Skip to content

Commit e2f1511

Browse files
Merge pull request #4151 from rutujadangemicrosoft/docs-editor/linux-exclusions-1749145799
Update linux-exclusions.md
2 parents d61ac74 + d223f29 commit e2f1511

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provide and validate exclusions for Microsoft Defender for Endpoint
44
ms.service: defender-endpoint
55
ms.author: ewalsh
66
author: emmwalshh
7-
ms.reviewer: gopkr, ardeshmukh
7+
ms.reviewer: ratujdange, ardeshmukh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 03/28/2025
18+
ms.date: 06/06/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -32,7 +32,7 @@ ms.date: 03/28/2025
3232
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
3333

3434
> [!IMPORTANT]
35-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not to endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Global exclusions described in this section apply to antivirus **and** endpoint detection and response capabilities, thus stopping all associated antivirus protection, EDR alerts, and detections. Global exclusions are currently in public preview, and are available in Defender for Endpoint version `101.23092.0012` or later, in the Insiders Slow and Production rings. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
35+
> The antivirus exclusions described in this article apply to only antivirus capabilities, and not to endpoint detection and response (EDR). Files that you exclude by using the antivirus exclusions described in this article can still result in EDR alerts and other detections. Global exclusions described in this section apply to antivirus and EDR capabilities, thus stopping all associated antivirus protection, EDR alerts, and detections. Global exclusions are available in production for Defender for Endpoint on Linux, version `101.23092.0012` or later. For EDR-only exclusions, [contact support](/microsoft-365/admin/get-help-support).
3636
3737
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
3838

@@ -87,7 +87,7 @@ Wildcard|Description|Examples|
8787
8888
## How to configure the list of exclusions
8989

90-
You can configure exclusions using a management Json configuration, Defender for Endpoint security settings management, or the command line.
90+
You can configure exclusions using a management JSON configuration, Defender for Endpoint security settings management, or the command line.
9191

9292
### Using the management console
9393

@@ -141,7 +141,6 @@ In enterprise environments, exclusions can also be managed through a configurati
141141
### Using Defender for Endpoint security settings management
142142

143143
> [!NOTE]
144-
> This method is currently in private Preview. To enable this feature, please reach out to [email protected].
145144
> Make sure to review the prerequisites: [Defender for Endpoint security settings management prerequisites](/mem/intune/protect/mde-security-integration#prerequisites)
146145
147146
You can use the Microsoft Intune admin center or the Microsoft Defender portal to manage exclusions as endpoint security policies and assign those policies to Microsoft Entra ID groups. If you're using this method for the first time, make sure to complete the following steps:

0 commit comments

Comments
 (0)