Skip to content

Commit cd82cd8

Browse files
committed
Update mde-linux-prerequisites.md
1 parent 14f3e09 commit cd82cd8

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -149,11 +149,11 @@ Support for [Microsoft Defender for Endpoint on Linux for Arm64-based devices](/
149149
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)
150150
151151
> [!WARNING]
152-
> PAC, WPAD, and authenticated proxies are not supported.
152+
> PAC, WPAD, and authenticated proxies aren't supported.
153153
> Use only static or transparent proxies.
154-
> SSL inspection and intercepting proxies are also not supported for security reasons.
154+
> SSL inspection and intercepting proxies aren't supported for security reasons.
155155
> Configure an exception for SSL inspection and your proxy server to allow direct data pass-through from Defender for Endpoint on Linux to the relevant URLs without interception.
156-
> Adding your interception certificate to the global store will not enable interception.
156+
> Adding your interception certificate to the global store doesn't enable interception.
157157
158158
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-connectivity)
159159

@@ -175,8 +175,8 @@ There are several methods and tools that you can use to deploy Microsoft Defende
175175
- [SaltStack based deployment](/defender-endpoint/linux-install-with-saltack)
176176
- [Manual deployment](/defender-endpoint/linux-install-manually)
177177
- [Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)
178-
- For Arm64-based Linux servers, see [Microsoft Defender for Endpoint on Linux for Arm64-based devices (preview)](/defender-endpoint/mde-linux-arm)
179-
- For Linux Server with SAP, see [Deployment guidance for Defender for Endpoint on Linux Server with SAP](/defender-endpoint/mde-linux-deployment-on-sap)
178+
- [Guidance for Defender for Endpoint on Linux for Arm64-based devices (preview)](/defender-endpoint/mde-linux-arm)
179+
- [Guidance for Defender for Endpoint on Linux Server with SAP](/defender-endpoint/mde-linux-deployment-on-sap)
180180

181181
> [!IMPORTANT]
182182
> Installing Microsoft Defender for Endpoint in any location other than the default install path isn't supported. On Linux, Microsoft Defender for Endpoint creates an mdatp user with random UID and GID values. If you want to control these values, create an mdatp user before installation using the /usr/sbin/nologin shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.

0 commit comments

Comments
 (0)