Skip to content

Commit a186206

Browse files
authored
Merge pull request #417 from meghapriyams/docs-editor/linux-support-offline-security-1715686992
Update linux-support-offline-security-intelligence-update.md
2 parents 3dbd77f + ab6b82c commit a186206

File tree

1 file changed

+21
-15
lines changed

1 file changed

+21
-15
lines changed

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-linux
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 03/12/2024
17+
ms.date: 05/17/2024
1818
---
1919

2020
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
@@ -67,7 +67,6 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
6767
- Defender for Endpoint version "101.24022.0001" or higher needs to be installed on the Linux endpoints.
6868
- The Linux endpoints need to have connectivity to the Mirror Server.
6969
- The Linux endpoint must be running any of the Defender for Endpoint supported distributions.
70-
7170
- The Mirror Server can be either an HTTP/ HTTPS server or a network share server. For example, an NFS Server.
7271
- The Mirror Server needs to have access to the following URLs:
7372
- `https://github.com/microsoft/mdatp-xplat.git`
@@ -85,6 +84,7 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
8584

8685
> [!NOTE]
8786
> This configuration may vary depending on the number of requests that are served and the load each server must process.
87+
8888
## Configuring the Mirror Server
8989

9090
> [!NOTE]
@@ -138,7 +138,7 @@ The `settings.json` file consists of a few variables that the user can configure
138138
| Field Name | Value | Description |
139139
|--------------------------|--------|--------------------------------------------------------|
140140
| `downloadFolder` | string | Maps to the location where the script downloads the files to |
141-
| `downloadLinuxUpdates` | bool | When set to true, the script downloads the Linux specific updates to the `downloadFolder` |
141+
| `downloadLinuxUpdates` | bool | When set to `true`, the script downloads the Linux specific updates to the `downloadFolder` |
142142
| `logFilePath` | string | Sets up the diagnostic logs at a given folder. This file can be shared with Microsoft for debugging the script if there are any issues |
143143
| `downloadMacUpdates` | bool | The script downloads the Mac specific updates to the `downloadFolder` |
144144
| `downloadPreviewUpdates` | bool | Downloads the preview version of the updates available for the specific OS |
@@ -189,17 +189,21 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
189189
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
190190
"offlineDefintionUpdateFallbackToCloud":false,
191191
"offlineDefinitionUpdate": "enabled"
192-
}
192+
},
193+
"features": {
194+
"offlineDefinitionUpdateVerifySig": "enabled"
195+
}
193196
}
194197
```
195198

196199
| Field Name | Values | Comments |
197200
|-------------------------------------------|----------------------|-----------------------------------------------------|
198-
| `automaticDefinitionUpdateEnabled` | True / False | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively |
199-
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds) |
200-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up |
201-
| `offlineDefinitionUpdate` | enabled / disabled | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
202-
| `offlineDefinitionUpdateFallbackToCloud` | True / False | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
201+
| `automaticDefinitionUpdateEnabled` | `True` / `False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
202+
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
203+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. |
204+
| `offlineDefinitionUpdate` | `enabled` / `disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
205+
| `offlineDefinitionUpdateFallbackToCloud` | `True` / `False` | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
206+
| `offlineDefinitionUpdateVerifySig` | `enabled` / `disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
203207

204208
> [!NOTE]
205209
> As of today the offline security intelligence update feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
@@ -212,9 +216,9 @@ To test if the settings are applied correctly on the Linux endpoints, run the fo
212216
mdatp health --details definitions
213217
```
214218

215-
For example, a sample output would look like:
219+
A sample output would look like the following code snippet:
216220

217-
```console
221+
```output
218222
user@vm:~$ mdatp health --details definitions
219223
automatic_definition_update_enabled : true [managed]
220224
definitions_updated : Mar 14, 2024 at 12:13:17 PM
@@ -262,8 +266,8 @@ offline_definition_update_fallback_to_cloud : false[managed]
262266

263267
### Issues: MDATP update failure
264268

265-
- Update stuck or update didn't trigger
266-
- Update failed
269+
- Update stuck, or update didn't trigger.
270+
- Update failed.
267271

268272
### Common Troubleshooting Steps
269273

@@ -294,10 +298,12 @@ offline_definition_update_fallback_to_cloud : false[managed]
294298
### Known Issues:
295299

296300
Offline signature update might fail in the following scenario:
297-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
301+
302+
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
298303

299304
Mitigation steps:
300-
The fix for this will be available in the upcoming release.
305+
306+
A fix for this issue is planned to release soon.
301307

302308
## Useful Links
303309

0 commit comments

Comments
 (0)