Skip to content

Commit e69b882

Browse files
Merge pull request #3165 from MicrosoftDocs/main
Publish main to live, 03/18, 11:00 AM IST
2 parents ff082b6 + 73523bd commit e69b882

File tree

62 files changed

+239
-205
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+239
-205
lines changed

defender-endpoint/application-deployment-via-mecm.md

Lines changed: 51 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -13,104 +13,120 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
ms.topic: conceptual
16-
ms.date: 06/27/2022
16+
ms.date: 03/14/2025
1717
---
1818

1919
# Migrating servers from Microsoft Monitoring Agent to the unified solution
2020

2121
**Applies to:**
2222

23-
- Windows Server 2012 R2
24-
- Windows Server 2016
23+
- Microsoft Defender for Endpoint for servers
24+
- Microsoft Defender for Servers Plan 1 or Plan 2
2525

26-
This article guides you in migrating down-level servers from Microsoft Monitoring Agent (MMA) to the unified solution.
26+
This article guides you in migrating servers running Windows Server 2016 or Windows Server 2012 R2 from Microsoft Monitoring Agent (MMA) to the modern, unified solution. In this article, the phrase *down-level servers* refers to older versions of Windows Server, such as Windows Server 2016 and Windows Server 2012 R2.
2727

2828
## Prerequisites
2929

30-
- Microsoft Endpoint Configuration Manager (MECM) higher than 2207.
30+
- Microsoft Configuration Manager higher than 2207.
3131
- Down-level OS devices in your environment onboarded with Microsoft Monitoring Agent. To confirm, verify that `MsSenseS.exe` is running in Task Manager.
3232
- Presence of the MMA agent. You can verify it by checking if the correct Workspace ID is present in the Control Panel> Microsoft Monitoring Agent.
3333
- Active Microsoft Defender portal with devices onboarded.
34-
- A **Device Collection** containing down-level servers such as Windows Server 2012 R2 or Windows Server 2016 using MMA agent is set up in your MECM instance.
34+
- A **Device Collection** containing down-level servers such as Windows Server 2012 R2 or Windows Server 2016 using MMA agent is set up in your Configuration Manager instance.
3535

36-
For more information on installing the listed prerequisites, see [related topics](#related-topics) section.
36+
For more information on installing the listed prerequisites, see [related articles](#related-articles) section.
3737

3838
## Gather required files
3939

40-
Copy the unified solution package, onboarding script and migration script to the same content source you deploy other apps with MECM.
40+
Copy the unified solution package, onboarding script, and migration script to the same content source you deploy other apps with Configuration Manager.
41+
42+
1. Download Onboarding Script and the unified solution from [Microsoft Defender portal settings page](https://sip.security.microsoft.com/preferences2/onboarding).
4143

42-
1. Download Onboarding Script and the unified solution from [Microsoft Defender XDR settings page](https://sip.security.microsoft.com/preferences2/onboarding).
4344
:::image type="content" source="media/onboarding-script.png" alt-text="Screenshot of onboarding script and unified solution download" lightbox="media/onboarding-script.png":::
45+
4446
> [!Note]
4547
> You must select the Group Policy from the Deployment method dropdown to obtain the .cmd file.
48+
4649
2. Download the migration script from the document: [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](server-migration.md). This script can also be found on GitHub: [GitHub - microsoft/mdefordownlevelserver](https://github.com/microsoft/mdefordownlevelserver).
47-
3. Save all three files in a shared folder used by MECM as a Software Source.
4850

49-
:::image type="content" source="media/ua-migration.png" alt-text="Screenshot of saving the shared folder by MECM.":::
51+
3. Save all three files in a shared folder used by Configuration Manager as a Software Source.
52+
53+
:::image type="content" source="media/ua-migration.png" alt-text="Screenshot of saving the shared folder by Configuration Manager.":::
5054

5155
## Create the package as an application
5256

53-
1. In the MECM console, follow these steps: **Software Library>Applications>Create Application**.
57+
1. In the Configuration Manager console, go to **Software Library** > **Applications** > **Create Application**.
58+
5459
2. Select **Manually specify the application information**.
5560
:::image type="content" source="media/manual-application-information.png" alt-text="Screenshot of manually specifying the application information selection." lightbox="media/manual-application-information.png":::
61+
5662
3. Select **Next** on the Software Center screen of the wizard.
57-
4. On the Deployment Types, click **Add**.
63+
64+
4. On the Deployment Types, select **Add**.
65+
5866
5. Select **Manually to specify the deployment type information** and select **Next**.
67+
5968
6. Give a name to your script deployment and select **Next**.
6069

6170
:::image type="content" source="media/manual-deployment-information.png" alt-text="Screenshot specifying the script deployment information.":::
62-
7. On this step, copy the UNC path that your content is located. Example: `\\ServerName\h$\SOFTWARE_SOURCE\path`.
71+
72+
7. Copy the UNC path that your content is located. Example: `\\ServerName\h$\SOFTWARE_SOURCE\path`.
6373

6474
:::image type="content" source="media/deployment-type-wizard.png" alt-text="Screenshot that shows UNC path copy.":::
6575

66-
8. Additionally, set the following as the installation program:
76+
8. Set the installation program by using the following command:
6777

6878
```powershell
6979
Powershell.exe -ExecutionPolicy ByPass -File install.ps1 -RemoveMMA <workspace ID> -OnboardingScript .\WindowsDefenderATPOnboardingScript.cmd
7080
```
7181
72-
Click **Next** and make sure to add your own Workspace ID in this section.
73-
9. Click **Next** and click add a clause.
74-
10. The detection method will be based on the registry key shown below.
75-
`HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense`
76-
77-
Check the option: **This registry setting must exit on the target system to indicate presence of this application.**
82+
Select **Next**, and make sure to add your own Workspace ID in this section.
7883
79-
:::image type="content" source="media/detection-wizard.png" alt-text="Screenshot that shows detection type wizard":::
84+
9. Select **Next**, and then select **add a clause**.
8085
81-
> [!TIP]
82-
> The registry key value was obtained by running the Powershell command shown below on a device that has the unified solution installed. Other creative methods of detection can also be used. The goal is to identify whether the unified solution has already been installed on a specific device. You can leave the Value and Data Type fields as blank.
86+
10. The detection method is based on this registry key: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense`.
8387
88+
Select the option: **This registry setting must exit on the target system to indicate presence of this application.**
89+
90+
:::image type="content" source="media/detection-wizard.png" alt-text="Screenshot that shows detection type wizard":::
91+
92+
> [!TIP]
93+
> The registry key value was obtained by running the following PowerShell command on a device that has the unified solution installed. Other creative methods of detection can also be used. The goal is to identify whether the unified solution has already been installed on a specific device. You can leave the Value and Data Type fields as blank.
94+
8495
```powershell
85-
get-wmiobject Win32_Product | Sort-Object -Property Name |Format-Table IdentifyingNumber, Name, LocalPackage -AutoSize
96+
get-wmiobject Win32_Product | Sort-Object -Property Name |Format-Table IdentifyingNumber, Name, LocalPackage -AutoSize
8697
```
8798
88-
11. In the **User Experience** section, check the recommended settings shown in the screenshot. You can choose what suits your environment and click **Next**. For **Installation program visibility**, it's advisable to install with **Normal** during phase testing then change it to **Minimized** for general deployment.
99+
11. In the **User Experience** section, check the recommended settings shown in the screenshot. You can choose what suits your environment, and then select **Next**.
89100
101+
For **Installation program visibility**, it's advisable to install with **Normal** during phase testing then change it to **Minimized** for general deployment.
102+
90103
> [!TIP]
91104
> The maximum allowed runtime can be lowered from (default) 120 minutes to 60 minutes.
105+
106+
:::image type="content" source="media/user-experience-in-deployment-type-wizard.png" alt-text="Screenshot that shows user experience in deployment-type wizard." lightbox="media/user-experience-in-deployment-type-wizard.png":::
92107
93-
:::image type="content" source="media/user-experience-in-deployment-type-wizard.png" alt-text="Screenshot that shows user experience in deployment-type wizard.":::
108+
12. Add any additional requirements, and then select **Next**.
94109
95-
12. Add any additional requirements then select **Next**.
96110
13. Under the Dependencies section, select **Next**.
97-
14. Select **Next** until completion screen comes up, then **Close**.
98-
15. Keep select **Next** until the completion of Application Wizard. Verify all have been green checked.
111+
112+
14. Select **Next** until completion screen comes up, and then select **Close**.
113+
114+
15. Keep selecting **Next** until the completion of Application Wizard. Verify all have been green checked.
115+
99116
16. Close the wizard, right-click on the recently created application and deploy it to your down-level-server collection. Locally, the installation can be confirmed at Software Center. For details, check the CM logs at `C:\Windows\CCM\Logs\AppEnforce.log`.
100117
101118
:::image type="content" source="media/deploy-application.png" alt-text="Screenshot that shows deployment of created application." lightbox="media/deploy-application.png":::
102119
103-
17. Verify the status of the migration at MECM > Monitoring > Deployments.
120+
17. Verify the status of the migration in Configuration Manager by going to **Monitoring** > **Deployments**.
104121
105-
:::image type="content" source="media/deployment-status.png" alt-text="Screenshot that shows deployment status check." lightbox="media/deployment-status.png":::
122+
18. Troubleshooting .ETL files are created and automatically saved locally in each server at this location `C:\Windows\ccmcache\#\`. These files can be leveraged by support to troubleshoot onboarding issues.
106123
107-
18. Troubleshooting .ETL files will be created and automatically saved locally in each server at this location `C:\Windows\ccmcache\#\`. These files can be leveraged by support to troubleshoot onboarding issues.
108-
109-
## Related topics
124+
## Related articles
110125
111126
- [Microsoft Monitoring Agent Setup](/services-hub/health/mma-setup)
112127
- [Deploy applications - Configuration Manager](/mem/configmgr/apps/deploy-use/deploy-applications)
113128
- [Microsoft Defender for Endpoint - Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)
114129
- [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md)
115130
- [Microsoft Defender for Endpoint: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292)
131+
116132
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@ ms.date: 12/10/2024
1919

2020
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
2121

22+
**Applies to:**
23+
24+
- Microsoft Defender for Endpoint for servers
25+
- Microsoft Defender for Servers Plan 1 or Plan 2
26+
2227
> [!TIP]
2328
> We are excited to share that Microsoft Defender for Endpoint on Linux now extends support for ARM64-based Linux servers in preview! For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
2429
@@ -176,7 +181,7 @@ This step of the setup process involves adding Defender for Endpoint to the excl
176181

177182
:::image type="content" source="media/mdatp-health-result.png" alt-text="Image of mdatp health result":::
178183

179-
Under "conflicting_applications", if you see a result other than "unavailable", uninstall the non-Microsoft antimalware.
184+
Under "conflicting_applications", if you see a result other than "unavailable," uninstall the non-Microsoft antimalware.
180185

181186
- If you don't uninstall the non-Microsoft antimalware product, you might encounter unexpected behaviors such as performance issues, stability issues such as systems hanging, or kernel panics.
182187

@@ -456,13 +461,13 @@ To verify Microsoft Defender for Endpoint on Linux platform updates, run the fol
456461
sudo yum update mdatp
457462
```
458463

459-
or
464+
Or
460465

461466
```bash
462467
apt-get update mdatp
463468
```
464469

465-
depending on your package manager.
470+
Depending on your package manager.
466471

467472
For more information, see [Device health and Microsoft Defender antimalware health report](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/new-device-health-reporting-for-microsoft-defender-for-endpoint/bc-p/3616205#M1963).
468473

@@ -483,7 +488,7 @@ Microsoft regularly publishes software updates to improve performance, security,
483488
With macOS and Linux, you could take a couple of systems and run in the Beta channel.
484489

485490
> [!NOTE]
486-
> Ideally you should include one of each type of Linux system you are running in the Preview channel so that you are able to find compatibility, performance and reliability issues before the build makes it into the Current channel.
491+
> Ideally you should include one of each type of Linux system you're running in the Preview channel so that you're able to find compatibility, performance, and reliability issues before the build makes it into the Current channel.
487492
488493
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in Beta are the first ones to receive updates and new features, followed later by Preview and lastly by Current.
489494

@@ -492,7 +497,7 @@ The choice of the channel determines the type and frequency of updates that are
492497
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either Beta or Preview.
493498

494499
> [!WARNING]
495-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
500+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, reconfigure your device to use the new channel, and follow the steps in this document to install the package from the new location.
496501
497502
## 18. Verify that you're able to get security intelligence updates (signatures/definition updates)
498503

@@ -512,15 +517,15 @@ To ensure that the device is correctly onboarded and reported to the service, ru
512517
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
513518
```
514519

515-
- You can run additional detection tests on zip files using either of the following commands:
520+
- You can run more detection tests on zip files using either of the following commands:
516521

517522
```bash
518523
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
519524
curl -o /tmp/eicarcom2.zip https://secure.eicar.org/eicarcom2.zip
520525
```
521526

522527
> [!NOTE]
523-
> If the detections do not show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
528+
> If the detections don't show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
524529
525530
- Endpoint detection and response (EDR) detections, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md). If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
526531

@@ -612,7 +617,7 @@ Then your next step is to uninstall your non-Microsoft antivirus, antimalware, a
612617
- [Boost protection of Linux estate with behavior monitoring](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/boost-protection-of-your-linux-estate-with-behavior-monitoring/ba-p/2909320)
613618

614619
> [!NOTE]
615-
> The behavior monitoring functionality complements existing strong content-based capabilities, however you should carefully evaluate this feature in your environment before deploying it broadly since enabling behavioral monitoring consumes more resources and may cause performance issues.
620+
> The behavior monitoring functionality complements existing strong content-based capabilities. However you should carefully evaluate this feature in your environment before deploying it broadly since enabling behavioral monitoring consumes more resources and may cause performance issues.
616621
617622
- [Unified submissions in Microsoft Defender XDR](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770)
618623

defender-endpoint/configure-endpoints-gp.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ search.appverid: met150
2727

2828
- Group Policy
2929
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
30+
- Microsoft Defender for Endpoint for servers
31+
- Microsoft Defender for Servers Plan 1 or Plan 2
3132

3233
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3334

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ ms.date: 10/31/2024
2222
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2323

2424
**Applies to:**
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender XDR](/defender-xdr)
25+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
26+
- Microsoft Defender for Endpoint for servers
27+
- Microsoft Defender for Servers Plan 1 or Plan 2
2828

2929
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

defender-endpoint/configure-endpoints-non-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ ms.date: 06/25/2024
2222

2323
**Applies to:**
2424

25-
- [Microsoft Defender XDR](/defender-xdr)
26-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
26+
- Microsoft Defender for Endpoint for servers
27+
- Microsoft Defender for Servers Plan 1 or Plan 2
2828

2929
**Platforms**
3030
- macOS

defender-endpoint/configure-endpoints-script.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,9 @@ ms.date: 02/29/2024
2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

2525
**Applies to:**
26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender XDR](/defender-xdr)
26+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
27+
- Microsoft Defender for Endpoint for servers
28+
- Microsoft Defender for Servers Plan 1 or Plan 2
2929

3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ ms.subservice: onboard
2323
**Applies to:**
2424

2525
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender XDR](/defender-xdr)
26+
- Microsoft Defender for Endpoint for servers
27+
- Microsoft Defender for Servers Plan 1 or Plan 2
2728
- Virtual desktop infrastructure (VDI) devices
2829
- Windows 11
2930
- Windows 10

defender-endpoint/configure-environment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ ms.date: 02/04/2025
2121

2222
**Applies to:**
2323

24-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender XDR](/defender-xdr)
24+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
25+
- Microsoft Defender for Endpoint for servers
26+
- Microsoft Defender for Servers Plan 1 or Plan 2
2727

2828
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2929

0 commit comments

Comments
 (0)