You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/comprehensive-guidance-on-linux-deployment.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,11 +14,14 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: linux
16
16
search.appverid: met150
17
-
ms.date: 10/28/2024
17
+
ms.date: 12/10/2024
18
18
---
19
19
20
20
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
21
21
22
+
> [!TIP]
23
+
> We are excited to share that Microsoft Defender for Endpoint on Linux now extends support for ARM64-based Linux servers in preview! For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
24
+
22
25
This article provides advanced deployment guidance for Microsoft Defender for Endpoint on Linux. You get a brief summary of the deployment steps, learn about the system requirements, then be guided through the actual deployment steps. You'll also learn how to verify that the device has been correctly onboarded.
23
26
24
27
For information about Microsoft Defender for Endpoint capabilities, see [Advanced Microsoft Defender for Endpoint capabilities](#advanced-microsoft-defender-for-endpoint-capabilities).
@@ -29,23 +32,21 @@ To learn about other ways to deploy Microsoft Defender for Endpoint on Linux, se
29
32
-[Puppet based deployment](linux-install-with-puppet.md)
30
33
-[Ansible based deployment](linux-install-with-ansible.md)
31
34
-[Deploy Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)
35
+
-[Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)
32
36
33
37
## Deployment summary
34
38
35
-
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment.
39
+
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment. Some of the steps are optional and aren't specific to Defender for Endpoint; however, consider doing all the steps for best results.
36
40
37
41
1.[Prepare your network environment](#1-prepare-your-network-environment).
38
42
39
43
2.[Capture performance data from the endpoint](#2-capture-performance-data-from-the-endpoint).
40
44
41
-
> [!NOTE]
42
-
> Consider doing the following optional items, even though they are not Microsoft Defender for Endpoint specific, they tend to improve performance in Linux systems.
43
-
44
-
3.[(Optional) Check for filesystem errors 'fsck' (akin to chkdsk)](#3-optional-check-for-filesystem-errors-fsck-akin-to-chkdsk).
45
+
3. (Optional) [Check for filesystem errors 'fsck' (akin to chkdsk)](#3-optional-check-for-filesystem-errors-fsck-akin-to-chkdsk).
5.[(Optional) Update nic drivers](#5-optional-update-nic-drivers).
49
+
5. (Optional) [Update nic drivers](#5-optional-update-nic-drivers).
49
50
50
51
6.[Confirm system requirements and resource recommendations are met](#6-confirm-system-requirements-and-resource-recommendations-are-met).
51
52
@@ -85,27 +86,27 @@ Learn about the general guidance on a typical Microsoft Defender for Endpoint on
85
86
86
87
Add the Microsoft Defender for Endpoint URLs and/or IP addresses to the allowed list, and prevent traffic from being SSL inspected.
87
88
88
-
89
89
### Network connectivity of Microsoft Defender for Endpoint
90
90
91
91
Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
92
92
93
-
1. See [Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
93
+
1. See [Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic).
94
94
95
-
2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
95
+
2. If the Linux servers are behind a proxy, set proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
96
96
97
97
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
98
98
99
99
> [!NOTE]
100
-
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
100
+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and Mac).
101
101
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
102
102
103
-
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
103
+
For more information, see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
104
104
105
105
#### Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic
106
106
107
-
1. Go to [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
108
-
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses
107
+
1. See [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
108
+
109
+
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses.
109
110
110
111
#### Step 2: Set up proxy settings
111
112
@@ -125,15 +126,15 @@ The following table lists the supported proxy settings:
125
126
126
127
#### Step 3: Verify SSL inspection isn't being performed on the network traffic
127
128
128
-
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
129
+
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For more information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
129
130
130
131
##### Troubleshoot cloud connectivity issues
131
132
132
133
For more information, see [Troubleshooting cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
133
134
134
135
## 2. Capture performance data from the endpoint
135
136
136
-
Capture performance data from the endpoints that have Defender for Endpoint installed. This includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
137
+
Capture performance data from the endpoints that have Defender for Endpoint installed. This data includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
137
138
138
139
## 3. (Optional) Check for filesystem errors 'fsck' (akin to chkdsk)
139
140
@@ -157,21 +158,21 @@ For a detailed list of supported Linux distros, see [System requirements](micros
157
158
|---|---|
158
159
|Disk space |Minimum: 2 GB <br> NOTE: More disk space might be needed if cloud diagnostics are enabled for crash collections. |
159
160
|RAM |1 GB<br> 4 GB is preferred|
160
-
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> 4 cores are preferred |
161
+
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> Four cores are preferred |
161
162
162
163
|OS version|Kernel filter driver|Comments|
163
164
|---|---|---|
164
-
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the fanotify kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
165
+
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the `fanotify` kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
165
166
## 7. Add your existing solution to the exclusion list for Microsoft Defender Antivirus
166
167
167
168
This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus.
168
169
169
170
> [!TIP]
170
171
> To get help configuring exclusions, refer to your solution provider's documentation.
171
172
172
-
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses fanotify, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
173
+
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses `fanotify`, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
173
174
174
-
- To check if there's a non-Microsoft antimalware that is running FANotify, you can run `mdatp health`, then check the result:
175
+
- To check if there's a non-Microsoft antimalware that is running `fanotify`, you can run `mdatp health`, then check the results:
175
176
176
177
:::image type="content" source="media/mdatp-health-result.png" alt-text="Image of mdatp health result":::
177
178
@@ -199,7 +200,6 @@ This step of the setup process involves adding Defender for Endpoint to the excl
199
200
When you add [exclusions to Microsoft Defender Antivirus scans](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions.
200
201
201
202
> [!NOTE]
202
-
>
203
203
> - Antivirus exclusions apply to the antivirus engine.
204
204
> - Indicators allow/block apply to the antivirus engine.
0 commit comments