Skip to content

Commit cda6608

Browse files
authored
Merge pull request #2146 from MicrosoftDocs/main
Publish main to live, Tuesday 3:30PM PST, 12/10
2 parents e0f26ce + 157357e commit cda6608

File tree

5 files changed

+35
-39
lines changed

5 files changed

+35
-39
lines changed

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,14 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: linux
1616
search.appverid: met150
17-
ms.date: 10/28/2024
17+
ms.date: 12/10/2024
1818
---
1919

2020
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
2121

22+
> [!TIP]
23+
> We are excited to share that Microsoft Defender for Endpoint on Linux now extends support for ARM64-based Linux servers in preview! For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
24+
2225
This article provides advanced deployment guidance for Microsoft Defender for Endpoint on Linux. You get a brief summary of the deployment steps, learn about the system requirements, then be guided through the actual deployment steps. You'll also learn how to verify that the device has been correctly onboarded.
2326

2427
For information about Microsoft Defender for Endpoint capabilities, see [Advanced Microsoft Defender for Endpoint capabilities](#advanced-microsoft-defender-for-endpoint-capabilities).
@@ -29,23 +32,21 @@ To learn about other ways to deploy Microsoft Defender for Endpoint on Linux, se
2932
- [Puppet based deployment](linux-install-with-puppet.md)
3033
- [Ansible based deployment](linux-install-with-ansible.md)
3134
- [Deploy Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)
35+
- [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)
3236

3337
## Deployment summary
3438

35-
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment.
39+
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment. Some of the steps are optional and aren't specific to Defender for Endpoint; however, consider doing all the steps for best results.
3640

3741
1. [Prepare your network environment](#1-prepare-your-network-environment).
3842

3943
2. [Capture performance data from the endpoint](#2-capture-performance-data-from-the-endpoint).
4044

41-
> [!NOTE]
42-
> Consider doing the following optional items, even though they are not Microsoft Defender for Endpoint specific, they tend to improve performance in Linux systems.
43-
44-
3. [(Optional) Check for filesystem errors 'fsck' (akin to chkdsk)](#3-optional-check-for-filesystem-errors-fsck-akin-to-chkdsk).
45+
3. (Optional) [Check for filesystem errors 'fsck' (akin to chkdsk)](#3-optional-check-for-filesystem-errors-fsck-akin-to-chkdsk).
4546

46-
4. [(Optional) Update storage subsystem drivers](#4-optional-update-storage-subsystem-drivers).
47+
4. (Optional) [Update storage subsystem drivers](#4-optional-update-storage-subsystem-drivers).
4748

48-
5. [(Optional) Update nic drivers](#5-optional-update-nic-drivers).
49+
5. (Optional) [Update nic drivers](#5-optional-update-nic-drivers).
4950

5051
6. [Confirm system requirements and resource recommendations are met](#6-confirm-system-requirements-and-resource-recommendations-are-met).
5152

@@ -85,27 +86,27 @@ Learn about the general guidance on a typical Microsoft Defender for Endpoint on
8586

8687
Add the Microsoft Defender for Endpoint URLs and/or IP addresses to the allowed list, and prevent traffic from being SSL inspected.
8788

88-
8989
### Network connectivity of Microsoft Defender for Endpoint
9090

9191
Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
9292

93-
1. See [Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
93+
1. See [Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic).
9494

95-
2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
95+
2. If the Linux servers are behind a proxy, set proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
9696

9797
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
9898

9999
> [!NOTE]
100-
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
100+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and Mac).
101101
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
102102
103-
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
103+
For more information, see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
104104

105105
#### Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic
106106

107-
1. Go to [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
108-
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses
107+
1. See [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
108+
109+
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses.
109110

110111
#### Step 2: Set up proxy settings
111112

@@ -125,15 +126,15 @@ The following table lists the supported proxy settings:
125126

126127
#### Step 3: Verify SSL inspection isn't being performed on the network traffic
127128

128-
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For additional information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
129+
To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You must bypass SSL inspection for Microsoft Defender for Endpoint URLs. For more information about the certificate pinning process, see [enterprise-certificate-pinning](/windows/security/identity-protection/enterprise-certificate-pinning).
129130

130131
##### Troubleshoot cloud connectivity issues
131132

132133
For more information, see [Troubleshooting cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
133134

134135
## 2. Capture performance data from the endpoint
135136

136-
Capture performance data from the endpoints that have Defender for Endpoint installed. This includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
137+
Capture performance data from the endpoints that have Defender for Endpoint installed. This data includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
137138

138139
## 3. (Optional) Check for filesystem errors 'fsck' (akin to chkdsk)
139140

@@ -157,21 +158,21 @@ For a detailed list of supported Linux distros, see [System requirements](micros
157158
|---|---|
158159
|Disk space |Minimum: 2 GB <br> NOTE: More disk space might be needed if cloud diagnostics are enabled for crash collections. |
159160
|RAM |1 GB<br> 4 GB is preferred|
160-
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> 4 cores are preferred |
161+
|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> Four cores are preferred |
161162

162163
|OS version|Kernel filter driver|Comments|
163164
|---|---|---|
164-
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the fanotify kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
165+
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the `fanotify` kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
165166
## 7. Add your existing solution to the exclusion list for Microsoft Defender Antivirus
166167

167168
This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus.
168169

169170
> [!TIP]
170171
> To get help configuring exclusions, refer to your solution provider's documentation.
171172
172-
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses fanotify, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
173+
- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses `fanotify`, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.
173174

174-
- To check if there's a non-Microsoft antimalware that is running FANotify, you can run `mdatp health`, then check the result:
175+
- To check if there's a non-Microsoft antimalware that is running `fanotify`, you can run `mdatp health`, then check the results:
175176

176177
:::image type="content" source="media/mdatp-health-result.png" alt-text="Image of mdatp health result":::
177178

@@ -199,7 +200,6 @@ This step of the setup process involves adding Defender for Endpoint to the excl
199200
When you add [exclusions to Microsoft Defender Antivirus scans](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions.
200201

201202
> [!NOTE]
202-
>
203203
> - Antivirus exclusions apply to the antivirus engine.
204204
> - Indicators allow/block apply to the antivirus engine.
205205

defender-endpoint/defender-endpoint-plan-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Most organizations use various devices and operating systems. Defender for Endpo
190190
Servers require an additional license, such as:
191191

192192
- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).
193-
- **Microsoft Defender for Endpoint for Servers** (*recommended for enterprise customers*). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
193+
- **Microsoft Defender for Endpoint Server** (*recommended for enterprise customers*). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
194194
- **Microsoft Defender for Business servers** (*for small and medium-sized businesses who have [Microsoft Defender for Business](/defender-business/mdb-overview)*). To learn more, see [How to get Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).
195195

196196
See [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products).

defender-endpoint/mde-p1-setup-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ ms.topic: overview
1010
ms.service: defender-endpoint
1111
ms.subservice: onboard
1212
ms.localizationpriority: medium
13-
ms.date: 09/26/2024
14-
ms.reviewer:
13+
ms.date: 12/10/2024
14+
ms.reviewer: yonghree, pahuijbr
1515
f1.keywords: NOCSH
1616
ms.collection:
1717
- m365-security
@@ -60,10 +60,10 @@ The following table lists the basic requirements for Defender for Endpoint Plan
6060
> The standalone version of Defender for Endpoint Plan 1 doesn't include server licenses. To onboard servers, you'll require an additional license, such as:
6161
>
6262
> - Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering.
63-
> - Microsoft Defender for Endpoint for Servers
63+
> - Microsoft Defender for Endpoint Server
6464
> - [Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers) (for small and medium-sized businesses)
6565
>
66-
> To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md)
66+
> To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md)
6767
6868
## Plan your deployment
6969

@@ -78,7 +78,7 @@ When you plan your deployment, you can choose from several different architectur
7878

7979
To learn more about your deployment options, see [Plan your Defender for Endpoint deployment](deployment-strategy.md). And, download the following poster:
8080

81-
[:::image type="content" source="/defender/media/defender-endpoint/mde-deployment-strategy.png" alt-text="Screnshot of deployment strategy poster thumbnail.":::](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf)
81+
[:::image type="content" source="/defender/media/defender-endpoint/mde-deployment-strategy.png" alt-text="Screenshot of deployment strategy poster thumbnail.":::](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf)
8282

8383
**[Get the deployment poster](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf)**
8484

@@ -251,7 +251,7 @@ You can configure Defender for Endpoint to block or allow removable devices and
251251

252252
5. On the **Configuration settings** tab, select **All Settings**. Then in the search box, type `Removable` to see all the settings that pertain to removable devices.
253253

254-
6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it's enabled, disabled, or not configured. Select a setting, and then choose **OK**.
254+
6. Select an item in the list, such as **All Removable Storage classes, Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it's enabled, disabled, or not configured. Select a setting, and then choose **OK**.
255255

256256
7. Repeat step 6 for each setting that you want to configure. Then choose **Next**.
257257

defender-endpoint/minimum-requirements.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 10/10/2024
9+
ms.date: 12/10/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -27,7 +27,7 @@ search.appverid: met150
2727

2828
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-minreqs-abovefoldlink)
2929
30-
There are some minimum requirements for onboarding devices to the Defender for Endpoint service. Learn about the licensing, hardware and software requirements, and other configuration settings to onboard devices to the service.
30+
There are some minimum requirements for onboarding devices to the Defender for Endpoint service. Learn about the licensing, hardware, and software requirements, and other configuration settings to onboard devices to the service.
3131

3232
> [!TIP]
3333
>
@@ -44,7 +44,7 @@ There are some minimum requirements for onboarding devices to the Defender for E
4444
- To [onboard servers](onboard-windows-server.md) to the standalone versions of Defender for Endpoint, server licenses are required. You can choose from:
4545

4646
- Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering
47-
- Microsoft Defender for Endpoint for Servers
47+
- Microsoft Defender for Endpoint Server
4848
- [Microsoft Defender for Business servers](/defender-business/get-defender-business) (for small and medium-sized businesses only)
4949

5050
For more detailed information about licensing requirements for Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint licensing information](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-endpoint).
@@ -70,7 +70,7 @@ Devices on your network must be running one of these editions. New features or c
7070
> [!IMPORTANT]
7171
> Windows 11 Home devices that have been upgraded to one of the below supported editions might require you to run the following command before onboarding:
7272
> `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`.
73-
> For more information about edition upgrades and features, see [Features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
73+
> For more information about edition upgrades and features, see ([Features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
7474
7575
- Windows 11 Enterprise
7676
- Windows 11 IoT Enterprise
@@ -149,7 +149,7 @@ Alternatively, if you must use an IPv6-only configuration, consider adding dynam
149149

150150
#### Internet connectivity
151151

152-
Internet connectivity on devices is required either directly or through proxy.
152+
Internet connectivity on devices is required either directly or through a proxy.
153153

154154
For more information on other proxy configuration settings, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
155155

defender-office-365/try-microsoft-defender-for-office-365.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
ms.custom:
1919
ms.service: defender-office-365
2020
ROBOTS:
21-
ms.date: 4/8/2024
21+
ms.date: 12/10/2024
2222
---
2323

2424
# Try Microsoft Defender for Office 365
@@ -442,10 +442,6 @@ A: No. The trial automatically provisions Defender for Office 365 Plan 2 license
442442

443443
A: See [Extend your trial](/microsoft-365/commerce/try-or-buy-microsoft-365#extend-your-trial).
444444

445-
### Q: Why do I not see options to cancel or extend the trial?
446-
447-
A: You don't see options to cancel or extend your trial if your subscription is part of the New Commerce Experience (NCE). Currently, only customers on legacy subscriptions have the capability to cancel or extend their trials.
448-
449445
### Q: What happens to my data after the trial expires?
450446

451447
A: After your trial expires, you have access to your trial data (data from features in Defender for Office 365 that you didn't have previously) for 30 days. After this 30 day period, all policies and data that were associated with the Defender for Office 365 trial are deleted.

0 commit comments

Comments
 (0)