Skip to content

Commit cb7e8ab

Browse files
authored
Merge branch 'main' into WI480943-near-real-time-updates-entra-id-risk-level
2 parents 1ae36fd + 5315aa1 commit cb7e8ab

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+362
-98
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,5 @@
11
{
22
"redirections": [
3-
{
4-
"source_path": "microsoft-365/security/defender/advanced-hunting-IdentityEvents-table.md",
5-
"redirect_url": "/defender-xdr/advanced-hunting-identityevents-table",
6-
"redirect_document_id": false
7-
},
83
{
94
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
105
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",

ATPDocs/whats-new.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,21 @@ Previously, Defender for Identity tenants received Entra ID risk level in the Id
3434
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
3535

3636

37-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
37+
### New Graph based API for response actions (preview)
38+
39+
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
40+
41+
This capability is currently in preview and available in API Beta version.
42+
43+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta).
44+
45+
### Identity scoping is now generally available (GA)
46+
47+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
48+
49+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
50+
51+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
3852

3953
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
4054

@@ -55,11 +69,11 @@ Improved detection logic to include scenarios where accounts were locked during
5569

5670
## July 2025
5771

58-
**Expanded coverage in ITDR deployment health widget**
72+
### Expanded coverage in ITDR deployment health widget
5973

6074
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
6175

62-
**Time limit added to Recommended test mode**
76+
### Time limit added to Recommended test mode
6377

6478
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
6579

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
88
# How to investigate anomaly detection alerts
99

1010

11-
1211
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
1312

1413
> [!IMPORTANT]

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
5555

5656
| Type | Name |
5757
| ---- | ---- |
58-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
5959
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
6060
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
6161

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -267,6 +267,8 @@
267267
items:
268268
- name: Installer script based deployment
269269
href: linux-installer-script.md
270+
- name: Enabling deployment to a custom location
271+
href: linux-custom-location-installation.md
270272
- name: Ansible based deployment
271273
href: linux-install-with-ansible.md
272274
- name: Chef based deployment
Lines changed: 194 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,194 @@
1+
---
2+
title: Enabling deployment of Microsoft Defender for Endpoint for Linux to a custom location
3+
description: Describes how to deploy Microsoft Defender for Endpoint on Linux to a custom location instead of the default location.
4+
ms.service: defender-endpoint
5+
ms.author: painbar
6+
author: paulinbar
7+
ms.reviewer: meghapriya
8+
ms.localizationpriority: medium
9+
manager: orspodek
10+
audience: ITPro
11+
ms.collection:
12+
- m365-security
13+
- tier3
14+
- mde-linux
15+
ms.topic: install-set-up-deploy
16+
ms.subservice: linux
17+
search.appverid: met150
18+
ms.date: 08/18/2025
19+
---
20+
21+
# Enabling deployment of Microsoft Defender for Endpoint to a custom location (preview)
22+
23+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
24+
25+
**Applies to:**
26+
27+
- Microsoft Defender for Endpoint for servers
28+
29+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=&country=us)
30+
31+
## Introduction
32+
33+
Microsoft Defender for Endpoint on Linux supports installation to custom locations, allowing organizations to deploy the agent to nonstandard locations based on their specific requirements. This feature is useful for environments that have:
34+
35+
- Custom directory structures and organizational policies
36+
- Limited space on the root filesystem
37+
- Specific compliance requirements for application placement
38+
39+
By default, Defender for Endpoint installs to the directory `/opt/microsoft/mdatp`. With custom location installation, you can choose a different base directory during the initial setup. Defender for Endpoint then uses its same internal folder structure in your specified location. After installation, the chosen location remains fixed, and subsequent upgrades will keep using your original custom location. Changing the installation location later isn't supported. If you need to use a different location, you have to uninstall Defender for Endpoint and then reinstall it to the new location.
40+
41+
## Prerequisites and system requirements
42+
43+
Before deploying Defender for Endpoint to a custom location, be sure the following requirements are met:
44+
45+
### Prerequisites
46+
47+
- The custom installation directory and its entire tree must have at least `rwxr-xr-x` (755) permissions.
48+
49+
- The target location must have adequate disk space (minimum 2 GB, more for high-performance workloads).
50+
51+
- If SELinux is enabled, the `semanage` tool must be installed to set the correct file context for the custom location.
52+
53+
- For reasons of security and reliability, it's highly recommended to install to a location on a persistent, permanently-mounted local filesystem. Avoid using removable media, network mounts, or filesystems that could be unmounted during system operation, as this can cause Microsoft Defender for Endpoint service failures and create security risks.
54+
55+
### Supported distributions and feature availability
56+
57+
- Custom location installation is supported on all [supported Linux distributions](mde-linux-prerequisites.md#supported-linux-distributions) for both x64 and ARM64 architectures.
58+
59+
- The custom location feature is available starting from version **101.25062.0003** of Defender for Endpoint on Linux.
60+
61+
## Steps for installing to a custom location
62+
63+
This section describes the additional steps required for deploying Defender for Endpoint to a custom location, using various supported methods.
64+
65+
- **Installer script**:
66+
67+
The recommended method is to run the `mde_installer.sh` script with the `--install-path /your/custom/path` option at the time of installation. For details, see the [installer script deployment guide](linux-installer-script.md).
68+
69+
- **Third-party automation tools**:
70+
71+
Solutions such as Ansible, Chef, Puppet, and SaltStack can automate deployment by running the `mde_installer.sh` script with the `--install-path /your/custom/path` option at the time of installation. For details, see the [installer script deployment guide](linux-installer-script.md).
72+
73+
- **Manual installation**:
74+
75+
If you prefer manual setup, you must perform additional preinstallation steps to prepare your custom location. See the [next section](#manual-installation-preinstallation-setup) for step-by-step instructions.
76+
77+
### Manual installation: preinstallation setup
78+
79+
In the [manual deployment steps](linux-install-manually.md#manual-deployment-steps), you need to complete an additional preinstallation setup to enable custom location installation. Follow the steps below as part of the [preinstall setup for custom location installation](linux-install-manually.md#preinstall-setup-for-custom-location-installation).
80+
81+
1. **Set your custom path variable**:
82+
83+
> [!NOTE]
84+
> The custom path must be an absolute path (for example, `/your/custom/path`). Relative paths aren't supported.
85+
86+
```bash
87+
export CUSTOM_PATH="/your/custom/path"
88+
```
89+
90+
1. **Create required directories and config file**:
91+
92+
```bash
93+
sudo mkdir -p "${CUSTOM_PATH}"
94+
sudo mkdir -p /etc/opt/microsoft/mdatp
95+
echo '{"path": "'${CUSTOM_PATH}'"}' | sudo tee /etc/opt/microsoft/mdatp/mde_path.json
96+
```
97+
98+
1. **Set permissions**:
99+
100+
```bash
101+
sudo chmod 755 "${CUSTOM_PATH}"
102+
sudo chmod 644 /etc/opt/microsoft/mdatp/mde_path.json
103+
```
104+
105+
1. **Create symlink**:
106+
107+
```bash
108+
sudo ln -sf "${CUSTOM_PATH}/opt/microsoft/mdatp" /opt/microsoft/mdatp
109+
```
110+
111+
Then proceed with the standard installation steps for your distribution.
112+
113+
## Upgrade and maintenance
114+
115+
Upgrades for Defender for Endpoint installed in a custom location work the same as standard installations - the installer automatically preserves your existing location and configuration.
116+
117+
> [!IMPORTANT]
118+
> Changing the installation path during an upgrade isn't supported. If you need to change the installation path, you must first uninstall Defender for Endpoint and then reinstall it to the new location.
119+
120+
## Frequently asked questions
121+
122+
**Can I install Defender for Endpoint to any directory?**
123+
Yes, as long as the path to the installation location is an absolute path with at least 755 permissions and enough space (minimum 2 GB).
124+
125+
**Can I change the Defender for Endpoint installation location after installation?**
126+
No, you must uninstall and reinstall to use a different location.
127+
128+
**How do I upgrade Defender for Endpoint in a custom location?**
129+
Run the usual upgrade commands. The installation location remains unchanged.
130+
131+
**Can I change the custom location during upgrade?**
132+
No, installation location changes require a fresh install.
133+
134+
## Troubleshooting
135+
136+
### 1. Verify the installation location
137+
138+
- **Check running processes:**
139+
140+
Run: `ps aux | grep wdavdaemon`. The output should contain wdavdaemon process paths for microsoft_mdatp. For example:
141+
142+
```
143+
root 747798 0.3 1.5 1037180 154336 ? Ssl 12:26 0:21 /var/tmp/TestInstall/microsoft_mdatp/opt/microsoft/mdatp/sbin/wdavdaemon
144+
root 747844 0.0 0.8 945692 79676 ? Sl 12:26 0:04 /var/tmp/TestInstall/microsoft_mdatp/opt/microsoft/mdatp/sbin/wdavdaemon edr 16 15 --log_level info
145+
```
146+
147+
- **Check service status:**
148+
149+
Run: `systemctl status mdatp`
150+
151+
```
152+
● mdatp.service - Microsoft Defender
153+
Loaded: loaded (/lib/systemd/system/mdatp.service; enabled; vendor preset: enabled)
154+
Active: active (running) since ...
155+
Main PID: 747798 (wdavdaemon)
156+
...
157+
CGroup: /system.slice/mdatp.service
158+
‣ 747798 /var/tmp/TestInstall/microsoft_mdatp/opt/microsoft/mdatp/sbin/wdavdaemon
159+
```
160+
161+
- **Check the custom installation path in the *mde_path.json* file:**
162+
163+
- Primary: `/etc/opt/microsoft/mdatp/mde_path.json`
164+
- Example: `{"path": "/var/tmp/TestInstall/microsoft_mdatp"}`
165+
- If missing or malformed, Microsoft Defender for Endpoint fallbacks to the secondary file.
166+
- Secondary: `<custom_installation_path>/opt/microsoft/mdatp/conf/mde_path.json`
167+
- Should match the primary config.
168+
- This file is created at installation time.
169+
- Inconsistencies may indicate installation corruption.
170+
- Ensure the path is absolute.
171+
172+
### 2. Verify the symlink to the custom location
173+
174+
Run: `ls -ltr /opt/microsoft/mdatp`. The output should show `/opt/microsoft/mdatp` as a symlink to your custom location. For example:
175+
176+
```
177+
lrwxrwxrwx 1 root root ... /opt/microsoft/mdatp -> /var/tmp/TestInstall/microsoft_mdatp/opt/microsoft/mdatp
178+
```
179+
180+
## Related content
181+
182+
- [Prerequisites for Defender for Endpoint on Linux](mde-linux-prerequisites.md)
183+
184+
- Deployment methods:
185+
- [Installer script based deployment](linux-installer-script.md)
186+
- [Ansible based deployment](linux-install-with-ansible.md)
187+
- [Chef based deployment](linux-deploy-defender-for-endpoint-with-chef.md)
188+
- [Puppet based deployment](linux-install-with-puppet.md)
189+
- [Saltstack based deployment](linux-install-with-saltack.md)
190+
- [Connect your non-Azure machines to Defender for Cloud with Defender for Endpoint](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint) (direct onboarding using Defender for Cloud)
191+
- [Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md)
192+
- [Deploy Defender for Endpoint on Linux manually](linux-install-manually.md)
193+
194+
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)