Skip to content

Commit ee3560a

Browse files
authored
Merge branch 'public' into user/kvitta/networking_logs2
2 parents fb31399 + 9337bab commit ee3560a

23 files changed

+83
-94
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -543,7 +543,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
543543
This rule blocks processes created through [PsExec](/sysinternals/downloads/psexec) and [WMI](/windows/win32/wmisdk/about-wmi) from running. Both PsExec and WMI can remotely execute code. There's a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network.
544544

545545
> [!WARNING]
546-
> Only use this rule if you're managing your devices with [Intune](/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
546+
> Only use this rule if you're managing your devices with [Intune](/mem/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
547547
548548
Intune name: `Process creation from PSExec and WMI commands`
549549

defender-endpoint/behavioral-blocking-containment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following image shows an example of an alert that was triggered by behaviora
6262

6363
- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus isn't the primary antivirus solution. (EDR in block mode isn't enabled by default; you turn it on at Microsoft Defender XDR.)
6464

65-
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap).
65+
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=Microsoft%20365).
6666

6767
## Examples of behavioral blocking and containment in action
6868

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Use the following steps to check the network connectivity of Microsoft Defender
102102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
103103

104104
> [!NOTE]
105-
> - It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106106
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107107
108108
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).

defender-endpoint/edr-detection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 01/15/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -54,11 +54,11 @@ powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionP
5454

5555
### Linux
5656

57-
1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
57+
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server
5858

5959

6060
```bash
61-
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
61+
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6262
```
6363

6464
1. Extract the zip

defender-endpoint/linux-install-manually.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -42,7 +42,7 @@ This article describes how to deploy Microsoft Defender for Endpoint on Linux ma
4242
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
4343
- [Mariner](#mariner)
4444
- [Application installation](#application-installation)
45-
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
45+
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
4646
- [SLES and variants](#sles-and-variants)
4747
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
4848
- [Mariner](#mariner-1)
@@ -58,9 +58,9 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
5858
5959
## Configure the Linux software repository
6060

61-
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
61+
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted as *[channel]*): *insiders-fast*, *insiders-slow*, or `prod`. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
6262

63-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
63+
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by `prod`.
6464

6565
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
6666

@@ -91,7 +91,7 @@ Options:
9191

9292
Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation).
9393

94-
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)
94+
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
9595

9696
- Install `yum-utils` if it isn't installed yet:
9797

@@ -128,7 +128,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
128128
> [!TIP]
129129
> Use hostnamectl command to identify system related information including release *[version]*.
130130
131-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
131+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
132132

133133
```bash
134134
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
@@ -160,7 +160,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
160160
> [!TIP]
161161
> Use SPident command to identify system related information including release *[version]*.
162162
163-
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
163+
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
164164

165165
```bash
166166
sudo zypper addrepo -c -f -n microsoft-prod https://packages.microsoft.com/config/sles/12/prod.repo
@@ -198,7 +198,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
198198
> [!TIP]
199199
> Use hostnamectl command to identify system related information including release *[version]*.
200200
201-
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
201+
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
202202

203203
```bash
204204
curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
@@ -210,7 +210,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
210210
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
211211
```
212212

213-
For example, if you chose *prod* channel:
213+
For example, if you chose `prod` channel:
214214

215215
```bash
216216
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
@@ -263,7 +263,7 @@ curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | su
263263
> [!NOTE]
264264
> On Mariner, Insider Fast Channel is not available.
265265
266-
If you want to deploy Defender for Endpoint on Linux from the *prod* channel. Use the following commands
266+
If you want to deploy Defender for Endpoint on Linux from the `prod` channel. Use the following commands
267267

268268
```bash
269269
sudo dnf install mariner-repos-extras
@@ -476,7 +476,7 @@ Download the onboarding package from Microsoft Defender portal.
476476
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
477477
```
478478
479-
- You can run additional detection tests on zip files using either of the following commands:
479+
- You can run more detection tests on zip files using either of the following commands:
480480
481481
```bash
482482
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
@@ -493,7 +493,7 @@ Download the onboarding package from Microsoft Defender portal.
493493
494494
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
495495
496-
- Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
496+
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
497497
498498
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
499499
@@ -503,16 +503,16 @@ Download the onboarding package from Microsoft Defender portal.
503503
504504
The following external package dependencies exist for the mdatp package:
505505
506-
- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"
507-
- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"
508-
- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"
509-
- For Mariner the mdatp package requires "attr", "audit", "diffutils", "libacl", "libattr", "libselinux-utils", "selinux-policy", "policycoreutils", "mde-netfilter"
506+
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
507+
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
508+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
509+
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
510510
511511
The mde-netfilter package also has the following package dependencies:
512512
513-
- For DEBIAN, the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"
514-
- For RPM, the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
515-
- For Mariner, the mde-netfilter package requires "libnfnetlink", "libnetfilter_queue"
513+
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1`, `libglib2.0-0`
514+
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
515+
- For Mariner, the mde-netfilter package requires `libnfnetlink`, `libnetfilter_queue`
516516
517517
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
518518
@@ -523,7 +523,7 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
523523
524524
## How to migrate from Insiders-Fast to Production channel
525525
526-
1. Uninstall the "Insiders-Fast channel" version of Defender for Endpoint on Linux.
526+
1. Uninstall the `Insiders-Fast channel` version of Defender for Endpoint on Linux.
527527
528528
```bash
529529
sudo yum remove mdatp
@@ -536,13 +536,13 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
536536
```
537537
538538
> [!NOTE]
539-
> The output should show "packages-microsoft-com-fast-prod".
539+
> The output should show `packages-microsoft-com-fast-prod`.
540540
541541
```bash
542542
sudo yum-config-manager --disable packages-microsoft-com-fast-prod
543543
```
544544
545-
1. Redeploy Microsoft Defender for Endpoint on Linux using the "Production channel".
545+
1. Redeploy Microsoft Defender for Endpoint on Linux using the Production channel.
546546
547547
## Uninstallation
548548

defender-endpoint/linux-whatsnew.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,6 @@ This article is updated frequently to let you know what's new in the latest rele
5050
There are multiple fixes and new changes in this release.
5151

5252
- Fixes bug in which infected command-line threat information was not showing correctly in security portal.
53-
- Fixes a memory leak issue in kernel space due to ebpf maps and progs not getting closed/unloaded whenever ebpf sensor is reloaded. Impacts kernels 3.10x and <= 4.16x.
5453
- Fixes a bug where disabling a preview feature required a Defender of Endpoint to disable it.
5554
- Global Exclusions feature using managed JSON is now in Public Preview. available in insiders slow from 101.23092.0012. For more information, see [linux-exclusions](linux-exclusions.md).
5655
- Updated the Linux default engine version to 1.1.24050.7 and default sigs Version to 1.411.410.0.

0 commit comments

Comments
 (0)