Skip to content

Commit a48768d

Browse files
Merge branch 'public' into patch-1
2 parents 469abe0 + fe2e1ec commit a48768d

File tree

11 files changed

+65
-52
lines changed

11 files changed

+65
-52
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ For more information on what's new with other Microsoft Defender security produc
2121
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2222

2323
>[!IMPORTANT]
24-
>
25-
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 21, 2025. This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 28, 2025.
26-
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
24+
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 28, 2025.\
25+
> This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 29, 2025.
26+
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.\
2727
> Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
2828
2929

defender-endpoint/index.yml

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,14 @@ landingContent:
3232
url: microsoft-defender-endpoint.md
3333
- text: What is Defender for Endpoint plan 1?
3434
url: defender-endpoint-plan-1.md
35+
- text: Defender for Endpoint on Linux
36+
url: microsoft-defender-endpoint-linux.md
37+
- text: Defender for Endpoint on Mac
38+
url: microsoft-defender-endpoint-mac.md
39+
- text: Defender for Endpoint on Android
40+
url: microsoft-defender-endpoint-android.md
41+
- text: Defender for Endpoint on iOS
42+
url: microsoft-defender-endpoint-ios.md
3543
- linkListType: whats-new
3644
links:
3745
- text: What's new in Microsoft Defender for Endpoint
@@ -88,21 +96,6 @@ landingContent:
8896
- text: Threat analytics
8997
url: threat-analytics.md
9098

91-
# Card
92-
- title: Use Microsoft Defender for Endpoint on other platforms
93-
linkLists:
94-
- linkListType: overview
95-
links:
96-
- text: Microsoft Defender for Endpoint on Mac
97-
url: microsoft-defender-endpoint-mac.md
98-
- text: Microsoft Defender for Endpoint on iOS
99-
url: microsoft-defender-endpoint-ios.md
100-
- text: Microsoft Defender for Endpoint on Linux
101-
url: microsoft-defender-endpoint-linux.md
102-
- text: Microsoft Defender for Endpoint on Android
103-
url: microsoft-defender-endpoint-android.md
104-
105-
10699
# Card
107100
- title: Reference
108101
linkLists:

defender-endpoint/linux-install-with-ansible.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/tree/m
115115

116116
### Create Ansible YAML files
117117

118-
Create installation YAML file. You can also download the file directly from [GitHub](/defender-endpoint/linux-support-events)
118+
Create installation YAML file. You can also download the file directly from [GitHub](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/ansible.install_mdatp_simplified.yaml).
119119

120120
```bash
121121
- name: Install and Onboard MDE

defender-endpoint/linux-whatsnew.md

Lines changed: 36 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 04/18/2025
9+
ms.date: 04/23/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -31,7 +31,7 @@ search.appverid: met150
3131
This article is updated frequently to let you know what's new in the latest releases of Microsoft Defender for Endpoint on Linux.
3232

3333
> [!IMPORTANT]
34-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support has been available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
34+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support is available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
3535
>
3636
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build continues to be supported for several months, so you have time to plan and execute your migration to eBPF.
3737
>
@@ -81,6 +81,28 @@ What's new
8181

8282
- Other stability improvements and bug fixes.
8383

84+
Known Issues
85+
86+
- There's a known issue where MDE is deleting the configuration file located at /etc/system/system/mdatp.service.d on each service start. As a workaround, customers can use the Immutable attribute that prevents the files from being modified or deleted.
87+
88+
To set the file to be unmodifiable, execute the following command:
89+
90+
```bash
91+
92+
sudo chattr +i /etc/systemd/system/mdatp.service.d/[file name]
93+
```
94+
95+
This command makes the file unchangeable. T If you need to restore modification permissions, use the following command:
96+
97+
```bash
98+
99+
sudo chattr -i /etc/systemd/system/mdatp.service.d/[file name]
100+
```
101+
102+
Please note that the chattr command can only be used on supported file systems, such as ext4.
103+
104+
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue will be available in MDE version 101.25032.0000.
105+
84106
### Feb-2025 Build: 101.24122.0008 | Release version: 30.124112.0008.0
85107

86108
| Build: | **101.24122.0008** |
@@ -132,7 +154,7 @@ What's new
132154
- Enabled: When eBPF is enabled as working as expected.
133155
- Disabled: When eBPF is disabled due to one of the following reasons:
134156
- When MDE is using auditD as a supplementary sensor
135-
- When eBPF isn't present and we fallback to Netlink as supplementary event provider
157+
- When eBPF isn't present and we fallback to Net link as supplementary event provider
136158
- There's no supplementary sensor present.
137159

138160
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
@@ -185,7 +207,7 @@ What's new
185207

186208
#### What's new
187209

188-
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Netlink as a fallback supplementary event provider. Netlink provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
210+
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
189211

190212
- Stability and performance improvements
191213

@@ -457,7 +479,7 @@ There are multiple fixes and new changes in this release:
457479
```bash
458480
sudo mdatp threat quarantine restore threat-path --path [threat-original-path] --destination-path [destination-folder]
459481
```
460-
- Starting with this release, Microsoft Defender for Endpoint on Linux will no longer be shipping a solution for RHEL 6.
482+
- From this release, Microsoft Defender for Endpoint on Linux will no longer be shipping a solution for RHEL 6.
461483

462484
RHEL 6 'Extended end of life support' is poised to end by June 30, 2024 and customers are advised to plan their RHEL upgrades accordingly aligned with guidance from Red Hat. Customers who need to run Defender for Endpoint on RHEL 6 servers can continue to use version 101.23082.0011 (doesn't expire before June 30, 2024) supported on kernel versions 2.6.32-754.49.1.el6.x86_64 or prior.
463485
- Engine Update to `1.1.23080.2007` and Signatures Ver: `1.395.1560.0`.
@@ -482,7 +504,7 @@ There are multiple fixes and new changes in this release:
482504

483505
- This new release is build over October 2023 release (101.23082.0009) with addition of following changes. There's no change for other customers and upgrading is optional.
484506

485-
- Fix for immutable mode of auditd when supplementary subsystem is ebpf: In ebpf mode all mdatp audit rules should be cleaned after switching to ebpf and rebooting. After reboot, mdatp audit rules weren't cleaned due to which it was resulting in hang of the server. The fix cleans these rules, user shouldn't see any mdatp rules loaded on reboot
507+
- Fix for immutable mode of auditd when supplementary subsystem is ebpf: In ebpf mode all mdatp audit rules should be cleaned after switching to ebpf and rebooting. After the reboot, mdatp audit rules weren't cleaned due to which it was resulting in hang of the server. The fix cleans these rules, user shouldn't see any mdatp rules loaded on reboot
486508

487509
- Fix for MDE not starting up on RHEL 6.
488510

@@ -571,7 +593,7 @@ sudo systemctl disable mdatp
571593
- Defender for Endpoint is now available for Debian 12 and Amazon Linux 2023
572594

573595
- Support to enable Signature verification of updates downloaded
574-
- You must update the manajed.json as shown below
596+
- You must update the manajed.json as shown:
575597
```
576598
"features":{
577599
"OfflineDefinitionUpdateVerifySig":"enabled"
@@ -691,7 +713,7 @@ There are multiple fixes and new changes in this release
691713
- Files
692714
- Executables
693715

694-
- Network Protection: Connections that are blocked by Network Protection and have the block overridden by users are now correctly reported to Microsoft Defender XDR
716+
- Network Protection: Connections that is blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
695717

696718
- Improved logging in Network Protection block and audit events for debugging
697719
|
@@ -700,7 +722,7 @@ There are multiple fixes and new changes in this release
700722
- From this version, enforcementLevel are in passive mode by default giving admins more control over where they want 'RTP on' within their estate
701723
- This change only applies to fresh MDE deployments, for example, servers where Defender for Endpoint is being deployed for the first time. In update scenarios, servers that have Defender for Endpoint deployed with RTP ON, continue operating with RTP ON even post update to version 101.23062.0010
702724

703-
- Bug fix: RPM database corruption issue in Defender Vulnerability Management baseline has been fixed
725+
- Bug fix: RPM database corruption issue in Defender Vulnerability Management baseline is fixed.
704726

705727
- Other performance improvements
706728

@@ -790,7 +812,7 @@ There are multiple fixes and new changes in this release
790812

791813
- In Passive mode, Defender for Endpoint no longer scans when Definition update happens.
792814

793-
- Devices continue to be protected even after Defender for Endpoint agent has expired. We recommend upgrading the Defender for Endpoint Linux agent to the latest available version to receive bug fixes, features, and performance improvements.
815+
- Devices continue to be protected even after Defender for Endpoint agent is expired. We recommend upgrading the Defender for Endpoint Linux agent to the latest available version to receive bug fixes, features, and performance improvements.
794816

795817
- Removed semanage package dependency.
796818

@@ -956,7 +978,7 @@ sudo systemctl disable mdatp
956978

957979
- With mdatp version 101.98.30 you might see a health false issue in some of the cases, because SELinux rules aren't defined for certain scenarios. The health warning could look something like this:
958980

959-
*found SELinux denials within last one day. If the MDATP is recently installed, clear the existing audit logs or wait for a day for this issue to autoresolve. Use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
981+
*Found SELinux denials within last one day. If the MDATP is recently installed, clear the existing audit logs or wait for a day for this issue to autoresolve. Use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
960982

961983
The issue could be mitigated by running the following commands.
962984

@@ -1096,7 +1118,7 @@ sudo apt purge mdatp
10961118
sudo apt-get install mdatp
10971119
```
10981120

1099-
As an alternative to the above, you can follow the instructions to [uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux), then [install](linux-install-manually.md#application-installation) the latest version of the package.
1121+
As an alternative, you can follow the instructions to [uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux), then [install](linux-install-manually.md#application-installation) the latest version of the package.
11001122

11011123
In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
11021124
Caution: Some customers(<1%) are experiencing issues with this method.
@@ -1164,7 +1186,7 @@ sudo systemctl disable mdatp
11641186

11651187
#### What's new
11661188

1167-
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
1189+
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) isn't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
11681190

11691191
#### Known issues
11701192

@@ -1345,7 +1367,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
13451367

13461368
#### What's new
13471369

1348-
- Fixed a product crash introduced in 101.53.02 and that has impacted multiple customers
1370+
- Fixed a product crash introduced in 101.53.02 that affected multiple customers
13491371

13501372
### Jan-2022 Build: 101.53.02 | Release version: 30.121112.15302.0
13511373

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: intro-overview
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 09/25/2024
17+
ms.date: 04/23/2025
1818
---
1919

2020
# Microsoft Defender for Endpoint
@@ -47,7 +47,7 @@ Defender for Endpoint uses the following combination of technology built into Wi
4747

4848
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
4949

50-
- **Cloud security analytics**: Using big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
50+
- **Cloud security analytics**: Using big data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
5151

5252
- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they're observed in collected sensor data.
5353

0 commit comments

Comments
 (0)