Skip to content

Commit d2786bc

Browse files
committed
Update linux-install-with-saltack.md
1 parent eb3e508 commit d2786bc

File tree

1 file changed

+26
-27
lines changed

1 file changed

+26
-27
lines changed

defender-endpoint/linux-install-with-saltack.md

Lines changed: 26 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,15 @@ search.appverid: met150
1818
ms.date: 12/24/2024
1919
---
2020

21+
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
22+
2123
**Applies to**:
2224

2325
- Microsoft Defender for Endpoint Server
2426
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
2527

2628
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
2729
28-
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
29-
30-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3130

3231
This article describes how to deploy Defender for Endpoint on Linux using Saltstack. A successful deployment requires the completion of all of the steps in this article.
3332

@@ -59,28 +58,28 @@ Here are a few important points:
5958

6059
:::image type="content" source="media/portal-onboarding-linux-2.png" alt-text="The Download onboarding package option":::
6160

62-
1. On the SaltStack Master, extract the contents of the archive to the SaltStack Server's folder (typically `/srv/salt`):
61+
4. On the SaltStack Master, extract the contents of the archive to the SaltStack Server's folder (typically `/srv/salt`):
6362

64-
```bash
65-
unzip WindowsDefenderATPOnboardingPackage.zip -d /srv/salt/mde
66-
```
63+
```bash
64+
unzip WindowsDefenderATPOnboardingPackage.zip -d /srv/salt/mde
65+
```
6766

68-
```console
69-
Archive: WindowsDefenderATPOnboardingPackage.zip
70-
inflating: /srv/salt/mde/mdatp_onboard.json
71-
```
67+
```console
68+
Archive: WindowsDefenderATPOnboardingPackage.zip
69+
inflating: /srv/salt/mde/mdatp_onboard.json
70+
```
7271

7372
## Create Saltstack state files
7473

7574
There are two ways you can create the Saltstack state files:
7675

77-
1. **Installer Script (recommended):** In this method, the script will automate deployment by installing the agent as well as onboarding the device to the security portal and also configure the repositories to pick the correct agent compatible with your linux distribution.
76+
- **Use the installer Script (recommended):** With this method, the script automates deployment by installing the agent, onboarding the device to the [Microsoft Defender portal](https://security.microsoft.com), and configuring the repositories to pick the correct agent compatible with your Linux distribution.
7877

79-
1. **Manually configuring the repositories:** In this method, repositories need to be configured manually along with selecting agent version compatible with your linux distribution. It gives more granular control over the deployment process.
78+
- **Manually configure the repositories:** With this method, repositories must be configured manually along with selecting agent version compatible with your Linux distribution. This method gives you more granular control over the deployment process.
8079

81-
### Create Saltstack state files using Installer Script
80+
### Create Saltstack state files using the installer script
8281

83-
1. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) from Microsoft GitHub Repository or use the following command to download it:
82+
1. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) from Microsoft GitHub Repository, or use the following command to download it:
8483

8584
```bash
8685
wget https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/linux/installation/mde_installer.sh /srv/salt/mde/
@@ -108,14 +107,11 @@ In this step, you create a SaltState state file in your configuration repository
108107

109108
> [!NOTE]
110109
> Defender for Endpoint on Linux can be deployed from one of the following channels:
111-
>
112110
> - *insiders-fast*, denoted as `[channel]`
113111
> - *insiders-slow*, denoted as `[channel]`
114112
> - *prod*, denoted as `[channel]` using the version name (see [Linux Software Repository for Microsoft Products](/linux/packages))
115113
>
116-
> Each channel corresponds to a Linux software repository.
117-
>
118-
> The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
114+
> Each channel corresponds to a Linux software repository. The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
119115
>
120116
> In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
121117
@@ -124,7 +120,7 @@ In this step, you create a SaltState state file in your configuration repository
124120
125121
1. Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
126122

127-
In the following commands, replace *[distro]* and *[version]* with your information.
123+
2. In the following commands, replace *[distro]* and *[version]* with your information.
128124

129125
> [!NOTE]
130126
> In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
@@ -152,7 +148,7 @@ In this step, you create a SaltState state file in your configuration repository
152148
{% endif %}
153149
```
154150

155-
2. Add the package installed state to `install_mdatp.sls` after the `add_ms_repo` state as previously defined.
151+
3. Add the package installed state to `install_mdatp.sls` after the `add_ms_repo` state as previously defined.
156152

157153
```console
158154
install_mdatp_package:
@@ -203,7 +199,7 @@ In this step, you create a SaltState state file in your configuration repository
203199
- required: install_mdatp_package
204200
```
205201

206-
5. Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the Security portal and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
202+
5. Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
207203

208204
6. Create an Uninstall state file `uninstall_mdapt.sls` and add the state to remove the `mdatp_onboard.json` file.
209205

@@ -217,7 +213,7 @@ In this step, you create a SaltState state file in your configuration repository
217213
- name: /etc/opt/microsoft/mdatp/mdatp_onboard.json
218214
```
219215

220-
6. Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.
216+
7. Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.
221217

222218
```console
223219
offboard_mde:
@@ -226,7 +222,7 @@ In this step, you create a SaltState state file in your configuration repository
226222
- source: salt://mde/mdatp_offboard.json
227223
```
228224

229-
7. Add the removal of the MDATP package to the `uninstall_mdatp.sls` file after the `offboard_mde` state defined in the previous section.
225+
8. Add the removal of the MDATP package to the `uninstall_mdatp.sls` file after the `offboard_mde` state defined in the previous section.
230226

231227
```console
232228
remove_mde_packages:
@@ -251,10 +247,9 @@ In this step, you create a SaltState state file in your configuration repository
251247
- name: mdatp
252248
```
253249

254-
## Deploy Defender on Endpoint using the state files created above, applicable to both methods
255-
256-
In this step, you apply the state to the minions. The following command applies the state to machines with the name that begins with `mdetest`.
250+
## Deploy Defender on Endpoint using the state files created earlier
257251

252+
This step applies to both the installer script or manual configuration method. In this step, you apply the state to the minions. The following command applies the state to machines with the name that begins with `mdetest`.
258253

259254
1. Installation:
260255

@@ -286,9 +281,13 @@ In this step, you apply the state to the minions. The following command applies
286281
To troubleshoot issues:
287282

288283
1. For information on how to find the log that's generated automatically when an installation error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
284+
289285
2. For information about common installation issues, see [Installation issues](/defender-endpoint/linux-support-install).
286+
290287
3. If the health of the device is `false`, see [Defender for Endpoint agent health issues](/defender-endpoint/health-status).
288+
291289
4. For product performance issues, see [Troubleshoot performance issues](/defender-endpoint/linux-support-perf).
290+
292291
5. For proxy and connectivity issues, see [Troubleshoot cloud connectivity issues](/defender-endpoint/linux-support-connectivity).
293292

294293
To get support from Microsoft, open a support ticket, and provide the log files created by using the [client analyzer](/defender-endpoint/run-analyzer-macos-linux).

0 commit comments

Comments
 (0)