You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-saltack.md
+26-27Lines changed: 26 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,15 @@ search.appverid: met150
18
18
ms.date: 12/24/2024
19
19
---
20
20
21
+
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
22
+
21
23
**Applies to**:
22
24
23
25
- Microsoft Defender for Endpoint Server
24
26
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
25
27
26
28
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
27
29
28
-
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
This article describes how to deploy Defender for Endpoint on Linux using Saltstack. A successful deployment requires the completion of all of the steps in this article.
33
32
@@ -59,28 +58,28 @@ Here are a few important points:
There are two ways you can create the Saltstack state files:
76
75
77
-
1.**Installer Script (recommended):**In this method, the script will automate deployment by installing the agent as well as onboarding the device to the security portal and also configure the repositories to pick the correct agent compatible with your linux distribution.
76
+
-**Use the installer Script (recommended):**With this method, the script automates deployment by installing the agent, onboarding the device to the [Microsoft Defender portal](https://security.microsoft.com), and configuring the repositories to pick the correct agent compatible with your Linux distribution.
78
77
79
-
1.**Manually configuring the repositories:**In this method, repositories need to be configured manually along with selecting agent version compatible with your linux distribution. It gives more granular control over the deployment process.
78
+
-**Manually configure the repositories:**With this method, repositories must be configured manually along with selecting agent version compatible with your Linux distribution. This method gives you more granular control over the deployment process.
80
79
81
-
### Create Saltstack state files using Installer Script
80
+
### Create Saltstack state files using the installer script
82
81
83
-
1. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) from Microsoft GitHub Repository or use the following command to download it:
82
+
1. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) from Microsoft GitHub Repository, or use the following command to download it:
@@ -108,14 +107,11 @@ In this step, you create a SaltState state file in your configuration repository
108
107
109
108
> [!NOTE]
110
109
> Defender for Endpoint on Linux can be deployed from one of the following channels:
111
-
>
112
110
> -*insiders-fast*, denoted as `[channel]`
113
111
> -*insiders-slow*, denoted as `[channel]`
114
112
> -*prod*, denoted as `[channel]` using the version name (see [Linux Software Repository for Microsoft Products](/linux/packages))
115
113
>
116
-
> Each channel corresponds to a Linux software repository.
117
-
>
118
-
> The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in*insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
114
+
> Each channel corresponds to a Linux software repository. The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
119
115
>
120
116
> In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
121
117
@@ -124,7 +120,7 @@ In this step, you create a SaltState state file in your configuration repository
124
120
125
121
1. Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
126
122
127
-
In the following commands, replace *[distro]* and *[version]* with your information.
123
+
2. In the following commands, replace *[distro]* and *[version]* with your information.
128
124
129
125
> [!NOTE]
130
126
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
@@ -152,7 +148,7 @@ In this step, you create a SaltState state file in your configuration repository
152
148
{% endif %}
153
149
```
154
150
155
-
2. Add the package installed state to `install_mdatp.sls` after the `add_ms_repo` state as previously defined.
151
+
3. Add the package installed state to `install_mdatp.sls` after the `add_ms_repo` state as previously defined.
156
152
157
153
```console
158
154
install_mdatp_package:
@@ -203,7 +199,7 @@ In this step, you create a SaltState state file in your configuration repository
203
199
- required: install_mdatp_package
204
200
```
205
201
206
-
5. Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the Security portal and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
202
+
5. Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
207
203
208
204
6. Create an Uninstall state file `uninstall_mdapt.sls` and add the state to remove the `mdatp_onboard.json` file.
209
205
@@ -217,7 +213,7 @@ In this step, you create a SaltState state file in your configuration repository
6. Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.
216
+
7. Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.
221
217
222
218
```console
223
219
offboard_mde:
@@ -226,7 +222,7 @@ In this step, you create a SaltState state file in your configuration repository
226
222
- source: salt://mde/mdatp_offboard.json
227
223
```
228
224
229
-
7. Add the removal of the MDATP package to the `uninstall_mdatp.sls` file after the `offboard_mde` state defined in the previous section.
225
+
8. Add the removal of the MDATP package to the `uninstall_mdatp.sls` file after the `offboard_mde` state defined in the previous section.
230
226
231
227
```console
232
228
remove_mde_packages:
@@ -251,10 +247,9 @@ In this step, you create a SaltState state file in your configuration repository
251
247
- name: mdatp
252
248
```
253
249
254
-
## Deploy Defender on Endpoint using the state files created above, applicable to both methods
255
-
256
-
In this step, you apply the state to the minions. The following command applies the state to machines with the name that begins with `mdetest`.
250
+
## Deploy Defender on Endpoint using the state files created earlier
257
251
252
+
This step applies to both the installer script or manual configuration method. In this step, you apply the state to the minions. The following command applies the state to machines with the name that begins with `mdetest`.
258
253
259
254
1. Installation:
260
255
@@ -286,9 +281,13 @@ In this step, you apply the state to the minions. The following command applies
286
281
To troubleshoot issues:
287
282
288
283
1. For information on how to find the log that's generated automatically when an installation error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
284
+
289
285
2. For information about common installation issues, see [Installation issues](/defender-endpoint/linux-support-install).
286
+
290
287
3. If the health of the device is `false`, see [Defender for Endpoint agent health issues](/defender-endpoint/health-status).
288
+
291
289
4. For product performance issues, see [Troubleshoot performance issues](/defender-endpoint/linux-support-perf).
290
+
292
291
5. For proxy and connectivity issues, see [Troubleshoot cloud connectivity issues](/defender-endpoint/linux-support-connectivity).
293
292
294
293
To get support from Microsoft, open a support ticket, and provide the log files created by using the [client analyzer](/defender-endpoint/run-analyzer-macos-linux).
0 commit comments