Allow** to turn off Battery Optimization for the Company Portal.
117141
4. Again, go to the Battery Optimization section and tap on the **Turn On** button. The battery saver section opens.
118142
5. Find the Defender app and tap on it.
119143
6. Select **No Restriction**. Go back to the Defender app in work profile and tap on **Allow** button.
120144
7. The application shouldn't be uninstalled from personal profile for this to work.
121145

122-
>[!NOTE]
123-
>This is a temporary workaround. This can be used to unblock onboarding on Xiaomi devices. The Defender team is working on a permanent fix. As the MDE app is not onboarded in the personal profile, it will not have any visibility there.
146+
124147

125148
## Unable to use banking applications with MDE app
126149

defender-endpoint/linux-exclusions.md

Lines changed: 141 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,21 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 06/24/2024
18+
ms.date: 07/23/2024
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25+
**In this article:**
26+
27+
1. [Supported exclusion scopes](#supported-exclusion-scopes)
28+
2. [Supported exclusion types](#supported-exclusion-types)
29+
3. [How to configure the list of exclusions](#how-to-configure-the-list-of-exclusions)
30+
4. [Validate exclusions lists with the EICAR test file](#validate-exclusions-lists-with-the-eicar-test-file)
31+
5. [Allow threats](#allow-threats)
32+
2533
**Applies to:**
2634

2735
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -30,51 +38,73 @@ ms.date: 06/24/2024
3038

3139
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3240
33-
This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring.
41+
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
3442

3543
> [!IMPORTANT]
36-
> The exclusions described in this article don't apply to other Defender for Endpoint on Linux capabilities, including endpoint detection and response (EDR). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
44+
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
3745
38-
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux scans.
46+
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
3947

40-
Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. They can also be useful for mitigating performance issues caused by Defender for Endpoint on Linux.
48+
Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. Global exclusions are useful for mitigating performance issues caused by Defender for Endpoint on Linux.
4149

4250
> [!WARNING]
4351
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
4452
53+
## Supported exclusion scopes
54+
55+
As described in an earlier section, we support two exclusion scopes: antivirus (`epp`) and global (`global`) exclusions.
56+
57+
Antivirus exclusions can be used to exclude trusted files and processes from real-time protection while still having EDR visibility. Global exclusions are applied at sensor level and to mute the events that match exclusion conditions very early in the flow, before any processing is done, thus stopping all EDR alerts and antivirus detections.
58+
59+
> [!NOTE]
60+
> Global (`global`) is a new exclusion scope that we are introducing in addition to antivirus (`epp`) exclusion scopes that are already supported by Microsoft.
61+
62+
| Exclusion Category | Exclusion Scope | Description |
63+
| --- | --- | --- |
64+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus (AV) scans and on-demand scans.|
65+
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
66+
4567
## Supported exclusion types
4668

4769
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
4870

4971
Exclusion|Definition|Examples
5072
---|---|---
51-
File extension|All files with the extension, anywhere on the device|`.test`
73+
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
5274
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
5375
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
5476
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
5577

5678
> [!IMPORTANT]
57-
> The paths above must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
79+
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
5880
5981
File, folder, and process exclusions support the following wildcards:
6082

83+
> [!NOTE]
84+
> Wildcards are not supported while configuring global exclusions.
85+
6186
Wildcard|Description|Examples|
6287
---|---|---
63-
\*|Matches any number of any characters including none (note if this wildcard is not used at the end of the path then it will substitute only one folder)| `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It does not include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
88+
\*|Matches any number of any characters including none <br/> *(note if this wildcard isn't used at the end of the path then it substitutes only one folder)* | `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It doesn't include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
6489
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
90+
6591
> [!NOTE]
66-
> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
92+
For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
6793

6894
## How to configure the list of exclusions
6995

70-
### From the management console
96+
### Using the management console
7197

7298
For more information on how to configure exclusions from Puppet, Ansible, or another management console, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
7399

74-
### From the command line
100+
### Using the command line
75101

76102
Run the following command to see the available switches for managing exclusions:
77103

104+
> [!NOTE]
105+
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn’t mentioned, the scope value is set as `epp`.
106+
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
107+
78108
```bash
79109
mdatp exclusion
80110
```
@@ -84,7 +114,7 @@ mdatp exclusion
84114
85115
Examples:
86116

87-
- Add an exclusion for a file extension:
117+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
88118

89119
```bash
90120
mdatp exclusion extension add --name .txt
@@ -93,55 +123,112 @@ Examples:
93123
```console
94124
Extension exclusion configured successfully
95125
```
126+
127+
```bash
128+
mdatp exclusion extension remove --name .txt
129+
```
130+
131+
```Output
132+
Extension exclusion removed successfully
133+
```
96134

97-
- Add an exclusion for a file:
135+
- Add/Remove an exclusion for a file:
98136

99137
```bash
100-
mdatp exclusion file add --path /var/log/dummy.log
138+
mdatp exclusion file add --path /var/log/dummy.log --scope epp
101139
```
102140

103141
```console
104142
File exclusion configured successfully
105143
```
106144

107-
- Add an exclusion for a folder:
145+
```bash
146+
mdatp exclusion file remove --path /var/log/dummy.log --scope epp
147+
```
148+
149+
```console
150+
File exclusion removed successfully"
151+
```
152+
153+
```bash
154+
mdatp exclusion file add --path /var/log/dummy.log --scope global
155+
```
156+
157+
```console
158+
File exclusion configured successfully
159+
```
108160
109161
```bash
110-
mdatp exclusion folder add --path /var/log/
162+
mdatp exclusion file remove --path /var/log/dummy.log --scope global
163+
```
164+
165+
```console
166+
File exclusion removed successfully"
167+
```
168+
- Add/Remove an exclusion for a folder:
169+
170+
```bash
171+
mdatp exclusion folder add --path /var/log/ --scope epp
172+
```
173+
174+
```console
175+
Folder exclusion configured successfully
176+
```
177+
178+
```bash
179+
mdatp exclusion folder remove --path /var/log/ --scope epp
180+
```
181+
182+
```console
183+
Folder exclusion removed successfully
184+
```
185+
186+
```bash
187+
mdatp exclusion folder add --path /var/log/ --scope global
111188
```
112189

113190
```console
114191
Folder exclusion configured successfully
115192
```
116193

194+
```bash
195+
mdatp exclusion folder remove --path /var/log/ --scope global
196+
```
197+
198+
```console
199+
Folder exclusion removed successfully
200+
```
201+
117202
- Add an exclusion for a second folder:
118203

119204
```bash
120-
mdatp exclusion folder add --path /var/log/
121-
mdatp exclusion folder add --path /other/folder
205+
mdatp exclusion folder add --path /var/log/ --scope epp
206+
mdatp exclusion folder add --path /other/folder --scope global
122207
```
123208

124209
```console
125210
Folder exclusion configured successfully
126211
```
127212

128213
- Add an exclusion for a folder with a wildcard in it:
214+
215+
> [!NOTE]
216+
> Wildcards are not supported while configuring global exclusions.
129217

130218
```bash
131219
mdatp exclusion folder add --path "/var/*/tmp"
132220
```
133221

134222
> [!NOTE]
135-
> This will only exclude paths below */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
223+
> This will only exclude paths under */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
136224

137225
```bash
138-
mdatp exclusion folder add --path "/var/"
226+
mdatp exclusion folder add --path "/var/" --scope epp
139227
```
140228
OR
141229
```bash
142-
mdatp exclusion folder add --path "/var/*/"
230+
mdatp exclusion folder add --path "/var/*/" --scope epp
143231
```
144-
145232

146233
> [!NOTE]
147234
> This will exclude all paths whose parent is */var/*; for example, */var/this-subfolder/and-this-subfolder-as-well*.
@@ -153,18 +240,43 @@ Examples:
153240
- Add an exclusion for a process:
154241

155242
```bash
156-
mdatp exclusion process add --name cat
243+
mdatp exclusion process add --name /usr/bin/cat --scope global
244+
```
245+
246+
```console
247+
Process exclusion configured successfully
248+
```
249+
250+
```bash
251+
mdatp exclusion process remove --name /usr/bin/cat --scope global
252+
```
253+
254+
```Output
255+
Process exclusion removed successfully
256+
```
257+
258+
```bash
259+
mdatp exclusion process add --name /usr/bin/cat --scope epp
157260
```
158261

159262
```console
160263
Process exclusion configured successfully
161264
```
162265

266+
267+
```bash
268+
mdatp exclusion process remove --name /usr/bin/cat --scope epp
269+
```
270+
271+
```Output
272+
Process exclusion removed successfully
273+
```
274+
163275
- Add an exclusion for a second process:
164276

165277
```bash
166-
mdatp exclusion process add --name cat
167-
mdatp exclusion process add --name dog
278+
mdatp exclusion process add --name cat --scope epp
279+
mdatp exclusion process add --name dog --scope global
168280
```
169281

170282
```console
@@ -175,21 +287,21 @@ Examples:
175287

176288
You can validate that your exclusion lists are working by using `curl` to download a test file.
177289

178-
In the following Bash snippet, replace `test.txt` with a file that conforms to your exclusion rules. For example, if you have excluded the `.testing` extension, replace `test.txt` with `test.testing`. If you are testing a path, ensure that you run the command within that path.
290+
In the following Bash snippet, replace `test.txt` with a file that conforms to your exclusion rules. For example, if you have excluded the `.testing` extension, replace `test.txt` with `test.testing`. If you're testing a path, ensure that you run the command within that path.
179291
180292
```bash
181293
curl -o test.txt https://secure.eicar.org/eicar.com.txt
182294
```
183295
184-
If Defender for Endpoint on Linux reports malware, then the rule is not working. If there is no report of malware, and the downloaded file exists, then the exclusion is working. You can open the file to confirm that the contents are the same as what is described on the [EICAR test file website](https://www.eicar.org/download-anti-malware-testfile/).
296+
If Defender for Endpoint on Linux reports malware, then the rule isn't working. If there's no report of malware, and the downloaded file exists, then the exclusion is working. You can open the file to confirm that the contents are the same as what is described on the [EICAR test file website](https://www.eicar.org/download-anti-malware-testfile/).
185297
186-
If you do not have Internet access, you can create your own EICAR test file. Write the EICAR string to a new text file with the following Bash command:
298+
If you don't have Internet access, you can create your own EICAR test file. Write the EICAR string to a new text file with the following Bash command:
187299

188300
```bash
189301
echo 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*' > test.txt
190302
```
191303

192-
You can also copy the string into a blank text file and attempt to save it with the file name or in the folder you are attempting to exclude.
304+
You can also copy the string into a blank text file and attempt to save it with the file name or in the folder you're attempting to exclude.
193305
194306
## Allow threats
195307

0 commit comments

Comments
 (0)