Skip to content

Commit cfbb4ff

Browse files
committed
Update mde-linux-prerequisites.md
1 parent 59147b5 commit cfbb4ff

File tree

1 file changed

+8
-10
lines changed

1 file changed

+8
-10
lines changed

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -95,16 +95,11 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
9595
**The following Linux server distributions on ARM64 are now GA:**
9696

9797
- Ubuntu 20.04 ARM64
98-
9998
- Ubuntu 22.04 ARM64
100-
10199
- Ubuntu 24.04 ARM64
102100
- Debian 11, 12 ARM64
103-
104101
- Amazon Linux 2 ARM64
105-
106102
- Amazon Linux 2023 ARM64
107-
108103
- RHEL 8.x ARM64
109104
- RHEL 9.x ARM64
110105
- Oracle Linux 8.x ARM64
@@ -150,11 +145,14 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
150145
151146
## Verify that devices can connect to Defender for Endpoint cloud services
152147

153-
- Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment)
154-
- Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
155-
1. Transparent proxy
156-
2. [Manual static proxy configuration](/defender-endpoint/linux-static-proxy-configuration#installation-time-configuration)
157-
- Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
148+
1. Prepare your environment, as described in Step 1 of the following article [Configure your network environment to ensure connectivity with Defender for Endpoint service](/defender-endpoint/configure-environment).
149+
150+
2. Connect Defender for Endpoint on Linux through a proxy server by using the following discovery methods:
151+
152+
- Transparent proxy
153+
- [Manual static proxy configuration](/defender-endpoint/linux-static-proxy-configuration#installation-time-configuration)
154+
155+
3. Permit anonymous traffic in the previously listed URLs, if a proxy or firewall blocks traffic.
158156

159157
> [!NOTE]
160158
> Configuration for transparent proxies isn't needed for Defender for Endpoint. See [Manual Static Proxy Configuration.](/defender-endpoint/linux-static-proxy-configuration)

0 commit comments

Comments
 (0)