This article describes how to deploy Defender for Endpoint on Linux using Ansible. A successful deployment requires the completion of all of the following tasks: Download the onboarding package Create Ansible YAML files Deployment References Prerequisites and system requirements Before you get started, see the main Defender for Endpoint on Linux page for a description of prerequisites […]
Articles Tagged: Microsoft
Deploy Microsoft Defender for Endpoint on Linux with Puppet
This article describes how to deploy Defender for Endpoint on Linux using Puppet. A successful deployment requires the completion of all of the following tasks: Download the onboarding package Create Puppet manifest Deployment Check onboarding status Prerequisites and system requirements For a description of prerequisites and system requirements for the current software version, see the main […]
Deploy Microsoft Defender for Endpoint on Linux manually
This article describes how to deploy Microsoft Defender for Endpoint on Linux manually. A successful deployment requires the completion of all of the following tasks: Prerequisites and system requirements Configure the Linux software repository RHEL and variants (CentOS, Fedora, Oracle Linux and Amazon Linux 2) SLES and variants Ubuntu and Debian systems Application installation Download […]
What’s new in Microsoft Defender for Endpoint on Linux
101.52.57 (30.121092.15257.0) Added a capability to detect vulnerable log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal. 101.47.76 (30.121092.14776.0) Added a new […]
Microsoft Defender for Endpoint on Linux
This topic describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux. Caution Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still […]
Microsoft Defender ATP application license terms
MICROSOFT DEFENDER ATP IF YOU LIVE IN (OR ARE A BUSINESS WITH A PRINCIPAL PLACE OF BUSINESS IN) THE UNITED STATES, PLEASE READ THE “BINDING ARBITRATION AND CLASS ACTION WAIVER” SECTION BELOW. IT AFFECTS HOW DISPUTES ARE RESOLVED. These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). They […]
Resources for Microsoft Defender for Endpoint on macOS
Collecting diagnostic information If you can reproduce a problem, increase the logging level, run the system for some time, and restore the logging level to the default. Increase logging level: BashCopy mdatp log level set –level debug OutputCopy Log level configured successfully Reproduce the problem Run sudo mdatp diagnostic create to back up the Microsoft Defender for […]
Privacy for Microsoft Defender for Endpoint on macOS
Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Microsoft Defender for Endpoint on macOS. This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on […]
Schedule scans with Microsoft Defender for Endpoint on macOS
While you can start a threat scan at any time with Microsoft Defender for Endpoint, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week. Schedule a scan with launchd You can create a scanning schedule using the launchd daemon on a […]
Examples of device control policies for Intune (Microsoft)
This document contains examples of device control policies that you can customize for your own organization. These examples are applicable if you are using Intune to manage devices in your enterprise. Restrict access to all removable media The following example restricts access to all removable media. Note the none permission that is applied at the top level […]