You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+25-29Lines changed: 25 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ ms.date: 10/23/2024
31
31
This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
32
32
33
33
> [!CAUTION]
34
-
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
34
+
> Running other non-Microsoft endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
35
35
36
36
## How to install Microsoft Defender for Endpoint on Linux
37
37
@@ -43,7 +43,8 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
43
43
- Linux distribution using the [systemd](https://systemd.io/)system manager
44
44
45
45
> [!NOTE]
46
-
> Linux distribution using system manager, except for CentOS 6.x support both SystemV and Upstart.
46
+
> Linux distribution using system manager, support both SystemV and Upstart.
47
+
47
48
- Beginner-level experience in Linux and BASH scripting
48
49
- Administrative privileges on the device (for manual deployment)
49
50
@@ -52,23 +53,20 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
52
53
53
54
### Installation instructions
54
55
55
-
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
56
+
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux. Before you begin, make sure the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md) are met.
56
57
57
-
In general you need to take the following steps:
58
+
You can use one of the following methods to deploy Microsoft Defender for Endpoint on Linux:
58
59
59
-
- Ensure that you have a Microsoft Defender for Endpoint subscription.
60
-
- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
61
-
- The command-line tool:
62
-
-[Manual deployment](linux-install-manually.md)
63
-
- Third-party management tools:
64
-
-[Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
65
-
-[Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
66
-
-[Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
67
-
-[Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
68
-
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
60
+
- To use command-line tool, see [Manual deployment](linux-install-manually.md)
61
+
- To use Puppet, see [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
62
+
- To use Ansible, see [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
63
+
- To use Chef, see [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
64
+
- To use Saltstack, see [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
69
65
70
-
> [!NOTE]
71
-
> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
66
+
If you experience any installation failures, see [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
67
+
68
+
> [!IMPORTANT]
69
+
> Installing Microsoft Defender for Endpoint in any location other than the default install path is not supported.
72
70
> Microsoft Defender for Endpoint on Linux creates an `mdatp` user with random UID and GID. If you want to control the UID and GID, create an `mdatp` user prior to installation using the `/usr/sbin/nologin` shell option. Here's an example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
73
71
74
72
### System requirements
@@ -78,18 +76,18 @@ In general you need to take the following steps:
78
76
> [!NOTE]
79
77
> An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections. Please make sure that you have free disk space in /var.
80
78
81
-
- Cores: 2 minimum, 4 preferred
79
+
- Cores: Two minimum, four preferred
82
80
83
81
> [!NOTE]
84
-
> If you are on Passive or RTP ON mode, 2 Cores are minimum and 4 Cores are preferred. If you are turning on BM, then a minimum of 4 Cores is required.
82
+
> If you are on Passive or RTP ON mode, at least two Cores are required. Four Cores are preferred. If you are turning on BM, then at least four Cores are required.
85
83
86
-
- Memory: 1 GB minimum, 4 preferred
84
+
- Memory: 1 GB minimum, 4 GB preferred
87
85
88
-
- List of supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
86
+
- The following Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions are supported:
87
+
- Red Hat Enterprise Linux 6.7 or higher (In preview)
89
88
- Red Hat Enterprise Linux 7.2 or higher
90
89
- Red Hat Enterprise Linux 8.x
91
90
- Red Hat Enterprise Linux 9.x
92
-
- CentOS 6.7 or higher (In preview)
93
91
- CentOS 7.2 or higher
94
92
- Ubuntu 16.04 LTS
95
93
- Ubuntu 18.04 LTS
@@ -120,7 +118,7 @@ In general you need to take the following steps:
120
118
> [!CAUTION]
121
119
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
122
120
123
-
- List of supported filesystems for RTP, Quick, Full and Custom Scan.
121
+
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
124
122
125
123
|RTP, Quick, Full Scan| Custom Scan|
126
124
|---|---|
@@ -141,7 +139,7 @@ In general you need to take the following steps:
141
139
|`vfat`||
142
140
|`xfs`||
143
141
144
-
- Audit framework (`auditd`) must be enabled if you are using auditd as your primary event provider.
142
+
- Audit framework (`auditd`) must be enabled if you're using auditd as your primary event provider.
145
143
146
144
> [!NOTE]
147
145
> System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
@@ -150,7 +148,7 @@ In general you need to take the following steps:
150
148
151
149
### External package dependency
152
150
153
-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies. The following external package dependencies exist for the mdatp package:
151
+
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
154
152
155
153
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage``selinux-policy-targeted`, and `mde-netfilter`
156
154
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, and `mde-netfilter`
@@ -167,14 +165,14 @@ When adding exclusions to Microsoft Defender Antivirus, you should be mindful of
167
165
168
166
### Network connections
169
167
170
-
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, please reference[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
168
+
Ensure that connectivity is possible from your devices to Microsoft Defender for Endpoint cloud services. To prepare your environment, see[STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
171
169
172
170
Defender for Endpoint on Linux can connect through a proxy server by using the following discovery methods:
173
171
174
172
- Transparent proxy
175
173
- Manual static proxy configuration
176
174
177
-
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
175
+
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no another configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
178
176
179
177
> [!WARNING]
180
178
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
@@ -192,7 +190,7 @@ Guidance for how to configure the product in enterprise environments is availabl
192
190
193
191
## Common Applications to Microsoft Defender for Endpoint can impact
194
192
195
-
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
193
+
High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. Such applications for developer scenarios include Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](common-exclusion-mistakes-microsoft-defender-antivirus.md) in mind. For more guidance, consider consulting documentation regarding antivirus exclusions from non-Microsoft applications.
196
194
197
195
## Resources
198
196
@@ -201,9 +199,7 @@ High I/O workloads from certain applications can experience performance issues w
201
199
## Related articles
202
200
203
201
-[Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
204
-
205
202
-[Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
206
-
207
203
-[Turn on network protection for Linux](network-protection-linux.md)
208
204
209
205
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments