You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-deployment-on-sap.md
+18-16Lines changed: 18 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
title: Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP
3
3
description: Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP
4
4
ms.service: defender-endpoint
5
-
ms.author: cgardin
6
-
author: cgardin
7
-
ms.reviewer: shlomiakirav
5
+
ms.author: deniseb
6
+
author: denisebmsft
7
+
ms.reviewer: cgardin
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
10
10
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 05/17/2024
18
+
ms.date: 09/26/2024
19
19
ms.custom:
20
20
- partner-contribution
21
21
---
@@ -28,7 +28,7 @@ ms.custom:
28
28
29
29
This article provides deployment guidance for Microsoft Defender for Endpoint on Linux for SAP. This article includes recommended SAP OSS (Online Services System) notes, the system requirements, prerequisites, important configuration settings, recommended antivirus exclusions, and guidance on scheduling antivirus scans.
30
30
31
-
Conventional security defenses that have been commonly used to protect SAP systems such as isolating infrastructure behind firewalls and limiting interactive operating system logons are no longer considered sufficient to mitigate modern sophisticated threats. It's essential to deploy modern defenses to detect and contain threats in real-time. SAP applications unlike most other workloads require basic assessment and validation before deploying Microsoft Defender for Endpoint. The enterprise security administrators should contact the SAP Basis team prior to deploying Defender for Endpoint. The SAP Basis Team should be cross trained with a basic level of knowledge about Defender for Endpoint.
31
+
Conventional security defenses that have been commonly used to protect SAP systems, such as isolating infrastructure behind firewalls and limiting interactive operating system logons, are no longer considered sufficient to mitigate modern sophisticated threats. It's essential to deploy modern defenses to detect and contain threats in real-time. SAP applications unlike most other workloads require basic assessment and validation before deploying Microsoft Defender for Endpoint. The enterprise security administrators should contact the SAP Basis team prior to deploying Defender for Endpoint. The SAP Basis Team should be cross trained with a basic level of knowledge about Defender for Endpoint.
32
32
33
33
## Recommended SAP OSS Notes
34
34
@@ -48,7 +48,7 @@ Conventional security defenses that have been commonly used to protect SAP syste
48
48
- SAP only supports certain Linux File systems. In general, XFS and EXT3 are used. Oracle Automatic Storage Management (ASM) filesystem is sometimes used for Oracle DBMS and can't be read by Defender for Endpoint.
49
49
- Some SAP applications use "standalone engines" such as TREX, Adobe Document Server, Content Server and LiveCache. These engines require specific configuration and file exclusions.
50
50
- SAP applications often have Transport and Interface directories with many thousands of small files. If the number of files is larger than 100,000, it might and affect performance. It's recommended to archive files.
51
-
- It's strongly recommended to deploy Defender for Endpoint to nonproductive SAP landscapes for several weeks before deploying to production. The SAP Basis Team should use tools such as sysstat, KSAR, and nmon to verify if CPU and other performance parameters are impacted.
51
+
- It's strongly recommended to deploy Defender for Endpoint to nonproductive SAP landscapes for several weeks before deploying to production. The SAP Basis Team should use tools such as `sysstat`, `KSAR`, and `nmon` to verify if CPU and other performance parameters are impacted.
52
52
53
53
## Prerequisites for deploying Microsoft Defender for Endpoint on Linux on SAP VMs
54
54
@@ -57,32 +57,34 @@ Conventional security defenses that have been commonly used to protect SAP syste
57
57
- Microsoft Defender for Endpoint on Linux requires connectivity to [specific Internet endpoints](microsoft-defender-endpoint-linux.md#network-connections) from VMs to update antivirus Definitions.
58
58
- Microsoft Defender for Endpoint on Linux requires some crontab (or other task scheduler) entries to schedule scans, log rotation, and Microsoft Defender for Endpoint updates. Enterprise Security teams normally manage these entries. Refer to [How to schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-mde-linux.md).
59
59
60
-
The default configuration option for deployment as an Azure Extension for AntiVirus (AV) will be Passive Mode. This means that the AV component of Microsoft Defender for Endpoint won't intercept IO calls. It's recommended to run Microsoft Defender for Endpoint in Passive Mode on all SAP applications and to schedule a scan once per day. In this mode:
60
+
The default configuration option for deployment as an Azure Extension for AntiVirus (AV) is Passive Mode. This means that Microsoft Defender Antivirus, the AV component of Microsoft Defender for Endpoint, doesn't intercept IO calls. It's recommended to run Microsoft Defender for Endpoint in Passive Mode on all SAP applications and to schedule a scan once per day. In this mode:
61
61
62
62
-**Real-time protection is turned off**: Threats aren't remediated by Microsoft Defender Antivirus.
63
63
-**On-demand scanning is turned on**: Still use the scan capabilities on the endpoint.
64
64
-**Automatic threat remediation is turned off**: No files are moved and the security administrator is expected to take required action.
65
65
-**Security intelligence updates are turned on**: Alerts are available on security administrator's tenant.
66
66
67
+
Online Kernel patching tools such as Ksplice or similar can lead to unpredictable OS stability if Defender for Endpoint is running. It is recommended to temporarily stop the Defender for Endpoint daemon prior to performing online Kernel patching. After the Kernel is updated Defender for Endpoint on Linux can be safely restarted. This is especially important on large SAP HANA VMs with huge memory contexts.
68
+
67
69
The Linux crontab is typically used to schedule Microsoft Defender for Endpoint AV scan and log rotation tasks:
68
70
[How to schedule scans with Microsoft Defender for Endpoint (Linux)](linux-schedule-scan-mde.md)
69
71
70
72
Endpoint Detection and Response (EDR) functionality is active whenever Microsoft Defender for Endpoint on Linux is installed. There's no simple way to disable EDR functionality through command line or configuration. For more information on troubleshooting EDR, see the sections [Useful Commands](#useful-commands) and [Useful Links](#useful-links).
71
73
72
74
## Important Configuration Settings for Microsoft Defender for Endpoint on SAP on Linux
73
75
74
-
It's recommended to check the installation and configuration of Defender for Endpoint with the command mdatp health.
76
+
It's recommended to check the installation and configuration of Defender for Endpoint with the command `mdatp health`.
75
77
76
78
The key parameters recommended for SAP applications are:
77
79
78
-
- healthy = true
79
-
- release_ring = Production. Prerelease and insider rings shouldn't be used with SAP Applications.
80
-
- real_time_protection_enabled = false. Real-time protection is off in passive mode, which is the default mode and prevents real-time IO interception.
81
-
- automatic_definition_update_enabled = true
82
-
- definition_status = "up_to_date". Run a manual update if a new value is identified.
83
-
- edr_early_preview_enabled = "disabled". If enabled on SAP systems it might lead to system instability.
84
-
- conflicting_applications = []. Other AV or security software installed on a VM such as Clam.
85
-
- supplementary_events_subsystem = "ebpf". Don't proceed if ebpf isn't displayed. Contact the security admin team.
80
+
-`healthy = true`
81
+
-`release_ring = Production`. Prerelease and insider rings shouldn't be used with SAP Applications.
82
+
-`real_time_protection_enabled = false`. Real-time protection is off in passive mode, which is the default mode and prevents real-time IO interception.
83
+
-`automatic_definition_update_enabled = true`
84
+
-`definition_status = "up_to_date"`. Run a manual update if a new value is identified.
85
+
-`edr_early_preview_enabled = "disabled"`. If enabled on SAP systems it might lead to system instability.
86
+
-`conflicting_applications = [ ]`. Other AV or security software installed on a VM such as Clam.
87
+
-`supplementary_events_subsystem = "ebpf"`. Don't proceed if ebpf isn't displayed. Contact the security admin team.
86
88
87
89
This article has some useful hints on troubleshooting installation issues for Microsoft Defender for Endpoint:
88
90
[Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md#installation-failed)
0 commit comments