You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)
29
29
30
-
Before you begin: Install unzip if it's not already installed.
30
+
## Introduction
31
31
32
-
The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.
32
+
This article talks about how to deploy Defender for Endpoint on Linux at scale with chef using two methods, installer script and by manually configuring the repositories for more granular control over the deployment.
33
33
34
-
You can create a new cookbook in your existing repository by running the following command from inside the cookbooks folder that is in your chef repository:
34
+
## Prerequisites and system requirements
35
+
36
+
For a description of prerequisites and system requirements, see [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
37
+
38
+
## Download the onboarding package
39
+
40
+
Download the onboarding package from Microsoft Defender portal.
41
+
42
+
In the [Microsoft Defender portal](https://security.microsoft.com/), go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
43
+
44
+
In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Your preferred Linux configuration management tool** as the deployment method.
45
+
46
+
1. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
47
+
48
+

49
+
50
+
1. Extract the contents of the archive:
51
+
52
+
Command:
53
+
54
+
```
55
+
unzip WindowsDefenderATPOnboardingPackage.zip
56
+
```
57
+
58
+
Output:
59
+
60
+
```
61
+
Archive: WindowsDefenderATPOnboardingPackage.zip
62
+
inflating: mdatp_onboard.json
63
+
```
64
+
65
+
## Create a directory structure
66
+
67
+
Before you begin, make sure the Chef components are already installed and a Chef repository exists (chef generate repo <reponame>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.
68
+
69
+
This command creates a new folder structure for the new cookbook called mdatp. You can also use an existing cookbook if you already have one you'd like to use to add the Defender for Endpoint deployment into.
35
70
36
71
```bash
37
72
chef generate cookbook mdatp
38
73
```
39
74
40
-
This command creates a new folder structure for the new cookbook called mdatp. You can also use an existing cookbook if you already have one you'd like to use to add the Defender for Endpoint deployment into.
41
75
After the cookbook is created, create a files folder inside the cookbook folder that just got created:
42
76
43
77
```bash
44
78
mkdir mdatp/files
45
79
```
46
80
47
-
Transfer the Linux Server Onboarding zip file that can be downloaded from the Microsoft Defender portal to this new files folder.
48
-
49
-
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
81
+
Copy `mdatp_onboard.json` to the `/tmp` folder.
50
82
51
83
On the Chef Workstation, navigate to the mdatp/recipes folder. This folder is created when the cookbook was generated. Use your preferred text editor (like vi or nano) to add the following instructions to the end of the default.rb file:
52
84
53
-
- include_recipe '::onboard_mdatp'
54
85
- include_recipe '::install_mdatp'
55
86
56
87
Then save and close the default.rb file.
57
88
58
-
Next create a new recipe file named install_mdatp.rb in the recipes folder and add this text to the file:
89
+
## Create a cookbook
90
+
91
+
Cookbook can be created via two methods:
92
+
93
+
1. create a cookbook using installer script
94
+
95
+
1. create a cookbook by manually configuring repositories
96
+
97
+
### Create a cookbook using Installer script
98
+
99
+
1. Download the installer bash script. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation) from Microsoft GitHub Repository or use the following command to download it.
2. Next create a new recipe file named install_mdatp.rb in the recipes folder `~/cookbooks/mdatp/recipes/install_mdatp.rb` and add this text to the file. You can also download the file directly from [GitHub](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/chef.install_mdatp_simplified.rb)
107
+
108
+
```bash
109
+
mdatp = "/etc/opt/microsoft/mdatp"
110
+
111
+
#Download the onboarding json from tenant, keep the same at specific location
112
+
onboarding_json = "/tmp/mdatp_onboard.json"
113
+
114
+
#Download the installer script from: https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh
115
+
#Place the same at specific location, edit this if needed
>Installer script also supports other parameters such as channel, realtime protection, version, etc. To selectfrom the list of available options, check help.
130
+
>```./mde_installer.sh --help```
131
+
132
+
133
+
### Create a cookbook by manually configuring repositories
134
+
135
+
Create a new recipe file named install_mdatp.rb in the recipes folder `~/cookbooks/mdatp/recipes/install_mdatp.rb` and add this text to the file. You can also download the file directly from [Github](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/chef.install_mdatp_manual.rb)
59
136
60
137
```powershell
61
138
#Add Microsoft Defender
62
-
Repo
63
139
case node['platform_family']
64
140
when 'debian'
65
-
apt_repository 'MDAPRepo' do
141
+
apt_repository 'MDATPRepo'do
66
142
arch 'amd64'
67
143
cache_rebuild true
68
144
cookbook false
69
145
deb_src false
70
146
key 'BC528686B50D79E339D3721CEB3E94ADBE1229CF'
71
147
keyserver "keyserver.ubuntu.com"
72
-
distribution 'focal'
148
+
distribution 'jammy'
73
149
repo_name 'microsoft-prod'
74
150
components ['main']
75
-
trusted true
76
-
uri "https://packages.microsoft.com/config/ubuntu/20.04/prod"
151
+
uri "https://packages.microsoft.com/ubuntu/22.04/prod"
Make sure to update the path name to the location of the onboarding file.
121
-
To test deploy it on the Chef workstation, run ``sudo chef-client -z -o mdatp``.
122
-
After your deployment, you should consider creating and deploying a configuration file to the servers based on [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md).
123
-
After creating and testing your configuration file, you can put it into the `cookbook/mdatp/files` folder where you also placed the onboarding package. Then you can create a settings_mdatp.rb file in the mdatp/recipies folder and add this text:
124
-
125
-
```powershell
126
-
#Copy the configuration file
127
-
cookbook_file '/etc/opt/microsoft/mdatp/managed/mdatp_managed.json' do
To include this step as part of the recipe just add `include_recipe ':: settings_mdatp` to your default.rb file within the recipe folder.
190
+
>[!Note]
191
+
> You can modify the os distribution, distribution version number, channel (prod/insider-fast, insiders-slow) and repo name to match the version you're deploying to and the channel you'd like to deploy to..
192
+
Run `chef-client --local-mode --runlist 'recipe[mdatp]'` to test the cookbook on the Chef workstation.
193
+
194
+
## Troubleshoot installation issues
195
+
196
+
For self-troubleshooting, do the following
197
+
198
+
1. For information on how to find the log that's generated automatically when an installation error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
199
+
200
+
2. For information about common installation issues, see [Installation issues](/defender-endpoint/linux-support-install).
201
+
202
+
3. If health of the device is `false`, see [Defender for Endpoint agent health issues](/defender-endpoint/health-status).
203
+
204
+
4. For product performance issues, see [Troubleshoot performance issues](/defender-endpoint/linux-support-perf).
205
+
206
+
5. For proxy and connectivity issues, see [Troubleshoot cloud connectivity issues](/defender-endpoint/linux-support-connectivity).
137
207
138
-
You can also use crontab to schedule automatic updates [Schedule an update for Microsoft Defender for Endpoint on Linux](linux-update-MDE-Linux.md).
208
+
To get support from Microsoft, open a support ticket, and provide the log files created by using the [client analyzer](/defender-endpoint/run-analyzer-macos-linux).
139
209
140
-
Uninstall MDATP cookbook:
210
+
## How to configure policies for Microsoft Defender on Linux
211
+
212
+
You can configure antivirus or EDR settings on your endpoints using following methods:
213
+
214
+
- See [Set preferences for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-preferences).
215
+
- See [security settings management](/mem/intune/protect/mde-security-integration) to configure settings in the Microsoft Defender portal.
216
+
217
+
218
+
## Uninstall MDATP cookbook
219
+
220
+
To uninstall Defender, save the following as cookbook `~/cookbooks/mdatp/recipes/uninstall_mdatp.rb`.
141
221
142
222
```powershell
143
223
#Uninstall the Defender package
@@ -159,4 +239,7 @@ then
159
239
end
160
240
end
161
241
```
242
+
243
+
To include this step as part of the recipe just add `include_recipe ':: uninstall_mdatp` to your `default.rb` file within the recipe folder. Also make sure to remove the `include_recipe '::install_mdatp'` from the `default.rb` file.
244
+
162
245
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments