You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-prerequisites.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,11 +149,11 @@ Support for [Microsoft Defender for Endpoint on Linux for Arm64-based devices](/
149
149
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
150
150
151
151
> [!WARNING]
152
-
> PAC, WPAD, and authenticated proxies are not supported.
152
+
> PAC, WPAD, and authenticated proxies aren't supported.
153
153
> Use only static or transparent proxies.
154
-
> SSL inspection and intercepting proxies are also not supported for security reasons.
154
+
> SSL inspection and intercepting proxies aren't supported for security reasons.
155
155
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
156
-
> Adding your interception certificate to the global store will not enable interception.
156
+
> Adding your interception certificate to the global store doesn't enable interception.
157
157
158
158
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
159
159
@@ -175,8 +175,8 @@ There are several methods and tools that you can use to deploy Microsoft Defende
175
175
-[SaltStack based deployment](/defender-endpoint/linux-install-with-saltack)
-[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)
178
-
-For Arm64-based Linux servers, see [Microsoft Defender for Endpoint on Linux for Arm64-based devices (preview)](/defender-endpoint/mde-linux-arm)
179
-
-For Linux Server with SAP, see [Deployment guidance for Defender for Endpoint on Linux Server with SAP](/defender-endpoint/mde-linux-deployment-on-sap)
178
+
-[Guidance for Defender for Endpoint on Linux for Arm64-based devices (preview)](/defender-endpoint/mde-linux-arm)
179
+
-[Guidance for Defender for Endpoint on Linux Server with SAP](/defender-endpoint/mde-linux-deployment-on-sap)
180
180
181
181
> [!IMPORTANT]
182
182
> Installing Microsoft Defender for Endpoint in any location other than the default install path isn't supported. On Linux, Microsoft Defender for Endpoint creates an mdatp user with random UID and GID values. If you want to control these values, create an mdatp user before installation using the /usr/sbin/nologin shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
0 commit comments