You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-preferences.md
+57-15Lines changed: 57 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 10/14/2024
9
+
ms.date: 01/13/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -79,7 +79,10 @@ Specifies the enforcement preference of antivirus engine. There are three values
79
79
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
80
80
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
81
81
82
-
#### Enable/disable behavior monitoring
82
+
#### Enable/disable behavior monitoring [only if RTP is enabled]
83
+
84
+
> [!IMPORTANT]
85
+
> This feature only works when the enforcement level is set to `real-time`.
83
86
84
87
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
85
88
@@ -91,10 +94,13 @@ Determines whether behavior monitoring and blocking capability is enabled on the
91
94
92
95
> [!NOTE]
93
96
> Available in Defender for Endpoint version `101.45.00` or later.
94
-
> This feature is applicable only when real-time protection is enabled.
97
+
95
98
96
99
#### Run a scan after definitions are updated
97
100
101
+
> [!IMPORTANT]
102
+
> This feature only works when the enforcement level is set to `real-time`.
103
+
98
104
Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting triggers an antivirus scan on the running processes of the device.
99
105
100
106
|Description|JSON Value|Defender Portal Value|
@@ -105,7 +111,6 @@ Specifies whether to start a process scan after new security intelligence update
105
111
106
112
> [!NOTE]
107
113
> Available in Defender for Endpoint version `101.45.00` or later.
108
-
> This feature only works when the enforcement level is set to `real-time`.
@@ -266,7 +271,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266
271
> [!NOTE]
267
272
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
268
273
>
269
-
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
274
+
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
270
275
271
276
272
277
@@ -380,7 +385,7 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380
385
381
386
### Exclusion setting preferences
382
387
383
-
**Exlusion setting preferences are currently in preview**.
388
+
**Exclusion setting preferences are currently in preview**.
384
389
385
390
> [!NOTE]
386
391
> Global exclusions are currently in public preview, and are available in Defender for Endpoint beginning with version `101.23092.0012` or later in the Insiders Slow and Production rings.
@@ -429,7 +434,7 @@ Specifies the type of content excluded from the scan.
429
434
430
435
##### Scopes of exclusion (optional)
431
436
432
-
Specifies the set of exlusion scopes of content excluded. Currently supported scopes are `epp` and `global`.
437
+
Specifies the set of exclusion scopes of content excluded. Currently supported scopes are `epp` and `global`.
433
438
434
439
If nothing is specified in for an exclusion under *exclusionSettings* in managed configuration, then `global` is considered as scope.
435
440
@@ -496,8 +501,8 @@ Specifies a process for which all file activity is excluded from scanning. The p
496
501
497
502
The following settings can be configured to enable certain advanced scanning features.
498
503
499
-
> [!NOTE]
500
-
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults.
504
+
> [!IMPORTANT]
505
+
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
501
506
502
507
##### Configure scanning of file modify permissions events
503
508
@@ -632,8 +637,8 @@ Depending on the enforcement level, the automatic security intelligence updates
632
637
633
638
The following settings can be configured to enable certain advanced features.
634
639
635
-
>[!NOTE]
636
-
>Enabling these features might impact device performance. It is recommended to keep the defaults.
640
+
>[!IMPORTANT]
641
+
>Enabling these features might impact device performance. It is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
##### Configure monitoring of file modify ownership events
683
688
684
-
Determines whether file modify ownership events (chown) are monitored.
689
+
Determines whether file modify ownership events (`chown`) are monitored.
685
690
686
691
> [!NOTE]
687
692
> When this feature is enabled, Defender for Endpoint will monitor changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
@@ -764,6 +769,42 @@ Determines whether module load events are monitored using eBPF and scanned.
|**Comments**|Available in Defender for Endpoint version `101.24072.0001` or later.|
807
+
767
808
#### Report AV Suspicious Events to EDR
768
809
769
810
Determines whether suspicious events from Antivirus are reported to EDR.
@@ -777,11 +818,12 @@ Determines whether suspicious events from Antivirus are reported to EDR.
777
818
778
819
### Network protection configurations
779
820
780
-
The following settings can be used to configure advanced Network Protection inspection features to control what traffic gets inspected by Network Protection.
781
-
782
821
> [!NOTE]
822
+
> This is a preview feature.
783
823
> For these to be effective, Network Protection has to be turned on. For more information, see [Turn on network protection for Linux](network-protection-linux.md).
784
824
825
+
The following settings can be used to configure advanced Network Protection inspection features to control what traffic gets inspected by Network Protection.
826
+
785
827
|Description|JSON Value|Defender Portal Value|
786
828
|---|---|---|
787
829
|**Key**|networkProtection|Network protection|
@@ -1023,7 +1065,7 @@ If the JSON is well-formed, the above command outputs it back to the Terminal an
1023
1065
1024
1066
## Verifying that the mdatp_managed.json file is working as expected
1025
1067
1026
-
To verify that your /etc/opt/microsoft/mdatp/managed/mdatp_managed.json is working properly, you should see "[managed]" next to these settings:
1068
+
To verify that your `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json` is working properly, you should see "[managed]" next to these settings:
- Upgraded the Bond version to 13.0.1 to address security vulnerabilities in versions 12 or lower.
59
+
60
+
- Mdatp package no longer has a dependency on SELinux packages.
61
+
62
+
- User can now query the status of supplementary event provider eBPF using the threat hunting query in DeviceTvmInfoGathering. To learn more about this query check: [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-ebpf). The result of this query can return the following two values as eBPF status:
63
+
- Enabled: When eBPF is enabled as working as expected.
64
+
- Disabled: When eBPF is disabled due to one of the following reasons:
65
+
- When MDE is using auditD as a supplementary sensor
66
+
- When eBPF is not present and we fallback to Netlink as supplementary event provider
67
+
- There is no supplementary sensor present.
68
+
69
+
- Starting from 2411, the MDATP package release to Production on packages.microsoft.com will follow a gradual rollout mechanism which spans over a week. The other release rings, insiderFast and insiderSlow, are unaffected by this change.
70
+
71
+
- Stability and performance improvements.
72
+
73
+
- Critical bugs fixes around definition update flow.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ sc query state= all
107
107
108
108
To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure Microsoft Defender Antivirus Security intelligence updates are approved for the computers you manage.
109
109
110
-
By default, Windows Update doesn't download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
110
+
By default, Windows Update doesn't download and install updates automatically on Windows Server 2016, Windows Server 2019 or Windows Server 2022. You can change this configuration by using one of the following methods:
111
111
112
112
| Method | Description |
113
113
|---|---|
@@ -155,7 +155,7 @@ To enable automatic sample submission, start a Windows PowerShell console as an
155
155
156
156
## Configure automatic exclusions
157
157
158
-
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.
158
+
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or Windows Server 2019, or Windows Server 2022.
159
159
160
160
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).
0 commit comments