Skip to content

Commit dafc177

Browse files
committed
adding include
1 parent 281acd9 commit dafc177

7 files changed

+13
-0
lines changed

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ You can deploy [Defender for Endpoint on Linux](microsoft-defender-endpoint-linu
3636

3737
To use another method, refer to the [See also](#see-also) section.
3838

39+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
40+
3941
## Prerequisites
4042

4143
Before you get started, see [Prerequisites for Defender for Endpoint on Linux](mde-linux-prerequisites.md) for a description of prerequisites and system requirements.

defender-endpoint/linux-exclusions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ Exclusions can be useful to avoid incorrect detections on files or software that
4141
> [!WARNING]
4242
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
4343
44+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
45+
4446
## Supported exclusion scopes
4547

4648
As described in an earlier section, we support two exclusion scopes: antivirus (`epp`) and global (`global`) exclusions.

defender-endpoint/linux-install-with-ansible.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ ms.date: 04/10/2025
3131
3232
You can deploy [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) by using a variety of tools and methods. This article describes how to deploy Defender for Endpoint on Linux using Ansible. To use another method, refer to the [See also](#see-also) section.
3333

34+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
35+
3436
A successful deployment requires the completion of all of the following tasks:
3537

3638
- [Prerequisites and system requirements](#prerequisites-and-system-requirements-applicable-to-both-the-methods)

defender-endpoint/linux-install-with-puppet.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ ms.date: 04/10/2025
3131
3232
You can deploy [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) by using a variety of tools and methods. This article describes how to deploy Defender for Endpoint on Linux using Puppet. To use another method, refer to the [See also](#see-also) section.
3333

34+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
3435

3536
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
3637

defender-endpoint/linux-installer-script.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ You can deploy [Defender for Endpoint on Linux](microsoft-defender-endpoint-linu
3333

3434
To use another method, refer to the [See also](#see-also) section.
3535

36+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
37+
3638
## Prerequisites and system requirements
3739

3840
Before you get started, see [Prerequisites for Defender for Endpoint on Linux](mde-linux-prerequisites.md) for a description of prerequisites and system requirements.

defender-endpoint/linux-preferences.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ Microsoft Defender for Endpoint on Linux includes antivirus, anti-malware protec
4444
| 7. Deploy updates. | Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. <br/><br/>See [Deploy updates for Microsoft Defender for Endpoint on Linux](linux-updates.md). |
4545
| 8. Configure network protection (preview) | Network protection helps prevent employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet. <br/><br/>See [Network protection for Linux](network-protection-linux.md). |
4646

47+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
48+
4749
## Options for configuring security settings
4850

4951
To configure your security settings in Defender for Endpoint on Linux, you have two main options:

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ This article lists hardware and software requirements for Defender for Endpoint
3131

3232
- [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
3333

34+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
35+
3436
## License requirements
3537

3638
To onboard servers to Defender for Endpoint, server licenses are required. You can choose from the following options:

0 commit comments

Comments
 (0)