Deploy Microsoft Defender for Endpoint on Linux with Ansible 0 (0)

This article describes how to deploy Defender for Endpoint on Linux using Ansible. A successful deployment requires the completion of all of the following tasks: Download the onboarding package Create Ansible YAML files Deployment References Prerequisites and system requirements Before you get started, see the main Defender for Endpoint on Linux page for a description of prerequisites […]

Read More

Deploy Microsoft Defender for Endpoint on Linux with Puppet 0 (0)

This article describes how to deploy Defender for Endpoint on Linux using Puppet. A successful deployment requires the completion of all of the following tasks: Download the onboarding package Create Puppet manifest Deployment Check onboarding status Prerequisites and system requirements For a description of prerequisites and system requirements for the current software version, see the main […]

Read More

Deploy Microsoft Defender for Endpoint on Linux manually 0 (0)

This article describes how to deploy Microsoft Defender for Endpoint on Linux manually. A successful deployment requires the completion of all of the following tasks: Prerequisites and system requirements Configure the Linux software repository RHEL and variants (CentOS, Fedora, Oracle Linux and Amazon Linux 2) SLES and variants Ubuntu and Debian systems Application installation Download […]

Read More

What’s new in Microsoft Defender for Endpoint on Linux 0 (0)

101.52.57 (30.121092.15257.0) Added a capability to detect vulnerable log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal. 101.47.76 (30.121092.14776.0) Added a new […]

Read More

Microsoft Defender for Endpoint on Linux 0 (0)

This topic describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.  Caution Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still […]

Read More

Microsoft Defender ATP application license terms 0 (0)

MICROSOFT DEFENDER ATP IF YOU LIVE IN (OR ARE A BUSINESS WITH A PRINCIPAL PLACE OF BUSINESS IN) THE UNITED STATES, PLEASE READ THE “BINDING ARBITRATION AND CLASS ACTION WAIVER” SECTION BELOW. IT AFFECTS HOW DISPUTES ARE RESOLVED. These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). They […]

Read More

Resources for Microsoft Defender for Endpoint on macOS 0 (0)

Collecting diagnostic information If you can reproduce a problem, increase the logging level, run the system for some time, and restore the logging level to the default. Increase logging level: BashCopy mdatp log level set –level debug OutputCopy Log level configured successfully Reproduce the problem Run sudo mdatp diagnostic create to back up the Microsoft Defender for […]

Read More

Privacy for Microsoft Defender for Endpoint on macOS 0 (0)

Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Microsoft Defender for Endpoint on macOS. This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on […]

Read More

Schedule scans with Microsoft Defender for Endpoint on macOS 0 (0)

While you can start a threat scan at any time with Microsoft Defender for Endpoint, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week. Schedule a scan with launchd You can create a scanning schedule using the launchd daemon on a […]

Read More

Examples of device control policies for Intune (Microsoft) 0 (0)

This document contains examples of device control policies that you can customize for your own organization. These examples are applicable if you are using Intune to manage devices in your enterprise. Restrict access to all removable media The following example restricts access to all removable media. Note the none permission that is applied at the top level […]

Read More