Skip to content

Commit faa22ac

Browse files
authored
Merge branch 'main' into v-mathavale-9634357
2 parents 3b127df + 354b54e commit faa22ac

File tree

5 files changed

+36
-47
lines changed

5 files changed

+36
-47
lines changed

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,12 +38,12 @@ This article describes how to deploy Microsoft Defender for Endpoint on Linux ma
3838
- [Configure the Linux software repository](#configure-the-linux-software-repository)
3939
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma-1)
4040
- [SLES and variants](#sles-and-variants-1)
41-
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
41+
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
4242
- [Mariner](#mariner)
4343
- [Application installation](#application-installation)
4444
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
4545
- [SLES and variants](#sles-and-variants)
46-
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
46+
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
4747
- [Mariner](#mariner-1)
4848
- [Download the onboarding package](#download-the-onboarding-package)
4949
- [Client configuration](#client-configuration)

defender-endpoint/linux-install-with-puppet.md

Lines changed: 25 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 12/16/2024
18+
ms.date: 12/24/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -43,7 +43,7 @@ This article describes how to deploy Defender for Endpoint on Linux using Puppet
4343

4444
For a description of prerequisites and system requirements, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
4545

46-
In addition, for Puppet deployment, you need to be familiar with Puppet administration tasks, have Puppet configured, and know how to deploy packages. Puppet has many ways to complete the same task. These instructions assume availability of supported Puppet modules, such as *apt* to help deploy the package. Your organization might use a different workflow. Refer to the [Puppet documentation](https://puppet.com/docs) for details.
46+
In addition, for Puppet deployment, you need to be familiar with Puppet administration tasks, have Puppet configured, and know how to deploy packages. Puppet has many ways to complete the same task. These instructions assume availability of supported Puppet modules, such as *apt* to help deploy the package. Your organization might use a different workflow. For more information, see [Puppet documentation](https://puppet.com/docs).
4747

4848
## Download the onboarding package
4949

@@ -59,18 +59,7 @@ Download the onboarding package from Microsoft Defender portal.
5959

6060
:::image type="content" source="media/portal-onboarding-linux-2.png" alt-text="The option to download the onboarded package.":::
6161

62-
4. From a command prompt, verify that you have the file.
63-
64-
```bash
65-
ls -l
66-
```
67-
68-
```console
69-
total 8
70-
-rw-r--r-- 1 test staff 4984 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
71-
```
72-
73-
5. Extract the contents of the archive.
62+
4. Extract the contents of the archive.
7463

7564
```bash
7665
unzip WindowsDefenderATPOnboardingPackage.zip
@@ -111,7 +100,7 @@ You need to create a Puppet manifest for deploying Defender for Endpoint on Linu
111100
└── init.pp
112101
```
113102

114-
### Create a manifest file
103+
## Create a manifest file
115104

116105
There are two ways to create a manifest file:
117106

@@ -120,7 +109,14 @@ There are two ways to create a manifest file:
120109

121110
#### Create a manifest to deploy Defender for Endpoint using an installer script
122111

123-
Add the following content to the `install_mdatp/manifests/init.pp` file. You can also download the file directly from [GitHub](https://teams.microsoft.com/l/message/19:2c1dc910-b8b7-415a-a9fd-2cd04843b43c_cb7ab2ef-8a66-4fcf-8c66-1723507f52df@unq.gbl.spaces/1734343607885?context=%7B%22contextType%22%3A%22chat%22%7D)
112+
1. Download the installer bash script. Pull the [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) from Microsoft GitHub Repository or use the following command to download it.
113+
114+
115+
```bash
116+
wget https://raw.githubusercontent.com/microsoft/mdatp-xplat/refs/heads/master/linux/installation/mde_installer.sh /etc/puppetlabs/code/environments/production/modules/install_mdatp/files/
117+
```
118+
119+
2. Add the following content to the `install_mdatp/manifests/init.pp` file. You can also download the file directly from [GitHub](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/puppet.install_mdatp_simplified.init.pp)
124120

125121
```bash
126122

@@ -160,33 +156,14 @@ class install_mdatp (
160156
}
161157

162158
}
163-
164159
```
165-
#### Create a manifest to deploy Defender for Endpoint by configuring repositories manually
166-
167-
Defender for Endpoint on Linux can be deployed from one of the following channels:
168-
169-
- *insiders-fast*, denoted as `[channel]`
170-
- *insiders-slow*, denoted as `[channel]`
171-
- *prod*, denoted as `[channel]` using the version name (see [Linux Software Repository for Microsoft Products](/linux/packages))
172-
173-
Each channel corresponds to a Linux software repository.
160+
>[!NOTE]
161+
>Installer script also supports other parameters such as channel, realtime protection, version, etc. To select from the list of available options, check help.
162+
>`./mde_installer.sh --help`
174163
175-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow*, and lastly by *prod*.
176-
177-
In order to preview new features and provide early feedback, we recommend that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
178-
179-
> [!WARNING]
180-
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
181-
182-
Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
183-
184-
In the below commands, replace *[distro]* and *[version]* with the information you've identified:
185-
186-
> [!NOTE]
187-
> In case of RedHat, Oracle Linux, Amazon Linux 2, and CentOS 8, replace *[distro]* with 'rhel'.
164+
#### Create a manifest to deploy Defender for Endpoint by configuring repositories manually
188165

189-
Add the following content to the `install_mdatp/manifests/init.pp` file:
166+
Add the following content to the `install_mdatp/manifests/init.pp` file. You can also download it from [GitHub](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/third_party_installation_playbooks/puppet.install_mdatp_manual.init.pp).
190167

191168
```bash
192169
# Puppet manifest to install Microsoft Defender for Endpoint on Linux.
@@ -286,6 +263,14 @@ class install_mdatp (
286263

287264
```
288265
266+
> [!NOTE]
267+
> Defender for Endpoint on Linux can be deployed from one of the following channels: **insiders-fast, insiders-slow, prod**. Each channel corresponds to a Linux software repository. The choice of the channel determines the type and frequency of the updates that are offered to your device. Devices in `insiders-fast` are the first ones to receive updates and new features in preview, followed by `insiders-slow`, and lastly by `prod`.
268+
>
269+
> Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/[version]`.
270+
271+
> [!Warning]
272+
> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
273+
289274
## Include the manifest inside the site.pp file
290275
291276
Include the manifest described earlier in this article in your `site.pp` file:

defender-for-iot/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ The suggested sites list now shows all relevant sites that match the search crit
3030

3131
:::image type="content" source="media/set-up-sites/site-security-associate-group.png" alt-text="Screenshot showing the associate devices screen and the suggested list of OT devices per location with the Group column in the site set-up page of Microsoft Defender for IoT in the Microsoft Defender portal." lightbox="media/set-up-sites/site-security-associate-group.png":::
3232

33+
For more information, see [Associate devices](set-up-sites.md#associate-devices).
34+
3335
## November 2024
3436

3537
|Service area |Updates |

defender-office-365/safe-links-about.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
f1_keywords:
1111
- '197503'
12-
ms.date: 10/22/2024
12+
ms.date: 12/24/2024
1313
ms.localizationpriority: medium
1414
ms.collection:
1515
- Strat_O365_IP
@@ -62,7 +62,7 @@ Safe Links protection by Safe Links policies is available in the following locat
6262
> - Safe Links ignores S/MIME signed messages.
6363
> - Safe Links no longer wraps URLs pointing to SharePoint or OneDrive sites, but the URLs are still processed by the Safe Links service. This change doesn't degrade protection. Instead, it improves the performance of loading SharePoint or OneDrive URLs.
6464
> - Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
65-
65+
6666
- **Microsoft Teams**: Safe Links protection for links in Teams conversations, group chats, or from channels.
6767

6868
For more information about Safe Links protection in Teams, see the [Safe Links settings for Microsoft Teams](#safe-links-settings-for-microsoft-teams) section later in this article.
@@ -108,6 +108,8 @@ You can use a condition or exception only once, but the condition or exception c
108108

109109
Safe Links scans incoming email for known malicious hyperlinks. Scanned URLs are rewritten or _wrapped_ using the Microsoft standard URL prefix: `https://<DataCenterLocation>.safelinks.protection.outlook.com` (for example, `https://nam01.safelinks.protection.outlook.com`). After the link is rewritten, it's analyzed for potentially malicious content.
110110

111+
Safe Links rewrites URLs without altering their appearance in the standard email view. However, these rewritten URLs can be seen by viewing the email's source code. This process ensures secure links, protecting against potential threats while maintaining readability and integrity in the normal email view. When a user hovers over a URL, a pop-up message will display the original URL, indicating that it has been scanned by Safe Links. In plain text format emails, the Safe Links URLs will be directly visible within the content.
112+
111113
After Safe Links rewrites a URL, the URL is rewritten even if the message is _manually_ forwarded or replied to. Wrapping is done per message recipient (both internal and external recipients). Additional links that are added to the forwarded or replied-to message are also rewritten.
112114

113115
For _automatic_ forwarding by Inbox rules or SMTP forwarding, the URL isn't rewritten in the message that's intended for the final recipient _unless_ one of the following statements is true:

defender-xdr/configure-attack-disruption.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 07/18/2024
12+
ms.date: 12/24/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -40,7 +40,7 @@ Then, after you're all set up, you can view and manage containment actions in In
4040
|Requirement|Details|
4141
|---|---|
4242
|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5 or A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Windows 10 Enterprise E5 or A5</li><li>Windows 11 Enterprise E5 or A5</li><li>Enterprise Mobility + Security (EMS) E5 or A5</li><li>Office 365 E5 or A5</li><li>Microsoft Defender for Endpoint (Plan 2)</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Defender for Office 365 (Plan 2)</li><li>Microsoft Defender for Business</li></ul> <p> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
43-
|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for Endpoint's device discovery is set to 'standard discovery'</li></ul>|
43+
|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for Endpoint's device discovery is set to 'standard discovery' (prerequisite for the automatic initiation of the "Contain Device" action)</li></ul>|
4444
|Permissions|To configure automatic attack disruption capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
4545

4646
### Microsoft Defender for Endpoint Prerequisites
@@ -53,7 +53,7 @@ The Minimum Sense Agent version required for the **Contain User** action to work
5353
5454
#### Automation setting for your organizations devices
5555

56-
Review the configured automation level for your device group policies, wWhether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings. You must be a global administrator or security administrator to perform the following procedure:
56+
Review the configured automation level for your device group policies, whether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings. You must be a global administrator or security administrator to perform the following procedure:
5757

5858
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
5959

0 commit comments

Comments
 (0)