You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Golden images are preconfigured virtual machine templates used to rapidly deploy consistent environments. Microsoft Defender for Endpoint on Linux supports golden image deployment with improved handling of machine identifiers and hostnames, ensuring reliable telemetry and device correlation.
27
+
- Microsoft Defender for Endpoint for servers
28
+
- Microsoft Defender for Servers Plan 1 or Plan 2
29
+
30
+
Golden images are preconfigured virtual machine templates used to rapidly deploy consistent environments. Microsoft Defender for Endpoint on Linux supports golden image deployment across cloud and on-premises environments, with improved handling of machine identifiers and hostnames, ensuring reliable telemetry and device correlation.
28
31
29
32
This guide walks you through:
30
33
@@ -36,23 +39,13 @@ This guide walks you through:
36
39
37
40
- Specific steps for cloud and on-premises environments.
38
41
39
-
By following this guide, you can confidently deploy Microsoft Defender for Endpoint on Linux using golden images across cloud and on-premises environments. This ensures:
40
-
41
-
- Unique and consistent device identifiers.
42
-
43
-
- Reliable telemetry.
44
-
45
-
- Smooth device correlation in the security portal.
42
+
## Step 1: Install Microsoft Defender for Endpoint on a golden image
46
43
47
-
## Step-by-step: Installing Microsoft Defender for Endpoint on a golden image
44
+
1. Prepare the case virtual machine
48
45
49
-
1. Prepare the case VM
46
+
- Install your preferred [supported Linux distribution](./mde-linux-prerequisites#supported-linux-distributions.md) and apply all necessary system updates.
50
47
51
-
- Install your preferred Linux distribution.
52
-
53
-
- Apply all necessary system updates.
54
-
55
-
- Install required dependencies for Microsoft Defender for Endpoint.
48
+
- INSTALL REQUIRED DEPENDENCIES FOR MICROSOFT DEFENDER FOR ENDPOINT
56
49
57
50
1. Install Microsoft Defender for Endpoint
58
51
@@ -76,15 +69,15 @@ By following this guide, you can confidently deploy Microsoft Defender for Endpo
76
69
77
70
1. Validate Installation
78
71
79
-
Ensure MDE is running and registered:
72
+
Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
80
73
81
74
```bash
82
75
mdatp health
83
76
```
84
77
85
-
## Preparing the golden image for cloning
78
+
## Step 2: Prepare the golden image for cloning
86
79
87
-
Before snapshotting the virtual machine, follow these steps to ensure that each clone will have a unique machine identity:
80
+
Before making a snapshot of the virtual machine, follow these steps to ensure that each clone has a unique machine identity:
88
81
89
82
### On-premises virtual machines
90
83
@@ -114,42 +107,18 @@ Before snapshotting the virtual machine, follow these steps to ensure that each
114
107
115
108
- sysfs values
116
109
117
-
- Hardware GUID
110
+
- Hardware GUID
118
111
119
-
If mismatched, update the MachineInfo and save all values back to the MDE state file.
112
+
If mismatched, update the MachineInfo and save all values back to the Microsoft Defender for Endpoint state file.
120
113
121
114
### Cloud virtual machines
122
115
123
116
Cloud platforms (for example, Azure, AWS, GCP) automatically inject unique metadata and identifiers via their instance metadata services (IMDS). No manual steps are required. Microsoft Defender for Endpoint automatically detects and uses these values to generate unique machine IDs.
124
117
125
118
## Hostname Management
126
119
127
-
Hostnames are stored persistently during installation. If you wish to change the hostname, **restart the service** to ensure consistent identifier updates.
128
-
129
-
**Summary**
130
-
131
-
By following this guide, you can confidently deploy MDE on Linux using golden images across cloud and on-premises environments. This ensures:
132
-
133
-
- Unique and consistent device identifiers
134
-
135
-
- Reliable telemetry
136
-
137
-
- Smooth device correlation in the security portal
138
-
139
-
120
+
HOSTNAMES ARE STORED PERSISTENTLY DURING INSTALLATION. IF YOU WISH TO CHANGE THE HOSTNAME, **RESTART THE SERVICE** TO ENSURE CONSISTENT IDENTIFIER UPDATES.
140
121
141
122
## Related content
142
123
143
-
-[Prerequisites for Defender for Endpoint on Linux](mde-linux-prerequisites.md)
144
-
145
-
- Deployment methods:
146
-
-[Installer script based deployment](linux-installer-script.md)
147
-
-[Ansible based deployment](linux-install-with-ansible.md)
148
-
-[Chef based deployment](linux-deploy-defender-for-endpoint-with-chef.md)
149
-
-[Puppet based deployment](linux-install-with-puppet.md)
150
-
-[Saltstack based deployment](linux-install-with-saltack.md)
151
-
-[Connect your non-Azure machines to Defender for Cloud with Defender for Endpoint](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint) (direct onboarding using Defender for Cloud)
152
-
-[Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md)
153
-
-[Deploy Defender for Endpoint on Linux manually](linux-install-manually.md)
154
-
155
124
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments