Skip to content

Commit

Permalink
Merge pull request #2182 from MicrosoftDocs/mde-servers
Browse files Browse the repository at this point in the history
MDE server doc updates per Naama and Tina Coll
  • Loading branch information
garycentric authored Dec 14, 2024
2 parents 87f50f6 + d98917b commit 00294c0
Show file tree
Hide file tree
Showing 34 changed files with 535 additions and 350 deletions.
4 changes: 2 additions & 2 deletions defender-business/mdb-onboard-devices.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ audience: Admin
ms.topic: overview
ms.service: defender-business
ms.localizationpriority: medium
ms.date: 06/19/2024
ms.date: 12/12/2024
ms.reviewer: efratka, nehabha, muktaagarwal
f1.keywords: NOCSH
ms.collection:
Expand Down Expand Up @@ -274,7 +274,7 @@ After a device is enrolled in Intune, you can add it to a device group. [Learn m
## Servers

> [!NOTE]
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
Choose the operating system for your server:

Expand Down
8 changes: 5 additions & 3 deletions defender-endpoint/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -137,9 +137,10 @@
- name: Migrating devices to streamlined method
href: migrate-devices-streamlined.md

- name: Onboarding Windows Client
- name: Onboard client devices
href: onboard-client.md
items:
- name: Onboarding Windows Client overview
- name: Onboarding Windows client overview
href: onboard-windows-client.md
- name: Defender for Endpoint plug-in for WSL
href: mde-plugin-wsl.md
Expand All @@ -158,7 +159,8 @@
- name: Onboard previous versions of Windows
href: onboard-downlevel.md

- name: Onboarding Windows Server
- name: Onboard server devices
href: onboard-server.md
items:
- name: Onboarding Windows Server overview
href: onboard-windows-server.md
Expand Down
169 changes: 73 additions & 96 deletions defender-endpoint/configure-endpoints-sccm.md

Large diffs are not rendered by default.

18 changes: 7 additions & 11 deletions defender-endpoint/configure-server-endpoints.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ author: denisebmsft
ms.author: deniseb
ms.reviewer: pahuijbr
ms.localizationpriority: medium
ms.date: 05/20/2024
ms.date: 12/13/2024
manager: deniseb
audience: ITPro
ms.collection:
Expand All @@ -23,12 +23,8 @@ ms.subservice: onboard

**Applies to:**

- Windows Server 2016 and Windows Server 2012 R2
- Windows Server Semi-Annual Enterprise Channel
- Windows Server 2019 and later
- Windows Server 2019 core edition
- Windows Server 2022
- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
- Microsoft Defender for Endpoint Server
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configserver-abovefoldlink)
Expand All @@ -44,7 +40,7 @@ For guidance on how to download and use Windows Security Baselines for Windows s

You'll need to complete the following general steps to successfully onboard servers.

:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices" lightbox="media/server-onboarding-tools-methods.png":::
:::image type="content" source="media/server-onboarding-tools-methods.png" alt-text="An illustration of onboarding flow for Windows Servers and Windows 10 devices.":::

> [!NOTE]
> Windows Hyper-V Server editions are not supported.
Expand All @@ -56,7 +52,7 @@ Microsoft Defender for Endpoint integrates seamlessly with Microsoft Defender fo
> [!NOTE]
> For Windows Server 2016 and Windows Server 2012 R2, you can either manually install/upgrade the modern, unified solution on these machines, or use the integration to automatically deploy or upgrade servers covered by your respective Microsoft Defender for Server plan. More information about making the switch at [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows#enable-the-integration).
>
- When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users). Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
>
> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data is stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
Expand Down Expand Up @@ -235,7 +231,7 @@ This script can be used in various scenarios, including those scenarios describe
8. Go to the **Actions** tab and select **New...** Ensure that **Start a program** is selected in the **Action** field. The [installer script](server-migration.md#installer-script) handles the installation, and immediately perform the onboarding step after installation completes. Select *C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe* then provide the arguments:

```powershell
-ExecutionPolicy RemoteSigned \\servername-or-dfs-space\share-name\install.ps1 -OnboardingScript \\servername-or-dfs-space\share-name\windowsdefenderatponboardingscript.cmd
-ExecutionPolicy RemoteSigned \\servername-or-dfs-space\share-name\install.ps1 -OnboardingScript \\servername-or-dfs-space\share-name\windowsdefenderatponboardingscript.cmd
```
> [!NOTE]
Expand All @@ -261,7 +257,7 @@ The following steps are only applicable if you're using a third-party anti-malwa
- Type: `REG_DWORD`
- Value: `1`
:::image type="content" source="media/atp-verify-passive-mode.png" alt-text="The passive mode verification result" lightbox="media/atp-verify-passive-mode.png":::
:::image type="content" source="media/atp-verify-passive-mode.png" alt-text="Screenshot of the passive mode verification result.":::
#### Known issues and limitations in the new, unified solution package for Windows Server 2016 and Windows Server 2012 R2
Expand Down
17 changes: 9 additions & 8 deletions defender-endpoint/deployment-strategy.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: onboard
search.appverid: met150
ms.date: 04/03/2024
ms.date: 12/12/2024
---

# Identify Defender for Endpoint architecture and deployment method
Expand All @@ -30,7 +30,7 @@ If you're already completed the steps to set up your Microsoft Defender for Endp

We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps:

:::image type="content" source="/defender/media/defender-endpoint/onboarding-architecture-2.png" alt-text="The deployment flow" lightbox="/defender/media/defender-endpoint/onboarding-architecture-2.png":::
:::image type="content" source="/defender/media/defender-endpoint/onboarding-architecture-2.png" alt-text="The deployment flow":::

## Step 1: Identify your architecture

Expand All @@ -49,17 +49,18 @@ Once you have determined the architecture of your environment and have created a

|Endpoint|Deployment tool|
|---|---|
|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br> [Group Policy](configure-endpoints-gp.md) <br> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br> [VDI scripts](configure-endpoints-vdi.md)|
|**Windows servers<br>Linux servers** | [Integration with Microsoft Defender for Cloud](azure-server-integration.md)
|**macOS**|[Local script](mac-install-manually.md) <br> [Microsoft Intune](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md)|
|**Linux servers**|[Local script](linux-install-manually.md) <br> [Puppet](linux-install-with-puppet.md) <br> [Ansible](linux-install-with-ansible.md) <br> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br> [Saltstack](linux-install-with-saltack.md)|
|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br/> [Group Policy](configure-endpoints-gp.md) <br/> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br/> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br/> [VDI scripts](configure-endpoints-vdi.md)|
|**Windows servers<br/>Linux servers** <br/>(Requires a server license) | [Onboard Windows devices using a local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md) |
|**macOS**|[Local script](mac-install-manually.md) <br/> [Microsoft Intune](mac-install-with-intune.md) <br/> [JAMF Pro](mac-install-with-jamf.md) <br/> [Mobile Device Management](mac-install-with-other-mdm.md)|
|**Linux servers**|[Local script](linux-install-manually.md) <br/> [Puppet](linux-install-with-puppet.md) <br/> [Ansible](linux-install-with-ansible.md) <br/> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/> [Saltstack](linux-install-with-saltack.md)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)|
|**Android**|[Microsoft Intune](android-intune.md)|
|**iOS**|[Microsoft Intune](ios-install.md) <br> [Mobile Application Manager](ios-install-unmanaged.md) |
|**iOS**|[Microsoft Intune](ios-install.md) <br/> [Mobile Application Manager](ios-install-unmanaged.md) |

>[!Note]
> [!NOTE]
> For devices that aren't managed by Microsoft Intune or Microsoft Configuration Manager, you can use the Security Management for Microsoft Defender for Endpoint to receive security configurations for Microsoft Defender directly from Intune.
## Next step

After choosing your Defender for Endpoint architecture and deployment method continue to [Step 4 - Onboard devices](onboarding.md).

[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,11 @@ ms.date: 10/11/2024

[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]

**Applies to**:

- Microsoft Defender for Endpoint Server
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)

Before you begin: Install unzip if it's not already installed.

The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.
Expand Down
19 changes: 14 additions & 5 deletions defender-endpoint/linux-exclusions.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,11 @@ ms.date: 10/14/2024

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]

**Applies to**:

- Microsoft Defender for Endpoint Server
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
Expand Down Expand Up @@ -76,13 +81,14 @@ Wildcard|Description|Examples|
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`

> [!NOTE]
For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
> For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
## How to configure the list of exclusions

### Using the management console

To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.

```JSON
{
"exclusionSettings":{
Expand Down Expand Up @@ -161,7 +167,7 @@ Examples:
mdatp exclusion extension remove --name .txt
```

```Output
```console
Extension exclusion removed successfully
```

Expand Down Expand Up @@ -198,6 +204,7 @@ Examples:
```console
File exclusion removed successfully"
```

- Add/Remove an exclusion for a folder:

```bash
Expand All @@ -216,7 +223,7 @@ Examples:
Folder exclusion removed successfully
```

```bash
```bash
mdatp exclusion folder add --path /var/log/ --scope global
```

Expand Down Expand Up @@ -259,6 +266,7 @@ Examples:
mdatp exclusion folder add --path "/var/" --scope epp
```
OR

```bash
mdatp exclusion folder add --path "/var/*/" --scope epp
```
Expand All @@ -284,7 +292,7 @@ Examples:
mdatp exclusion process remove --name /usr/bin/cat --scope global
```

```Output
```console
Process exclusion removed successfully
```

Expand All @@ -301,7 +309,7 @@ Examples:
mdatp exclusion process remove --name /usr/bin/cat --scope epp
```

```Output
```console
Process exclusion removed successfully
```

Expand Down Expand Up @@ -357,4 +365,5 @@ For example, to add `EICAR-Test-File (not a virus)` (the threat name associated
```bash
mdatp threat allowed add --name "EICAR-Test-File (not a virus)"
```
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
25 changes: 16 additions & 9 deletions defender-endpoint/linux-install-manually.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,11 @@ ms.date: 12/02/2024

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]

**Applies to**:

- Microsoft Defender for Endpoint Server
- [Microsoft Defender for Servers](/azure/defender-for-cloud/integration-defender-for-endpoint)

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
> [!TIP]
Expand Down Expand Up @@ -223,14 +228,16 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
- Install the Microsoft GPG public key:
- For Debian 11 and earlier, run the following command.

```bash
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
```
For Debian 12 and later, run the following command.
```bash
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
```

- For Debian 12 and later, run the following command.

```bash
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null
```

```bash
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null
```
- Install the HTTPS driver if not already installed:

```bash
Expand Down Expand Up @@ -374,7 +381,7 @@ Download the onboarding package from Microsoft Defender portal.
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script** as the deployment method.
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.

:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal" lightbox="media/portal-onboarding-linux.png":::
:::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal":::

4. From a command prompt, verify that you have the file, and extract the contents of the archive:

Expand Down Expand Up @@ -483,7 +490,7 @@ Download the onboarding package from Microsoft Defender portal.

1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:

- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.

- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`

Expand Down
Loading

0 comments on commit 00294c0

Please sign in to comment.