You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-ebpf.md
+19-11Lines changed: 19 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/11/2024
18
+
ms.date: 12/02/2024
19
19
---
20
20
21
21
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -116,7 +116,9 @@ Post reboot, run the following command to check if audit rules were cleared:
116
116
The output of previous command should show no rules or any user added rules. In case where the rules weren't removed, do the following steps to clear the audit rules file:
117
117
118
118
1. Switch to ebpf mode.
119
+
119
120
2. Remove the file `/etc/audit/rules.d/mdatp.rules`.
121
+
120
122
3. Reboot the machine.
121
123
122
124
### Troubleshooting and Diagnostics
@@ -131,23 +133,29 @@ uname -a
131
133
132
134
1. Enabling eBPF on RHEL 8.1 version with SAP might result in kernel panic. To mitigate this issue, you can take one of the following steps:
133
135
134
-
- Use a distro version higher than RHEL 8.1.
135
-
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136
+
- Use a distro version higher than RHEL 8.1.
137
+
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136
138
137
139
2. Using Oracle Linux 8.8 with kernel version **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** might result in kernel panic. To mitigate this issue, you can take one of the following steps:
138
140
139
-
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
140
-
- Switch to AuditD mode if you need to use the same kernel version
141
+
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
142
+
- Switch to AuditD mode if you need to use the same kernel version
- The following two sets of data help analyze potential issues and determine the most effective resolution options.
149
+
150
+
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
145
151
146
-
The following two sets of data help analyze potential issues and determine the most effective resolution options.
152
+
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
147
153
148
-
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
154
+
3. System hangs on Oracle Linux 7.9 running Defender for Linux when ksplice is used forlive kernel patching.
149
155
150
-
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
156
+
- Auto-install patching of ksplice simply adds a cron job to the endpoint.
157
+
- To mitigate the hang issue, you can create a cron job which will first stop the mdatp service, apply ksplice based patching, then start the service.
158
+
- As kernel patching is few seconds activity so this will not have major exposure in terms of security.
0 commit comments