You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -31,21 +31,21 @@ Golden images are preconfigured virtual machine templates used to rapidly deploy
31
31
32
32
This guide walks you through:
33
33
34
-
-Installing Microsoft Defender for Endpoint on a golden image.
34
+
-Deploying Microsoft Defender for Endpoint on a golden image.
35
35
36
36
- Preparing the image for cloning.
37
37
38
38
- Ensuring unique identifiers for each virtual machine instance.
39
39
40
40
- Specific steps for cloud and on-premises environments.
41
41
42
-
## Step 1: Install Microsoft Defender for Endpoint on a golden image
42
+
## Step 1: Deploy Microsoft Defender for Endpoint on a golden image
43
43
44
-
1. Prepare the case virtual machine
44
+
1. Prepare the base virtual machine
45
45
46
46
- Install your preferred [supported Linux distribution](./mde-linux-prerequisites.md#supported-linux-distributions) and apply all necessary system updates.
47
47
48
-
1.Install Microsoft Defender for Endpoint
48
+
1.Deploy Microsoft Defender for Endpoint on a golden image
49
49
50
50
There are several methods and tools that you can use to deploy Microsoft Defender for Endpoint on Linux (applicable to AMD64 and ARM64 Linux servers):
51
51
@@ -65,28 +65,30 @@ This guide walks you through:
65
65
66
66
-[Guidance for Defender for Endpoint on Linux Server with SAP](./mde-linux-deployment-on-sap.md)
67
67
68
-
1. Validate Installation
68
+
1. Validate the deployment
69
69
70
70
Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
71
71
72
72
```bash
73
73
mdatp health
74
74
```
75
75
76
+
After you've successfully deployed Defender on the golden image, there is no need to deploy it separately on each virtual machine clone.
77
+
76
78
## Step 2: Prepare the golden image for cloning
77
79
78
-
Before making a snapshot of the virtual machine, follow these steps to ensure that each clone has a unique machine identity:
80
+
Before making a snapshot of the virtual machine, follow these steps to ensure that each virtual machine clone will have a unique machine identity:
79
81
80
82
### On-premises machines
81
83
82
-
Follow these steps for the respective virtualization platforms:
84
+
For on-premises virtual machines, make sure that the golden image generated from it is configured such that when it is cloned, each virtual machine clone will have a unique hardware UUID.
85
+
86
+
If you are using **KVM/libvirt** or **VMware/Hyper-V** as the virtualization platform, it is recommended to use the following instructions:
83
87
84
88
-**KVM/libvirt**: Omit the \<uuid\> element in domain XML or set a fresh UUID using: uuidgen
85
89
86
90
-**VMware/Hyper-V**: Enable platform settings to generate a new BIOS GUID during clone or conversion.
87
91
88
-
Ensure that the machines are configured to have a unique hardware UUID.
89
-
90
92
### Cloud virtual machines
91
93
92
94
Cloud platforms (for example, Azure, AWS, GCP) automatically inject unique metadata and identifiers via their instance metadata services (IMDS). No manual steps are required. Microsoft Defender for Endpoint automatically detects and uses these values to generate unique machine IDs.
0 commit comments