You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-whatsnew.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,9 +31,9 @@ search.appverid: met150
31
31
This article is updated frequently to let you know what's new in the latest releases of Microsoft Defender for Endpoint on Linux.
32
32
33
33
> [!IMPORTANT]
34
-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support has been available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF is not supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
34
+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology. This change allows for better performance, reduced resource consumption, and overall improved stability. eBPF support has been available since August 2023, and is fully integrated into all updates of Defender for Endpoint on Linux (version `101.23082.0006` and later). We strongly encourage you to adopt the eBPF build, as it provides significant enhancements over Auditd. If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, you have the following options:
35
35
>
36
-
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build will continue to be supported for several months, so you have time to plan and execute your migration to eBPF.
36
+
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build continues to be supported for several months, so you have time to plan and execute your migration to eBPF.
37
37
>
38
38
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. In the event of a fallback, all process operations continue to flow seamlessly.
39
39
>
@@ -55,7 +55,7 @@ This article is updated frequently to let you know what's new in the latest rele
55
55
56
56
#### What's new
57
57
58
-
- The default engine version has been updated to 1.1.24080.11, and the default signature version has been updated to 1.419.351.0.
58
+
- The default engine version has been updated to `1.1.24080.11`, and the default signature version has been updated to `1.419.351.0`.
59
59
60
60
- Improved the reporting of command-line threat information for short lived processes on the security portal.
61
61
@@ -71,9 +71,9 @@ This article is updated frequently to let you know what's new in the latest rele
71
71
72
72
#### What's new
73
73
74
-
- To support hardened installations with non-executable`/var` partitions, mdatp AV definitions will now install to `/opt/microsoft/mdatp/definitions.noindex` instead of `/var` if the latter is detected as non-executable. During upgrades, the installer will attempt to migrate older definitions to the new path upon detecting a non-executable`/var`, unless it finds that the path has already been customized (using `mdatp definitions path set`).
74
+
- To support hardened installations with nonexecutable`/var` partitions, mdatp antivirus definitions will now install to `/opt/microsoft/mdatp/definitions.noindex` instead of `/var` if the latter is detected as nonexecutable. During upgrades, the installer attempts to migrate older definitions to the new path upon detecting a nonexecutable`/var`, unless it finds that the path has already been customized (using `mdatp definitions path set`).
75
75
76
-
- Beginning with this version, Defender for Endpoint on Linux no longer needs executable permissions for `/var/log`. If these permissions are not available, log files are automatically redirected to `/opt`.
76
+
- Beginning with this version, Defender for Endpoint on Linux no longer needs executable permissions for `/var/log`. If these permissions aren't available, log files are automatically redirected to `/opt`.
@@ -87,7 +87,7 @@ This article is updated frequently to let you know what's new in the latest rele
87
87
88
88
#### What's new
89
89
90
-
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have completely transitioned to eBPF. If you disable eBPF, or in the event eBPF is not supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Netlink as a fallback supplementary event provider. Netlink provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more details, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
90
+
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Netlink as a fallback supplementary event provider. Netlink provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
91
91
- Stability and performance improvements
92
92
- Other bug fixes
93
93
@@ -120,7 +120,7 @@ This article is updated frequently to let you know what's new in the latest rele
120
120
121
121
There are multiple fixes and new changes in this release.
122
122
123
-
- Fixes bug in which infected command-line threat information was not showing correctly in security portal.
123
+
- Fixes bug in which infected command-line threat information wasn't showing correctly in security portal.
124
124
- Fixes a bug where disabling a preview feature required a Defender of Endpoint to disable it.
125
125
- Global Exclusions feature using managed JSON is now in Public Preview. available in insiders slow from 101.23092.0012. For more information, see [linux-exclusions](linux-exclusions.md).
126
126
- Updated the Linux default engine version to 1.1.24050.7 and default signature version to 1.411.410.0.
@@ -141,7 +141,7 @@ There are multiple fixes and new changes in this release.
141
141
142
142
There are multiple fixes and new changes in this release.
143
143
144
-
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only impacted the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Please update to the latest MDE version to avoid any impact.
144
+
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only impacted the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Update to the latest MDE version to avoid any impact.
145
145
- We have now simplified the output of `mdatp health --detail features`
146
146
- Stability and performance improvements.
147
147
- Other bug fixes.
@@ -178,7 +178,7 @@ There are multiple fixes and new changes in this release:
178
178
179
179
There are multiple fixes and new changes in this release:
180
180
181
-
- In passive and on-demand modes, antivirus engine remains in idle state and is used only during scheduled custom scans. Thus as part of performance improvements, we have made changes to keep the AV engine down in passive and on-demand mode except during scheduled custom scans. If the real time protection is enabled, antivirus engine will always be up and running. This will have no impact on your server protection in any mode.
181
+
- In passive and on-demand modes, antivirus engine remains in idle state and is used only during scheduled custom scans. Thus as part of performance improvements, we have made changes to keep the AV engine down in passive and on-demand mode except during scheduled custom scans. If the real time protection is enabled, antivirus engine will always be up and running. This has no impact on your server protection in any mode.
182
182
183
183
To keep users informed of the state of antivirus engine, we have introduced a new field called "engine_load_status" as part of MDATP health. It indicates whether antivirus engine is currently running or not.
184
184
@@ -218,7 +218,7 @@ There are multiple fixes and new changes in this release:
218
218
219
219
There are multiple fixes and new changes in this release:
220
220
221
-
- The addition of a new log file - `microsoft_defender_scan_skip.log`. This will log the filenames that were skipped from various antivirus scans by Microsoft Defender for Endpoint due to any reason.
221
+
- The addition of a new log file - `microsoft_defender_scan_skip.log`. This logs the filenames that were skipped from various antivirus scans by Microsoft Defender for Endpoint due to any reason.
222
222
- Stability and performance improvements.
223
223
- Bug fixes.
224
224
@@ -267,7 +267,7 @@ There are multiple fixes and new changes in this release:
267
267
| Alma 8.4 and higher | Insiders Slow |https://packages.microsoft.com/config/alma/8/insiders-slow.repo|
268
268
| Alma 9.2 and higher | Insiders Slow |https://packages.microsoft.com/config/alma/9/insiders-slow.repo|
269
269
270
-
If you already have Defender for Endpoint running on any of these distros and facing any issues in the older versions, please upgrade to the latest Defender for Endpoint version from the corresponding ring mentioned above. Refer our [public deployment docs](comprehensive-guidance-on-linux-deployment.md) for more details.
270
+
If you already have Defender for Endpoint running on any of these distros and facing any issues in the older versions, upgrade to the latest Defender for Endpoint version from the corresponding ring mentioned above. Refer our [public deployment docs](comprehensive-guidance-on-linux-deployment.md) for more details.
0 commit comments