Skip to content

Commit 9d02529

Browse files
authored
Merge branch 'main' into v-smandalika-9477468
2 parents 411ef63 + 07d4822 commit 9d02529

File tree

5 files changed

+82
-65
lines changed

5 files changed

+82
-65
lines changed

defender-endpoint/mde-plugin-wsl.md

Lines changed: 73 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)
33
description: Learn how to set up and use the Defender for Endpoint plug-in for Windows Subsystem for Linux.
4-
author: pahuijbr
5-
ms.author: pahuijbr
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.reviewer: gokulgiju, priyankagill, kvitta
7+
ms.reviewer: gokulgiju, priyankagill, kvitta, pahuijbr
88
ms.service: defender-endpoint
99
ms.subservice: onboard
1010
ms.topic: how-to
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 08/12/2024
18+
ms.date: 10/24/2024
1919
search.appverid: MET150
2020
---
2121

@@ -83,20 +83,20 @@ If your Windows Subsystem for Linux isn't installed yet, follow these steps:
8383

8484
3. Confirm that WSL is installed and running.
8585

86-
1. Using Terminal or Command Prompt, run `wsl –-update` to make sure you have the latest version.
86+
1. Using Terminal or Command Prompt, run `wsl –-update` to make sure you have the latest version.
8787

88-
2. Run the `wsl` command to ensure WSL is running before testing.
88+
2. Run the `wsl` command to ensure WSL is running before testing.
8989

9090
4. Install the plug-in by following these steps:
9191

92-
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**).
92+
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**).
9393

94-
2. Open a command prompt/terminal and run `wsl`.
94+
2. Open a command prompt/terminal and run `wsl`.
9595

9696
You can [deploy the package using Microsoft Intune](/mem/intune/apps/lob-apps-windows).
9797

9898
> [!NOTE]
99-
> If `WslService` is running, it stops during the installation process. You do not need to onboard the subsystem separately; instead, the plug-in automatically onboards to the tenant the Windows host is onboarded to.
99+
> If `WslService` is running, it stops during the installation process. You do not need to onboard the subsystem separately. Instead, the plug-in automatically onboards to the tenant the Windows host is onboarded to.
100100
101101
## Installation validation checklist
102102

@@ -161,7 +161,7 @@ After installing the plug-in, the subsystem and all its running containers are o
161161

162162
2. Filter using the tag **WSL2**.
163163

164-
:::image type="content" source="media/mdeplugin-wsl/wsl-device-inventory.png" alt-text="Screenshot showing device inventory filter" lightbox="media/mdeplugin-wsl/wsl-device-inventory.png":::
164+
:::image type="content" source="media/mdeplugin-wsl/wsl-device-inventory.png" alt-text="Screenshot showing device inventory filter" lightbox="media/mdeplugin-wsl/wsl-device-inventory.png":::
165165

166166
You can see all WSL instances in your environment with an active Defender for Endpoint plug-in for WSL. These instances represent all distributions running inside WSL on a given host. The hostname of a *device* matches that of the Windows host. However, it's represented as a Linux device.
167167

@@ -175,7 +175,7 @@ The timeline is populated, similar to Defender for Endpoint on Linux, with event
175175

176176
The plug-in onboards the WSL machine with the tag `WSL2`. Should you or your organization need a custom tag, please follow the steps outlined below:
177177

178-
1. Open Registry Editor as an administrator
178+
1. Open Registry Editor as an administrator.
179179

180180
2. Create a registry key with the following details:
181181

@@ -186,9 +186,9 @@ The plug-in onboards the WSL machine with the tag `WSL2`. Should you or your org
186186

187187
3. Once the registry is set, restart wsl using the following steps:
188188

189-
1. Open Command Prompt and run the command, `wsl --shutdown`.
189+
1. Open Command Prompt and run the command, `wsl --shutdown`.
190190

191-
2. Run the `wsl` command.
191+
2. Run the `wsl` command.
192192

193193
4. Wait for 5-10 minutes for the portal to reflect the changes.
194194

@@ -255,81 +255,93 @@ DeviceProcessEvents
255255

256256
## Troubleshooting
257257

258-
1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
258+
### The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
259259

260-
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check.png" alt-text="Screenshot showing PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check.png":::
260+
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check.png" alt-text="Screenshot showing PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check.png":::
261+
262+
1. Open a terminal instance and run the command `wsl`.
261263

262-
2. If the previously mentioned error occurs, take the following steps:
264+
2. Wait for at least five minutes before rerunning the health check.
263265

264-
1. Open a terminal instance and run the command `wsl`.
266+
### The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in five minutes."
265267

266-
2. Wait for at least five minutes before rerunning the health check.
268+
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-telemetry.png" alt-text="Screenshot showing health telemetry status." lightbox="media/mdeplugin-wsl/wsl-health-check-telemetry.png":::
269+
270+
If that error occurs, wait for five minutes and rerun `healthcheck.exe`.
267271

268-
3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in five minutes."
272+
### You don't see any devices in the Microsoft Defender portal, or you don't see any events in the timeline
269273

270-
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-telemetry.png" alt-text="Screenshot showing health telemetry status." lightbox="media/mdeplugin-wsl/wsl-health-check-telemetry.png":::
274+
Check the following things:
271275

272-
If that error occurs, wait for five minutes and rerun `healthcheck.exe`.
273-
274-
4. If you don't see any devices in the Microsoft Defender portal, or you don't see any events in the timeline, check the following things:
275-
276-
- If you aren't seeing a machine object, make sure sufficient time has passed for onboarding to complete (typically up to 10 minutes).
276+
- If you aren't seeing a machine object, make sure sufficient time has passed for onboarding to complete (typically up to 10 minutes).
277+
278+
- Make sure to use the right filters, and that you have the appropriate permissions assigned to view all device objects. (For example, is your account/group is restricted to a specific group?)
279+
280+
- Use the health check tool to provide an overview of overall plug-in health. Open Terminal, and run the `healthcheck.exe` tool from `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools`.
281+
282+
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-support.png" alt-text="Screenshot showing status in PowerShell." lightbox="media/mdeplugin-wsl/wsl-health-check-support.png":::
283+
284+
- Enable the connectivity test and check for Defender for Endpoint connectivity in WSL. If the connectivity test fails, provide the output of the health check tool to our support team.
277285

278-
- Make sure to use the right filters, and that you have the appropriate permissions assigned to view all device objects. (For example, is your account/group is restricted to a specific group?)
286+
### Connectivity test reports "invalid" in health check
279287

280-
- Use the health check tool to provide an overview of overall plug-in health. Open Terminal, and run the `healthcheck.exe` tool from `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools`.
288+
- If your machine has a proxy setup, run the command `healthCheck --extendedProxy`. This will provide information on which proxy(s) is set on your machine and whether these configurations are invalid for WSL defender.
281289

282-
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-support.png" alt-text="Screenshot showing status in PowerShell." lightbox="media/mdeplugin-wsl/wsl-health-check-support.png":::
290+
![Extend HealthCheck Proxy doc](media/mde-plugin-wsl/extend-healthcheck-proxy-doc.png)
291+
292+
- If the steps mentioned above do not fix the problem, include the following configuration settings in the `.wslconfig` located in your `%UserProfile%` and restart WSL. Details about settings can be found in [WSL Settings](/windows/wsl/wsl-config#main-wsl-settings).
283293

284-
- Enable the connectivity test and check for Defender for Endpoint connectivity in WSL. If the connectivity test fails, provide the output of the health check tool to our support team.
294+
**In Windows 11**
285295

286-
- If the connectivity test reports "invalid" in health check, include the following configuration settings in the `.wslconfig` located in your `%UserProfile%` and restart WSL. Details about settings can be found in [WSL Settings](/windows/wsl/wsl-config#main-wsl-settings).
296+
```
287297
288-
- In Windows 11
298+
# Settings apply across all Linux distros running on WSL 2
299+
[wsl2]
289300
290-
```bash
291-
# Settings apply across all Linux distros running on WSL 2
292-
[wsl2]
301+
dnsTunneling=true
293302
294-
dnsTunneling=true
303+
networkingMode=mirrored
304+
```
295305

296-
networkingMode=mirrored
297-
```
306+
**In Windows 10**
298307

299-
- In Windows 10
308+
```bash
309+
# Settings apply across all Linux distros running on WSL 2
310+
[wsl2]
311+
312+
dnsProxy=false
313+
314+
```
300315

301-
```bash
302-
# Settings apply across all Linux distros running on WSL 2
303-
[wsl2]
316+
### Connectivity issues persist
304317

305-
dnsProxy=false
306-
```
318+
Collect the networking logs by following these steps:
307319

308-
- If the connectivity issues persist, run the following steps to collect the networking logs
320+
1. Open an elevated(admin) PowerShell prompt.
309321

310-
1. Open an elevated(admin) PowerShell prompt
311-
312-
2. Download and Run: `.\collect-networking-logs.ps1`
322+
2. Download and run: `.\collect-networking-logs.ps1`
313323

314-
```powershell
315-
Invoke-WebRequest -UseBasicParsing "https://raw.githubusercontent.com/microsoft/WSL/master/diagnostics/collect-networking-logs.ps1" -OutFile collect-networking-logs.ps1
316-
Set-ExecutionPolicy Bypass -Scope Process -Force
317-
.\collect-networking-logs.ps1
318-
```
324+
```powershell
325+
326+
Invoke-WebRequest -UseBasicParsing "https://raw.githubusercontent.com/microsoft/WSL/master/diagnostics/collect-networking-logs.ps1" -OutFile collect-networking-logs.ps1
327+
Set-ExecutionPolicy Bypass -Scope Process -Force
328+
.\collect-networking-logs.ps1
329+
330+
```
319331

320-
3. Open a new command prompt and run: `wsl`
332+
3. Open a new command prompt and run the following command: `wsl`.
321333

322-
4. Open an elevated(admin) command prompt and run: `wsl --debug-shell`
334+
4. Open an elevated(admin) command prompt and run the following command: `wsl --debug-shell`.
323335

324-
5. In debug shell, run: `mdatp connectivity test`
336+
5. In debug shell, run: `mdatp connectivity test`.
325337

326-
6. Allow the connectivity test to be completed
338+
6. Allow the connectivity test to be completed.
327339

328-
7. Stop the .ps1 ran in step #2
340+
7. Stop the .ps1 ran in step #2.
329341

330-
8. Share the generated .zip file along with support bundle that can be collected as mentioned in [steps](#support-bundle-collection).
342+
8. Share the generated .zip file along with support bundle that can be collected as mentioned in [steps](#collect-a-support-bundle).
331343

332-
### Support bundle collection
344+
### Collect a support bundle
333345

334346
1. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
335347

@@ -379,7 +391,7 @@ DeviceProcessEvents
379391
4. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
380392
381393
1. In Control Panel, go to **Programs** > **Programs and Features**.
382-
394+
383395
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
384396
385-
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
397+
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
56 KB
Loading

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,6 @@ If you experience any installation failures, see [Troubleshooting installation f
8686
- Memory: 1 GB minimum, 4 GB preferred
8787

8888
- The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
89-
- Red Hat Enterprise Linux 6.7 or higher (In preview)
9089
- Red Hat Enterprise Linux 7.2 or higher
9190
- Red Hat Enterprise Linux 8.x
9291
- Red Hat Enterprise Linux 9.x

defender-endpoint/network-protection.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to bad sites
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 02/28/2024
6+
ms.date: 10/24/2024
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -333,8 +333,8 @@ For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 o
333333
- `Set-MpPreference -AllowNetworkProtectionDownLevel 1`
334334
- `Set-MpPreference -AllowDatagramProcessingOnWinServer 1`
335335

336-
> [!NOTE]
337-
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
336+
> [!NOTE]
337+
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
338338
339339
### Network protection for Windows Servers
340340

@@ -390,6 +390,9 @@ For Windows Servers and Windows Multi-session, there are additional items that y
390390

391391
Due to the environment where network protection runs, the feature might not be able to detect operating system proxy settings. In some cases, network protection clients are unable to reach the cloud service. To resolve the connectivity problem, [configure a static proxy for Microsoft Defender Antivirus](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus).
392392

393+
> [!NOTE]
394+
> Before starting troubleshooting, make sure to set the QUIC protocol to disabled in browsers that are used. QUIC protocol is not supported with Network Protection functionality.
395+
393396
## Optimizing network protection performance
394397

395398
Network protection now has a performance optimization that allows Block mode to start asynchronously inspecting long-lived connections, which might provide a performance improvement and can also help with app compatibility problems. This optimization capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,9 @@ The following tables present the relevant vulnerability information organized by
3737
| Inaccuracy report ID | Description | Fix date |
3838
|---|---|---|
3939
| - | Fixed inaccuracy in Microsoft LibDB & NSS vulnerabilities | 03-Oct-24 |
40+
| 70377 | Fixed incorrect detections in Microsoft Teams by excluding Vida from the Teams normalization rule | 09-Oct-24 |
41+
| 74420 | Fixed incorrect detections in Toggl Track by excluding WeChat from the Toggl Track normalization rule | 09-Oct-24 |
42+
| 76607 | Fixed inaccuracy in Scooter Software | 09-Oct-24 |
4043

4144
## September 2024
4245

0 commit comments

Comments
 (0)