You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,9 @@ For more information on what's new with other Microsoft Defender security produc
21
21
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
22
22
23
23
>[!IMPORTANT]
24
-
>
25
-
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 21, 2025. This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 28, 2025.
26
-
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
24
+
>**Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 28, 2025.\
25
+
> This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 29, 2025.
26
+
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.\
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-ansible.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/tree/m
115
115
116
116
### Create Ansible YAML files
117
117
118
-
Create installation YAML file. You can also download the file directly from [GitHub](/defender-endpoint/linux-support-events)
118
+
Create installation YAML file. You can also download the file directly from [GitHub](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/ansible.install_mdatp_simplified.yaml).
Copy file name to clipboardExpand all lines: defender-endpoint/linux-whatsnew.md
+36-14Lines changed: 36 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
author: emmwalshh
7
7
ms.reviewer: kumasumit, gopkr; mevasude
8
8
ms.localizationpriority: medium
9
-
ms.date: 04/18/2025
9
+
ms.date: 04/23/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -31,7 +31,7 @@ search.appverid: met150
31
31
This article is updated frequently to let you know what's new in the latest releases of Microsoft Defender for Endpoint on Linux.
32
32
33
33
> [!IMPORTANT]
34
-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support has been available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
34
+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support is available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
35
35
>
36
36
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build continues to be supported for several months, so you have time to plan and execute your migration to eBPF.
37
37
>
@@ -81,6 +81,28 @@ What's new
81
81
82
82
- Other stability improvements and bug fixes.
83
83
84
+
Known Issues
85
+
86
+
- There's a known issue where MDE is deleting the configuration file located at /etc/system/system/mdatp.service.d on each service start. As a workaround, customers can use the Immutable attribute that prevents the files from being modified or deleted.
87
+
88
+
To set the file to be unmodifiable, execute the following command:
Please note that the chattr command can only be used on supported file systems, such as ext4.
103
+
104
+
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue will be available in MDE version 101.25032.0000.
- Enabled: When eBPF is enabled as working as expected.
133
155
- Disabled: When eBPF is disabled due to one of the following reasons:
134
156
- When MDE is using auditD as a supplementary sensor
135
-
- When eBPF isn't present and we fallback to Netlink as supplementary event provider
157
+
- When eBPF isn't present and we fallback to Net link as supplementary event provider
136
158
- There's no supplementary sensor present.
137
159
138
160
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
@@ -185,7 +207,7 @@ What's new
185
207
186
208
#### What's new
187
209
188
-
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Netlink as a fallback supplementary event provider. Netlink provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
210
+
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
189
211
190
212
- Stability and performance improvements
191
213
@@ -457,7 +479,7 @@ There are multiple fixes and new changes in this release:
-Starting with this release, Microsoft Defender for Endpoint on Linux will no longer be shipping a solution for RHEL 6.
482
+
-From this release, Microsoft Defender for Endpoint on Linux will no longer be shipping a solution for RHEL 6.
461
483
462
484
RHEL 6 'Extended end of life support' is poised to end by June 30, 2024 and customers are advised to plan their RHEL upgrades accordingly aligned with guidance from Red Hat. Customers who need to run Defender for Endpoint on RHEL 6 servers can continue to use version 101.23082.0011 (doesn't expire before June 30, 2024) supported on kernel versions 2.6.32-754.49.1.el6.x86_64 or prior.
463
485
- Engine Update to `1.1.23080.2007` and Signatures Ver: `1.395.1560.0`.
@@ -482,7 +504,7 @@ There are multiple fixes and new changes in this release:
482
504
483
505
- This new release is build over October 2023 release (101.23082.0009) with addition of following changes. There's no change for other customers and upgrading is optional.
484
506
485
-
- Fix for immutable mode of auditd when supplementary subsystem is ebpf: In ebpf mode all mdatp audit rules should be cleaned after switching to ebpf and rebooting. After reboot, mdatp audit rules weren't cleaned due to which it was resulting in hang of the server. The fix cleans these rules, user shouldn't see any mdatp rules loaded on reboot
507
+
- Fix for immutable mode of auditd when supplementary subsystem is ebpf: In ebpf mode all mdatp audit rules should be cleaned after switching to ebpf and rebooting. After the reboot, mdatp audit rules weren't cleaned due to which it was resulting in hang of the server. The fix cleans these rules, user shouldn't see any mdatp rules loaded on reboot
486
508
487
509
- Fix for MDE not starting up on RHEL 6.
488
510
@@ -571,7 +593,7 @@ sudo systemctl disable mdatp
571
593
- Defender for Endpoint is now available for Debian 12 and Amazon Linux 2023
572
594
573
595
- Support to enable Signature verification of updates downloaded
574
-
- You must update the manajed.json as shown below
596
+
- You must update the manajed.json as shown:
575
597
```
576
598
"features":{
577
599
"OfflineDefinitionUpdateVerifySig":"enabled"
@@ -691,7 +713,7 @@ There are multiple fixes and new changes in this release
691
713
- Files
692
714
- Executables
693
715
694
-
- Network Protection: Connections that are blocked by Network Protection and have the block overridden by users are now correctly reported to Microsoft Defender XDR
716
+
- Network Protection: Connections that is blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
695
717
696
718
- Improved logging in Network Protection block and audit events for debugging
697
719
|
@@ -700,7 +722,7 @@ There are multiple fixes and new changes in this release
700
722
- From this version, enforcementLevel are in passive mode by default giving admins more control over where they want 'RTP on' within their estate
701
723
- This change only applies to fresh MDE deployments, for example, servers where Defender for Endpoint is being deployed for the first time. In update scenarios, servers that have Defender for Endpoint deployed with RTP ON, continue operating with RTP ON even post update to version 101.23062.0010
702
724
703
-
- Bug fix: RPM database corruption issue in Defender Vulnerability Management baseline has been fixed
725
+
- Bug fix: RPM database corruption issue in Defender Vulnerability Management baseline is fixed.
704
726
705
727
- Other performance improvements
706
728
@@ -790,7 +812,7 @@ There are multiple fixes and new changes in this release
790
812
791
813
- In Passive mode, Defender for Endpoint no longer scans when Definition update happens.
792
814
793
-
- Devices continue to be protected even after Defender for Endpoint agent has expired. We recommend upgrading the Defender for Endpoint Linux agent to the latest available version to receive bug fixes, features, and performance improvements.
815
+
- Devices continue to be protected even after Defender for Endpoint agent is expired. We recommend upgrading the Defender for Endpoint Linux agent to the latest available version to receive bug fixes, features, and performance improvements.
794
816
795
817
- Removed semanage package dependency.
796
818
@@ -956,7 +978,7 @@ sudo systemctl disable mdatp
956
978
957
979
- With mdatp version 101.98.30 you might see a health false issue in some of the cases, because SELinux rules aren't defined for certain scenarios. The health warning could look something like this:
958
980
959
-
*found SELinux denials within last one day. If the MDATP is recently installed, clear the existing audit logs or wait for a day for this issue to autoresolve. Use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
981
+
*Found SELinux denials within last one day. If the MDATP is recently installed, clear the existing audit logs or wait for a day for this issue to autoresolve. Use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
960
982
961
983
The issue could be mitigated by running the following commands.
962
984
@@ -1096,7 +1118,7 @@ sudo apt purge mdatp
1096
1118
sudo apt-get install mdatp
1097
1119
```
1098
1120
1099
-
As an alternative to the above, you can follow the instructions to [uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux), then [install](linux-install-manually.md#application-installation) the latest version of the package.
1121
+
As an alternative, you can follow the instructions to [uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux), then [install](linux-install-manually.md#application-installation) the latest version of the package.
1100
1122
1101
1123
In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
1102
1124
Caution: Some customers(<1%) are experiencing issues with this method.
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
1189
+
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) isn't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
1168
1190
1169
1191
#### Known issues
1170
1192
@@ -1345,7 +1367,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
1345
1367
1346
1368
#### What's new
1347
1369
1348
-
- Fixed a product crash introduced in 101.53.02 and that has impacted multiple customers
1370
+
- Fixed a product crash introduced in 101.53.02 that affected multiple customers
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.custom: intro-overview
15
15
ms.topic: conceptual
16
16
search.appverid: met150
17
-
ms.date: 09/25/2024
17
+
ms.date: 04/23/2025
18
18
---
19
19
20
20
# Microsoft Defender for Endpoint
@@ -47,7 +47,7 @@ Defender for Endpoint uses the following combination of technology built into Wi
47
47
48
48
-**Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
49
49
50
-
-**Cloud security analytics**: Using big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
50
+
-**Cloud security analytics**: Using bigdata, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
51
51
52
52
-**Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they're observed in collected sensor data.
0 commit comments