Skip to content

Commit d5d39b5

Browse files
authored
Merge branch 'main' into deniseb
2 parents b70760d + 63b5e13 commit d5d39b5

File tree

2 files changed

+44
-39
lines changed

2 files changed

+44
-39
lines changed

defender-endpoint/mde-plugin-wsl.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ ms.localizationpriority: medium
1111
ms.collection:
1212
- m365-security
1313
- tier2
14+
ms.custom:
15+
- partner-contribution
1416
audience: ITPro
1517
ms.date: 04/25/2024
1618
search.appverid: MET150
@@ -26,13 +28,11 @@ The Windows Subsystem for Linux (WSL) 2, which replaces the previous version of
2628

2729
Be aware of the following before you start:
2830

29-
1. The plug-in doesn't yet automatically update. When a new plug-in version is released, the new MSI package needs to be applied to perform the update. You can apply the new package by using any tool that deploys software. Updates are coming soon through Microsoft Update. If preferred, you can continue to use the MSI package method.
31+
1. The plug-in does not currently support automatic updates. When a new version is released, a new MSI package needs to be applied to perform the update. This can be done through any of the software deployment tools. Updates will come through Microsoft updates.
3032

3133
2. As it takes a few minutes for the plug-in to fully instantiate and up to 30 minutes for a WSL2 instance to onboard itself, short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once a (any) distribution has been running long enough (at least 30 minutes), it does show up.
3234

33-
3. If you're using a proxy in your (test) environment, make sure that the plug-in is set up to use it correctly. WSL is typically not automatically configured to use a proxy. For more information, see the section, [Setting a proxy for Defender running in WSL](#setting-a-proxy-for-defender-running-in-wsl).
34-
35-
4. The use of a custom kernel in combination with the plug-in isn't supported. When you attempt to launch WSL with the plugin installed, you'll encounter the error *A fatal error was returned by plugin 'DefenderforEndpointPlug-in'. Error message: 'Custom Kernel/Configuration not supported.'*.
35+
3. The use of a custom kernel in combination with the plug-in isn't supported. When you attempt to launch WSL with the plugin installed, you'll encounter the error *A fatal error was returned by plugin 'DefenderforEndpointPlug-in'. Error message: 'Custom Kernel/Configuration not supported.'*.
3636

3737
## Software prerequisites
3838

@@ -42,7 +42,7 @@ Be aware of the following before you start:
4242

4343
- Defender for Endpoint must be onboarded and running on the Windows host OS.
4444

45-
- The host OS must be running Windows 10, version 2004 and higher (build 19044 and higher) or Windows 11 to support the Windows Subsystem for Linux versions that can work with the plug-in.
45+
- The host OS must be running Windows 10 Client, version 2004 and higher (build 19044 and higher) or Windows 11 Client to support the Windows Subsystem for Linux versions that can work with the plug-in.
4646

4747
## Software components and installer file names
4848

@@ -68,19 +68,20 @@ If your Windows Subsystem for Linux isn't installed yet, follow these steps:
6868

6969
2. Run the command `wsl -–install`.
7070

71-
### Confirm WSL is installed and running
71+
### 1. Confirm WSL is installed and running
72+
73+
1. Using Terminal or Command Prompt, run `wsl –update` to make sure you have the latest version.
7274

73-
1. Using Terminal or Command Prompt, run `wsl –update` to make sure you have the latest version.
75+
2. Run the `wsl` command to ensure WSL is running before testing.
7476

75-
2. Run the `wsl` command to ensure WSL is running before testing.
77+
### 2. Install the plug-in
7678

77-
### Install the plug-in
7879

79-
After WSL is running and fully up to date, follow these steps to install the plug-in:
80+
After WSL is running and fully up to date, follow these steps to install the plug-in:
8081

81-
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**.)
82+
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**.)
8283

83-
2. Open a command prompt/terminal and run `wsl`.
84+
2. Open a command prompt/terminal and run `wsl`.
8485

8586
You can [deploy the package using Microsoft Intune](/mem/intune/apps/lob-apps-windows).
8687

@@ -108,11 +109,11 @@ After WSL is running and fully up to date, follow these steps to install the plu
108109

109110
This section describes how to configure proxy connectivity for the Defender for Endpoint plug-in. If your enterprise uses a proxy to provide connectivity to Defender for Endpoint running on the Windows host, continue reading to determine whether you need to configure it for the plug-in.
110111

111-
Reuse the Defender for Endpoint static proxy setting (`TelemetryProxyServer`).
112+
If you want to use the host [windows EDR telemetry proxy](configure-proxy-internet.md) configuration for MDE for the WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
112113

113-
If you want to use the host [static proxy](configure-proxy-internet.md) configuration for MDE for the WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
114+
If you want to use the host [winhttp proxy](/defender-endpoint/configure-proxy-internet#configure-the-proxy-server-manually-using-netsh-command) configuration for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
114115

115-
If you want to use the host network and network proxy setting for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
116+
If you want to use the host [network and network proxy setting](https://support.microsoft.com/windows/use-a-proxy-server-in-windows-03096c53-0554-4ffe-b6ab-8b1deee8dae1#ID0EFD=Windows_11&preserve-view=true) for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
116117

117118
## Plug-in Proxy selection
118119

@@ -126,6 +127,9 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
126127

127128
Example: If your host machine has both *Winhttp proxy* and *Network & Internet proxy*, the plug-in selects `Winhttp proxy` as the proxy configuration.
128129

130+
> [!NOTE]
131+
> The `DefenderProxyServer` registry key is no longer supported. Follow the above mentioned steps to configure proxy in plug-in.
132+
129133
## Connectivity test for Defender running in WSL
130134

131135
The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.

defender-vulnerability-management/tvm-supported-os.md

Lines changed: 25 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Ensure that you meet the operating system or platform requisites fo
44
ms.service: defender-vuln-mgmt
55
ms.author: siosulli
66
author: siosulli
7+
ms.reviewer: yongrhee
78
ms.localizationpriority: medium
89
manager: dansimp
910
audience: ITPro
@@ -12,7 +13,7 @@ ms.collection:
1213
- Tier2
1314
ms.topic: conceptual
1415
search.appverid: met150
15-
ms.date: 03/04/2022
16+
ms.date: 04/26/2024
1617
---
1718

1819
# Supported operating systems, platforms and capabilities
@@ -26,29 +27,29 @@ Before you begin, ensure that you meet the following operating system or platfor
2627

2728
In the following table, "Yes" indicates that a vulnerability management capability is supported for the OS or platform on that row.
2829

29-
Supported OS or platform|OS vulnerabilities|Software product vulnerabilities|OS configuration assessment|Security controls configuration assessment|Software product configuration assessment
30-
:---|:---|:---|:---|:---|:---
31-
Windows 7|Yes|Not supported|Not supported|Not supported|Not supported
32-
Windows 8.1|Yes|Yes|Yes|Yes|Yes
33-
Windows 10, versions 1607-1703|Yes|Not supported|Not supported|Not supported|Not supported
34-
Windows 10, version 1709 or later|Yes|Yes|Yes|Yes|Yes
35-
Windows 11|Yes|Yes|Yes|Yes|Yes
36-
Windows Server 2008 R2|Yes|Yes|Yes|Yes|Yes
37-
Windows Server 2012 R2|Yes|Yes|Yes|Yes|Yes
38-
Windows Server 2016|Yes|Yes|Yes|Yes|Yes
39-
Windows Server 2019|Yes|Yes|Yes|Yes|Yes
40-
Windows Server 2022|Yes|Yes|Yes|Yes|Yes
41-
macOS 10.14 "Mojave" and above|Yes|Yes|Yes|Yes|Yes
42-
Red Hat Enterprise Linux 7.2 or higher including matching EUS releases (\* See "Important" notice below)|Yes|Yes|Yes|Yes|Yes
43-
CentOS 7.2 or higher|Yes|Yes|Yes|Yes|Yes
44-
Ubuntu 16.04 LTS or higher LTS (excluding Ubuntu Pro)|Yes|Yes|Yes|Yes|Yes
45-
Oracle Linux 7.2 or higher|Yes|Yes|Yes|Yes|Yes
46-
SUSE Linux Enterprise Server 12 or higher|Yes|Yes|Yes|Yes|Yes
47-
Linux Debian 9 or higher|Yes|Yes|Yes|Yes|Yes
48-
Fedora 33 or higher|Yes|Yes|Yes|Yes|Yes
49-
Amazon Linux 2|Yes|Yes|Yes|Yes|Yes
50-
Android 6.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
51-
iOS 12.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
30+
|Supported OS or platform|OS vulnerabilities|Software product vulnerabilities|OS configuration assessment|Security controls configuration assessment|Software product configuration assessment|
31+
|:---|:---|:---|:---|:---|:---|
32+
|Windows 7|Yes|Not supported|Not supported|Not supported|Not supported|
33+
|Windows 8.1|Yes|Yes|Yes|Yes|Yes|
34+
|Windows 10, versions 1607-1703|Yes|Not supported|Not supported|Not supported|Not supported|
35+
|Windows 10, version 1709 or later|Yes|Yes|Yes|Yes|Yes|
36+
|Windows 11|Yes|Yes|Yes|Yes|Yes|
37+
|Windows Server 2008 R2|Yes|Yes|Yes|Yes|Yes|
38+
|Windows Server 2012 R2|Yes|Yes|Yes|Yes|Yes|
39+
|Windows Server 2016|Yes|Yes|Yes|Yes|Yes|
40+
|Windows Server 2019|Yes|Yes|Yes|Yes|Yes|
41+
|Windows Server 2022|Yes|Yes|Yes|Yes|Yes|
42+
|macOS 12 "Monterey" and above|Yes|Yes|Yes|Yes|Yes|
43+
|Red Hat Enterprise Linux 7.2 or higher including matching EUS releases (\* See "Important" notice below)|Yes|Yes|Yes|Yes|Yes|
44+
|CentOS 7.2 or higher|Yes|Yes|Yes|Yes|Yes|
45+
|Ubuntu 16.04 LTS or higher LTS (excluding Ubuntu Pro)|Yes|Yes|Yes|Yes|Yes|
46+
|Oracle Linux 7.2 or higher|Yes|Yes|Yes|Yes|Yes|
47+
|SUSE Linux Enterprise Server 12 or higher|Yes|Yes|Yes|Yes|Yes|
48+
|Linux Debian 9 or higher|Yes|Yes|Yes|Yes|Yes|
49+
|Fedora 33 or higher|Yes|Yes|Yes|Yes|Yes|
50+
|Amazon Linux 2|Yes|Yes|Yes|Yes|Yes|
51+
|Android 6.0 or higher|Yes|Yes|Not supported|Not supported|Not supported|
52+
|iOS 12.0 or higher|Yes|Yes|Not supported|Not supported|Not supported|
5253

5354
> [!NOTE]
5455
> Some features are not available for down-level Operating System, check the Microsoft Defender portal for more details on supported OS.

0 commit comments

Comments
 (0)