Skip to content

Commit acdd00f

Browse files
authored
Merge pull request #2858 from MicrosoftDocs/main
Published main to live, Thursday 5:00 PM IST, 02/20
2 parents 7fecc92 + 308fa27 commit acdd00f

File tree

4 files changed

+46
-13
lines changed

4 files changed

+46
-13
lines changed

defender-endpoint/mde-linux-arm.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,16 +43,28 @@ Initially, the following Linux distributions are supported in preview:
4343

4444
- Ubuntu 20.04 ARM64
4545
- Ubuntu 22.04 ARM64
46+
- Ubuntu 24.04 ARM64
47+
4648
- Amazon Linux 2 ARM64
4749
- Amazon Linux 2023 ARM64
4850

51+
- RHEL 8.x ARM64
52+
53+
- RHEL 9.x ARM64
54+
55+
- Oracle Linux 8.x ARM64
56+
57+
- Oracle Linux 9.x ARM64
58+
59+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
60+
4961
> [!NOTE]
5062
> Support for more Linux distributions is planned as part of this preview program.
5163
52-
The installation procedures in this article install the agent version `101.24102.0002` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
53-
5464
## Deploy Defender for Endpoint on Linux for ARM64-based devices
5565

66+
The deployment procedures in this article installs the agent version `101.24102.0003` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
67+
5668
You can choose from several methods to deploy Defender for Endpoint on Linux to your ARM64-based device:
5769

5870
- [Installer script](#deploy-using-the-installer-script)
@@ -351,7 +363,7 @@ See these articles:
351363

352364
## Troubleshoot deployment issues
353365

354-
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, contact us.
366+
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, [contact us](#contact-us-if-you-need-help).
355367

356368
### Common issues and how to resolve them
357369

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,20 +88,32 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
8888

8989
- Ubuntu 20.04 ARM64
9090
- Ubuntu 22.04 ARM64
91+
- Ubuntu 24.04 ARM64
92+
9193
- Amazon Linux 2 ARM64
9294
- Amazon Linux 2023 ARM64
9395

94-
> [!IMPORTANT]
96+
- RHEL 8.x ARM64
97+
98+
- RHEL 9.x ARM64
99+
100+
- Oracle Linux 8.x ARM64
101+
102+
- Oracle Linux 9.x ARM64
103+
104+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
105+
106+
> [!IMPORTANT]
95107
> Support for Microsoft Defender for Endpoint on Linux for ARM64-based Linux devices is now in preview. For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
96108
97-
> [!NOTE]
109+
> [!NOTE]
98110
> The workstation versions of these distributions are unsupported.
99111
> Distributions and versions that aren't explicitly listed are unsupported (even if they're derived from the officially supported distributions).
100112
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
101113
> Currently, Rocky and Alma distributions aren't supported in Microsoft Defender Vulnerability Management.
102114
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version agnostic. The minimal requirement for the kernel version to be `3.10.0-327` or later.
103115
104-
> [!CAUTION]
116+
> [!CAUTION]
105117
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions isn't supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
106118
107119
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.

defender-xdr/breadcrumb/toc.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,15 @@
1212
- name: Microsoft Defender XDR
1313
tocHref: /unified-secops-platform/
1414
topicHref: /defender-xdr/index
15+
- name: Microsoft Defender XDR
16+
tocHref: /defender-for-endpoint/
17+
topicHref: /defender-xdr/index
18+
- name: Microsoft Defender XDR
19+
tocHref: /defender-office-365/
20+
topicHref: /defender-xdr/index
21+
- name: Microsoft Defender XDR
22+
tocHref: /defender-cloud-apps/
23+
topicHref: /defender-xdr/index
1524

1625
## Azure override
1726
- name: 'Microsoft Defender'

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To manage required permissions, a Global Administrator can:
5858
- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft Defender XDR](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
5959

6060
> [!NOTE]
61-
> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they are creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user does not have permissions for all devices.
61+
> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they're creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user doesn't have permissions for all devices.
6262
6363
## Create a custom detection rule
6464

@@ -95,14 +95,14 @@ To create a custom detection rule, the query must return the following columns:
9595
- `InitiatingProcessAccountObjectId`
9696

9797
> [!NOTE]
98-
> Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
98+
> Support for more entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
9999
100100
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
101101

102102
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.
103103

104104
> [!IMPORTANT]
105-
> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is pre-filtered based on the detection frequency.
105+
> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is prefiltered based on the detection frequency.
106106
107107
The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
108108

@@ -115,19 +115,19 @@ DeviceEvents
115115
```
116116

117117
> [!TIP]
118-
> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day will cover all new data.
118+
> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day covers all new data.
119119
120120
### 2. Create new rule and provide alert details
121121

122122
With the query in the query editor, select **Create detection rule** and specify the following alert details:
123123

124124
- **Detection name** - Name of the detection rule; should be unique
125125
- **Frequency** -Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
126-
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
126+
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
127127
- **Severity** - Potential risk of the component or activity identified by the rule.
128128
- **Category** - Threat component or activity identified by the rule.
129129
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
130-
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
130+
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
131131
- **Recommended actions** - Additional actions that responders might take in response to an alert.
132132

133133
#### Rule frequency
@@ -265,7 +265,7 @@ Only data from devices in the scope will be queried. Also, actions are taken onl
265265
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
266266

267267
> [!IMPORTANT]
268-
> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
268+
> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
269269
>
270270
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
271271

0 commit comments

Comments
 (0)