Skip to content

Commit ef1e56c

Browse files
committed
Corrections to spacing, indentation, and code block type
1 parent 4e3907c commit ef1e56c

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ Key benefits include:
5353
- The status of the update can be seen on the mdatp CLI.
5454

5555
:::image type="content" source="./media/offline-update-diag-1.png" alt-text="Process flow diagram on the Mirror Server for downloading the security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
56+
5657
Fig. 1: Process flow diagram on the Mirror Server for downloading the security intelligence updates
5758

5859
:::image type="content" source="./media/offline-update-diag-2.png" alt-text="Process flow diagram on the Linux endpoint for security intelligence updates" lightbox="./media/offline-update-diag-2.png":::
@@ -85,10 +86,9 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
8586
## Configuring the Mirror Server
8687

8788
> [!NOTE]
88-
> The management and ownership of the Mirror Server lies solely with the customer as it resides in the customer's private environment.
89-
90-
> [!NOTE]
91-
> The Mirror Server does not need to have Defender for Endpoint installed.
89+
> - The management and ownership of the Mirror Server lies solely with the customer as it resides in the customer's private environment.
90+
>
91+
> - The Mirror Server does not need to have Defender for Endpoint installed.
9292
9393
### Get the offline security intelligence downloader script
9494

@@ -176,24 +176,24 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
176176

177177
## Configure the Endpoints
178178

179-
- Use the following sample `mdatp_managed.json` and update the parameters as per the configuration and copy the file to the location `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`.
180-
181-
```json
182-
{
183-
"cloudService": {
184-
"automaticDefinitionUpdateEnabled": true,
185-
"definitionUpdatesInterval": 1202
186-
},
187-
"antivirusEngine": {
188-
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
189-
"offlineDefintionUpdateFallbackToCloud":false,
190-
"offlineDefinitionUpdate": "enabled"
191-
},
192-
"features": {
193-
"offlineDefinitionUpdateVerifySig": "enabled"
194-
}
195-
}
196-
```
179+
Use the following sample `mdatp_managed.json` and update the parameters as per the configuration and copy the file to the location `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`.
180+
181+
```json
182+
{
183+
"cloudService": {
184+
"automaticDefinitionUpdateEnabled": true,
185+
"definitionUpdatesInterval": 1202
186+
},
187+
"antivirusEngine": {
188+
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
189+
"offlineDefintionUpdateFallbackToCloud":false,
190+
"offlineDefinitionUpdate": "enabled"
191+
},
192+
"features": {
193+
"offlineDefinitionUpdateVerifySig": "enabled"
194+
}
195+
}
196+
```
197197

198198
| Field Name | Values | Comments |
199199
|-------------------------------------------|----------------------|-----------------------------------------------------|
@@ -217,7 +217,7 @@ mdatp health --details definitions
217217

218218
A sample output would look like the following code snippet:
219219

220-
```output
220+
```console
221221
user@vm:~$ mdatp health --details definitions
222222
automatic_definition_update_enabled : true [managed]
223223
definitions_updated : Mar 14, 2024 at 12:13:17 PM

0 commit comments

Comments
 (0)