mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
@ -1113,8 +1113,8 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
Supported values:
|
||||
- 0 - Disable (Default)
|
||||
- 1 - Enable
|
||||
- 0 - Disable
|
||||
- 1 - Enable (Default)
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
@ -1733,18 +1733,19 @@ OS upgrade:
|
||||
Update:
|
||||
- Maximum deferral: 1 month
|
||||
- Deferral increment: 1 week
|
||||
- Update type/notes:
|
||||
If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic.
|
||||
- Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441
|
||||
- Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4
|
||||
- Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F
|
||||
- Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828
|
||||
- Tools - B4832BD8-E735-4761-8DAF-37F882276DAB
|
||||
- Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F
|
||||
- Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
|
||||
- Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
|
||||
- Update type/notes: If a machine has Microsoft Update enabled, any Microsoft Updates in these categories will also observe Defer / Pause logic:
|
||||
|
||||
- Security Update - 0FA1201D-4330-4FA8-8AE9-B877473B6441
|
||||
- Critical Update - E6CF1350-C01B-414D-A61F-263D14D133B4
|
||||
- Update Rollup - 28BC880E-0592-4CBF-8F95-C79B17911D5F
|
||||
- Service Pack - 68C5B0A3-D1A6-4553-AE49-01D3A7827828
|
||||
- Tools - B4832BD8-E735-4761-8DAF-37F882276DAB
|
||||
- Feature Pack - B54E7D24-7ADD-428F-8B75-90A396FA584F
|
||||
- Update - CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
|
||||
- Driver - EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
|
||||
|
||||
Other/cannot defer:
|
||||
|
||||
- Maximum deferral: No deferral
|
||||
- Deferral increment: No deferral
|
||||
- Update type/notes:
|
||||
|
@ -32,10 +32,18 @@ ms.technology: mde
|
||||
|
||||
This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks:
|
||||
|
||||
- [Configure the Linux software repository](#configure-the-linux-software-repository)
|
||||
- [Application installation](#application-installation)
|
||||
- [Download the onboarding package](#download-the-onboarding-package)
|
||||
- [Client configuration](#client-configuration)
|
||||
- [Deploy Microsoft Defender for Endpoint for Linux manually](#deploy-microsoft-defender-for-endpoint-for-linux-manually)
|
||||
- [Prerequisites and system requirements](#prerequisites-and-system-requirements)
|
||||
- [Configure the Linux software repository](#configure-the-linux-software-repository)
|
||||
- [RHEL and variants (CentOS and Oracle Linux)](#rhel-and-variants-centos-and-oracle-linux)
|
||||
- [SLES and variants](#sles-and-variants)
|
||||
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
|
||||
- [Application installation](#application-installation)
|
||||
- [Download the onboarding package](#download-the-onboarding-package)
|
||||
- [Client configuration](#client-configuration)
|
||||
- [Log installation issues](#log-installation-issues)
|
||||
- [Operating system upgrades](#operating-system-upgrades)
|
||||
- [Uninstallation](#uninstallation)
|
||||
|
||||
## Prerequisites and system requirements
|
||||
|
||||
@ -60,7 +68,7 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
sudo yum install yum-utils
|
||||
```
|
||||
|
||||
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config/`.
|
||||
- Note your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/`. For instance, RHEL 7.9 is closer to 7.4 than to 8.
|
||||
|
||||
In the below commands, replace *[distro]* and *[version]* with the information you've identified:
|
||||
|
||||
@ -71,7 +79,13 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
|
||||
```
|
||||
|
||||
For example, if you are running CentOS 7 and wish to deploy MDATP for Linux from the *insiders-fast* channel:
|
||||
For example, if you are running CentOS 7 and wish to deploy MDE for Linux from the *prod* channel:
|
||||
|
||||
```bash
|
||||
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/centos/7/prod.repo
|
||||
```
|
||||
|
||||
Or if you wish to explore new features on selected devices, you might want to deploy MDE for Linux to *insiders-fast* channel:
|
||||
|
||||
```bash
|
||||
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/centos/7/insiders-fast.repo
|
||||
@ -91,7 +105,7 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
|
||||
### SLES and variants
|
||||
|
||||
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config/`.
|
||||
- Note your distribution and version, and identify the closest entry(by major, then minor) for it under `https://packages.microsoft.com/config/`.
|
||||
|
||||
In the following commands, replace *[distro]* and *[version]* with the information you've identified:
|
||||
|
||||
@ -99,10 +113,10 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
sudo zypper addrepo -c -f -n microsoft-[channel] https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
|
||||
```
|
||||
|
||||
For example, if you are running SLES 12 and wish to deploy MDATP for Linux from the *insiders-fast* channel:
|
||||
For example, if you are running SLES 12 and wish to deploy MDE for Linux from the *prod* channel:
|
||||
|
||||
```bash
|
||||
sudo zypper addrepo -c -f -n microsoft-insiders-fast https://packages.microsoft.com/config/sles/12/insiders-fast.repo
|
||||
sudo zypper addrepo -c -f -n microsoft-prod https://packages.microsoft.com/config/sles/12/prod.repo
|
||||
```
|
||||
|
||||
- Install the Microsoft GPG public key:
|
||||
@ -125,7 +139,7 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
sudo apt-get install libplist-utils
|
||||
```
|
||||
|
||||
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config`.
|
||||
- Note your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config`.
|
||||
|
||||
In the below command, replace *[distro]* and *[version]* with the information you've identified:
|
||||
|
||||
@ -133,10 +147,10 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
|
||||
```
|
||||
|
||||
For example, if you are running Ubuntu 18.04 and wish to deploy MDATP for Linux from the *insiders-fast* channel:
|
||||
For example, if you are running Ubuntu 18.04 and wish to deploy MDE for Linux from the *prod* channel:
|
||||
|
||||
```bash
|
||||
curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/insiders-fast.list
|
||||
curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
|
||||
```
|
||||
|
||||
- Install the repository configuration:
|
||||
@ -144,10 +158,10 @@ In order to preview new features and provide early feedback, it is recommended t
|
||||
```bash
|
||||
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
|
||||
```
|
||||
For example, if you chose *insiders-fast* channel:
|
||||
For example, if you chose *prod* channel:
|
||||
|
||||
```bash
|
||||
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-insiders-fast.list
|
||||
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
|
||||
```
|
||||
|
||||
- Install the `gpg` package if not already installed:
|
||||
|
@ -23,11 +23,8 @@ ms.technology: mde
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
|
||||
You can use Microsoft Endpoint Manager (MEM) Intune to configure Windows Defender Application Control (WDAC). Intune includes native support for WDAC, which allows you to configure Windows 10 client computers to only run Windows components and Microsoft Store apps, or to also allow reputable apps as defined by the Intelligent Security Graph (ISG). Using the built-in policies can be a helpful starting point, but many customers may find the available circle-of-trust options to be too limited.
|
||||
|
||||
In order to deploy a custom policy through Intune and define your own circle of trust, you can configure a profile using Custom OMA-URI. Beginning in 1903, Custom OMA-URI policy deployment leverages the [ApplicationControl CSP](https://docs.microsoft.com/windows/client-management/mdm/applicationcontrol-csp), which has support for multiple policies and rebootless policies. Custom OMA-URI can also be used on pre-1903 systems to deploy custom policies via the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp).
|
||||
You can use Microsoft Endpoint Manager (MEM) Intune to configure Windows Defender Application Control (WDAC) on client machines. Intune includes native support for WDAC, which allows you to configure Windows 10 client computers to only run Windows components and Microsoft Store apps, or to also allow reputable apps as defined by the Intelligent Security Graph (ISG). Using the built-in policies can be a helpful starting point, but many customers may find the available circle-of-trust options to be too limited. In order to deploy a custom policy through Intune and define your own circle of trust, you can configure a profile using Custom OMA-URI.
|
||||
|
||||
## Using Intune's Built-In Policies
|
||||
|
||||
@ -50,38 +47,56 @@ Setting "Trust apps with good reputation" to enabled is equivalent to adding [Op
|
||||
|
||||
## Using a Custom OMA-URI Profile
|
||||
|
||||
> [!NOTE]
|
||||
> Policies deployed through Intune Custom OMA-URI are subject to a 350,000 byte limit. Customers whose devices are running 1903+ builds of Windows are encouraged to use [multiple policies](deploy-multiple-windows-defender-application-control-policies.md) which are more streamlined and less than 350K bytes in size.
|
||||
|
||||
### For 1903+ systems
|
||||
|
||||
The steps to use Intune's Custom OMA-URI functionality to leverage the [ApplicationControl CSP](https://docs.microsoft.com/windows/client-management/mdm/applicationcontrol-csp) and deploy a custom WDAC policy to 1903+ systems are:
|
||||
Beginning in 1903, Custom OMA-URI policy deployment leverages the [ApplicationControl CSP](https://docs.microsoft.com/windows/client-management/mdm/applicationcontrol-csp), which has support for multiple policies and rebootless policies.
|
||||
|
||||
#### Deploying policies
|
||||
The steps to use Intune's Custom OMA-URI functionality are:
|
||||
|
||||
1. Know a generated policy's GUID, which can be found in the policy xml as `<PolicyID>`
|
||||
|
||||
2. Convert the policy XML to binary format using the ConvertFrom-CIPolicy cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
||||
|
||||
3. Open the Microsoft Intune portal and click **Device configuration** > **Profiles** > **Create profile**.
|
||||
|
||||
4. Type a name for the new profile, select **Windows 10 and later** as the **Platform** and **Custom** as the **Profile type**.
|
||||
|
||||
5. Add a row, then give your policy a name and use the following settings:
|
||||
- **OMA-URI**: ./Vendor/MSFT/ApplicationControl/Policies/_Policy GUID_/Policy
|
||||
- **Data type**: Base64
|
||||
- **Certificate file**: upload your binary format policy file. You do not need to upload a Base64 file, as Intune will convert the uploaded .bin file to Base64 on your behalf.
|
||||
|
||||

|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
|
||||
> [!NOTE]
|
||||
> Upon deletion, policies deployed through Intune via the ApplicationControl CSP are removed from the system but stay in effect until the next reboot. In order to functionally do a rebootless delete, replace the existing policy with an Allow All policy (found at C:\Windows\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xml) and then delete the updated policy. This will immediately prevent anything from being blocked and fully deactive the policy on the next reboot.
|
||||
#### Removing policies
|
||||
|
||||
Upon deletion, policies deployed through Intune via the ApplicationControl CSP are removed from the system but stay in effect until the next reboot. In order to functionally do a rebootless delete, first replace the existing policy with an Allow All policy (found at C:\Windows\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xml) and then delete the updated policy. This will immediately prevent anything from being blocked and fully deactive the policy on the next reboot.
|
||||
|
||||
### For pre-1903 systems
|
||||
|
||||
#### Deploying policies
|
||||
The steps to use Intune's Custom OMA-URI functionality to leverage the [AppLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/applocker-csp) and deploy a custom WDAC policy to pre-1903 systems are:
|
||||
|
||||
1. Convert the policy XML to binary format using the ConvertFrom-CIPolicy cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
||||
|
||||
2. Open the Microsoft Intune portal and click **Device configuration** > **Profiles** > **Create profile**.
|
||||
|
||||
3. Type a name for the new profile, select **Windows 10 and later** as the **Platform** and **Custom** as the **Profile type**.
|
||||
|
||||
4. Add a row, then give your policy a name and use the following settings:
|
||||
- **OMA-URI**: ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/_Grouping_/CodeIntegrity/Policy)
|
||||
- **Data type**: Base64
|
||||
- **Certificate file**: upload your binary format policy file
|
||||
|
||||
> [!NOTE]
|
||||
> Deploying policies via the AppLocker CSP will force a reboot during OOBE.
|
||||
|
||||
> [!NOTE]
|
||||
> Policies deployed through Intune via the AppLocker CSP cannot be deleted through the Intune console. In order to disable WDAC policy enforcement, either deploy an audit-mode policy and/or use a script to delete the existing policy.
|
||||
#### Removing policies
|
||||
|
||||
Policies deployed through Intune via the AppLocker CSP cannot be deleted through the Intune console. In order to disable WDAC policy enforcement, either deploy an audit-mode policy and/or use a script to delete the existing policy.
|
||||
|
||||
> [!NOTE]
|
||||
> Deploying policies via the AppLocker CSP will force a reboot during OOBE.
|
||||
|
Reference in New Issue
Block a user