This commit is contained in:
Tudor Dobrila 2020-02-19 16:20:33 -08:00
parent 6d8e77b85d
commit 3119273924
4 changed files with 28 additions and 23 deletions

View File

@ -27,8 +27,8 @@ ms.topic: conceptual
This topic describes how to deploy Microsoft Defender ATP for Linux manually. A successful deployment requires the completion of all of the following steps: This topic describes how to deploy Microsoft Defender ATP for Linux manually. A successful deployment requires the completion of all of the following steps:
- [Configure Microsoft's Linux Software Repository](#configure-microsoft-linux-software-repository) - [Configure Microsoft's Linux Software Repository](#configure-microsoft-linux-software-repository)
- [Download onboarding packages](#download-onboarding-package)
- [Application installation](#application-installation) - [Application installation](#application-installation)
- [Download onboarding packages](#download-onboarding-package)
- [Client configuration](#client-configuration) - [Client configuration](#client-configuration)
## Prerequisites and system requirements ## Prerequisites and system requirements
@ -37,7 +37,7 @@ Before you get started, see [the main Microsoft Defender ATP for Linux page](mic
## Configure Microsoft Linux Software Repository ## Configure Microsoft Linux Software Repository
Microsoft Defender ATP for Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insider-fast* or *prod*. Each of these channels corresponds to a Linux software repository. Instructions for configuring your device to use this repository are provided below. Microsoft Defender ATP for Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insider-fast* or *prod*. Each of these channels corresponds to a Linux software repository. Instructions for configuring your device to use one of these repositories are provided below.
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insider-fast* can try out new features before devices in *prod*. The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insider-fast* can try out new features before devices in *prod*.
@ -50,7 +50,7 @@ In order to preview new features and provide early feedback, it is recommended t
In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step: In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step:
> [!NOTE] > [!NOTE]
> In case of Oracle EL and CentOS 8, use *[distro]* as “rhel”. > In case of Oracle EL and CentOS 8, replace *[distro]* with “rhel”.
```bash ```bash
$ sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/[distro]/[version]/[channel].repo $ sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
@ -100,7 +100,7 @@ In order to preview new features and provide early feedback, it is recommended t
### Ubuntu and Debian systems ### Ubuntu and Debian systems
- Install `curl` if not already installed: - Install `curl` if it is not already installed:
```bash ```bash
$ sudo apt-get install curl $ sudo apt-get install curl
@ -177,8 +177,8 @@ In order to preview new features and provide early feedback, it is recommended t
Download the onboarding package from Microsoft Defender Security Center: Download the onboarding package from Microsoft Defender Security Center:
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
2. In Section 1 of the page, set operating system to **Linux Server** and Deployment method to **Local script**. 2. In the first drop down, select **Linux Server** as the operating system. In the second drop down, select **Local Script (for up to 10 machines)** as the deployment method.
3. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip. 3. Click on **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux.png) ![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux.png)
@ -234,8 +234,7 @@ Download the onboarding package from Microsoft Defender Security Center:
1 1
``` ```
- Open a Terminal window - Open a Terminal window. Copy and execute the following command:
Copy and run the command below:
``` bash ``` bash
$ curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt $ curl -o ~/Downloads/eicar.com.txt http://www.eicar.org/download/eicar.com.txt

View File

@ -26,7 +26,7 @@ ms.topic: conceptual
This topic describes how to deploy Microsoft Defender ATP for Linux through Ansible. A successful deployment requires the completion of all of the following steps: This topic describes how to deploy Microsoft Defender ATP for Linux through Ansible. A successful deployment requires the completion of all of the following steps:
- [Download the onboarding packages](#download-onboarding-package) - [Download onboarding package](#download-onboarding-package)
- [Create Ansible YAML files](#create-ansible-yaml-files) - [Create Ansible YAML files](#create-ansible-yaml-files)
- [Deployment](#deployment) - [Deployment](#deployment)
- [References](#references) - [References](#references)
@ -61,8 +61,8 @@ Before you get started, please see [the main Microsoft Defender ATP for Linux pa
Download the onboarding package from Microsoft Defender Security Center: Download the onboarding package from Microsoft Defender Security Center:
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
2. In the first drop down, set operating system to **Linux Server** and in second drop down, Deployment method to **Your preferred Linux configuration management tool**. 2. In the first drop down, select **Linux Server** as the operating system. In the second drop down, select **Your preferred Linux configuration management tool** as the deployment method.
3. Click on **Download package**. Save it as WindowsDefenderATPOnboardingPackage.zip. 3. Click on **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux-2.png) ![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux-2.png)
@ -140,7 +140,7 @@ Create subtask / role files which contribute to an actual task. Create the below
In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step. In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step.
> [!NOTE] > [!NOTE]
> In case of Oracle EL and CentOS 8, use *[distro]* as “rhel”. > In case of Oracle EL and CentOS 8, replace *[distro]* with “rhel”.
- For apt-based distributions use the following YAML file: - For apt-based distributions use the following YAML file:

View File

@ -26,7 +26,7 @@ ms.topic: conceptual
This topic describes how to deploy Microsoft Defender ATP for Linux through Puppet. A successful deployment requires the completion of all of the following steps: This topic describes how to deploy Microsoft Defender ATP for Linux through Puppet. A successful deployment requires the completion of all of the following steps:
- [Download installation and onboarding packages](#download-onboarding-package) - [Download onboarding packages](#download-onboarding-package)
- [Create Puppet manifest](#create-puppet-manifest) - [Create Puppet manifest](#create-puppet-manifest)
- [Deployment](#deployment) - [Deployment](#deployment)
- [Check onboarding status](#check-onboarding-status) - [Check onboarding status](#check-onboarding-status)
@ -42,8 +42,8 @@ In addition, for Puppet deployment, you need to be familiar with Puppet administ
Download the onboarding package from Microsoft Defender Security Center: Download the onboarding package from Microsoft Defender Security Center:
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**. 1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
2. In the first drop down, set operating system to **Linux Server** and in second drop down, Deployment method to **Your preferred Linux configuration management tool**. 2. In the first drop down, select **Linux Server** as the operating system. In the second drop down, select **Your preferred Linux configuration management tool** as the deployment method.
3. Click on **Download package**. Save it as WindowsDefenderATPOnboardingPackage.zip. 3. Click on **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux-2.png) ![Microsoft Defender Security Center screenshot](images/atp-portal-onboarding-linux-2.png)
@ -89,7 +89,7 @@ Note your distribution and version and identify the closest entry for it under `
In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step. In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step.
> [!NOTE] > [!NOTE]
> In case of Oracle EL and CentOS 8, use *[distro]* as “rhel”. > In case of Oracle EL and CentOS 8, replace *[distro]* with “rhel”.
```puppet ```puppet
class install_mdatp { class install_mdatp {

View File

@ -28,14 +28,20 @@ Microsoft regularly publishes software updates to improve performance, security,
To update Microsoft Defender ATP for Linux manually, execute the following command: To update Microsoft Defender ATP for Linux manually, execute the following command:
- ### For Debian family distros ## RHEL and variants (CentOS and Oracle EL)
```bash
sudo apt-get install --only-upgrade mdatp
```
- ### For Redhat family distros
```bash ```bash
sudo yum update mdatp sudo yum update mdatp
``` ```
## SLES and variants
```bash
sudo zypper update mdatp
```
## Ubuntu and Debian systems
```bash
sudo apt-get install --only-upgrade mdatp
```