mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge pull request #2116 from MicrosoftDocs/Kellylorenebaker-patch-13
Edit pass: linux-install-manually
This commit is contained in:
commit
ed2ae7f5ae
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Installing Microsoft Defender ATP for Linux manually
|
title: Deploy Microsoft Defender ATP for Linux manually
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Describes how to install Microsoft Defender ATP for Linux manually, from the command line.
|
description: Describes how to deploy Microsoft Defender ATP for Linux manually from the command line.
|
||||||
keywords: microsoft, defender, atp, linux, installation, deploy, uninstallation, puppet, ansible, linux, redhat, ubuntu, debian, sles, suse, centos
|
keywords: microsoft, defender, atp, linux, installation, deploy, uninstallation, puppet, ansible, linux, redhat, ubuntu, debian, sles, suse, centos
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
@ -18,24 +18,24 @@ ms.collection: M365-security-compliance
|
|||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manual deployment
|
# Deploy Microsoft Defender ATP for Linux manually
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Linux](microsoft-defender-atp-linux.md)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Linux](microsoft-defender-atp-linux.md)
|
||||||
|
|
||||||
This topic describes how to deploy Microsoft Defender ATP for Linux manually. A successful deployment requires the completion of all of the following steps:
|
This topic describes how to deploy Microsoft Defender ATP for Linux manually. A successful deployment requires the completion of all of the following tasks:
|
||||||
|
|
||||||
- [Configure Microsoft's Linux Software Repository](#configure-microsoft-linux-software-repository)
|
- [Configure the Linux software repository](#configure-the-linux-software-repository)
|
||||||
- [Application installation](#application-installation)
|
- [Application installation](#application-installation)
|
||||||
- [Download onboarding packages](#download-onboarding-package)
|
- [Download the onboarding package](#download-the-onboarding-package)
|
||||||
- [Client configuration](#client-configuration)
|
- [Client configuration](#client-configuration)
|
||||||
|
|
||||||
## Prerequisites and system requirements
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
Before you get started, see [the main Microsoft Defender ATP for Linux page](microsoft-defender-atp-linux.md) for a description of prerequisites and system requirements for the current software version.
|
Before you get started, see [the main Microsoft Defender ATP for Linux page](microsoft-defender-atp-linux.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
## Configure Microsoft Linux Software Repository
|
## Configure the Linux software repository
|
||||||
|
|
||||||
Microsoft Defender ATP for Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insider-fast* or *prod*. Each of these channels corresponds to a Linux software repository. Instructions for configuring your device to use one of these repositories are provided below.
|
Microsoft Defender ATP for Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insider-fast* or *prod*. Each of these channels corresponds to a Linux software repository. Instructions for configuring your device to use one of these repositories are provided below.
|
||||||
|
|
||||||
@ -45,9 +45,9 @@ In order to preview new features and provide early feedback, it is recommended t
|
|||||||
|
|
||||||
### RHEL and variants (CentOS and Oracle EL)
|
### RHEL and variants (CentOS and Oracle EL)
|
||||||
|
|
||||||
- Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/`
|
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config/`.
|
||||||
|
|
||||||
In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step:
|
In the below commands, replace *[distro]* and *[version]* with the information you've identified:
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In case of Oracle EL and CentOS 8, replace *[distro]* with “rhel”.
|
> In case of Oracle EL and CentOS 8, replace *[distro]* with “rhel”.
|
||||||
@ -77,9 +77,9 @@ In order to preview new features and provide early feedback, it is recommended t
|
|||||||
|
|
||||||
### SLES and variants
|
### SLES and variants
|
||||||
|
|
||||||
- Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/`
|
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config/`.
|
||||||
|
|
||||||
In the below commands, replace *[distro]* and *[version]* with the information identified in the previous step.
|
In the following commands, replace *[distro]* and *[version]* with the information you've identified:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ sudo zypper addrepo -c -f -n microsoft-[channel] https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
|
$ sudo zypper addrepo -c -f -n microsoft-[channel] https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
|
||||||
@ -106,9 +106,9 @@ In order to preview new features and provide early feedback, it is recommended t
|
|||||||
$ sudo apt-get install curl
|
$ sudo apt-get install curl
|
||||||
```
|
```
|
||||||
|
|
||||||
- Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config`
|
- Note your distribution and version, and identify the closest entry for it under `https://packages.microsoft.com/config`.
|
||||||
|
|
||||||
In the below command, replace *[distro]* and *[version]* with the information identified in the previous step:
|
In the below command, replace *[distro]* and *[version]* with the information you've identified:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
|
$ curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
|
||||||
@ -140,13 +140,13 @@ In order to preview new features and provide early feedback, it is recommended t
|
|||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
- Install the https driver in case not already present:
|
- Install the https driver if it's not already present:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ sudo apt-get install apt-transport-https
|
$ sudo apt-get install apt-transport-https
|
||||||
```
|
```
|
||||||
|
|
||||||
- Update the repository metadata
|
- Update the repository metadata:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ sudo apt-get update
|
$ sudo apt-get update
|
||||||
@ -154,31 +154,31 @@ In order to preview new features and provide early feedback, it is recommended t
|
|||||||
|
|
||||||
## Application installation
|
## Application installation
|
||||||
|
|
||||||
- RHEL and variants (CentOS and Oracle EL)
|
- RHEL and variants (CentOS and Oracle EL):
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo yum install mdatp
|
sudo yum install mdatp
|
||||||
```
|
```
|
||||||
|
|
||||||
- SLES and variants
|
- SLES and variants:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo zypper install mdatp
|
sudo zypper install mdatp
|
||||||
```
|
```
|
||||||
|
|
||||||
- Ubuntu and Debian system
|
- Ubuntu and Debian system:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo apt-get install mdatp
|
sudo apt-get install mdatp
|
||||||
```
|
```
|
||||||
|
|
||||||
## Download onboarding package
|
## Download the onboarding package
|
||||||
|
|
||||||
Download the onboarding package from Microsoft Defender Security Center:
|
Download the onboarding package from Microsoft Defender Security Center:
|
||||||
|
|
||||||
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
1. In Microsoft Defender Security Center, go to **Settings > Machine Management > Onboarding**.
|
||||||
2. In the first drop down, select **Linux Server** as the operating system. In the second drop down, select **Local Script (for up to 10 machines)** as the deployment method.
|
2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script (for up to 10 machines)** as the deployment method.
|
||||||
3. Click on **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
|
3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -199,13 +199,13 @@ Download the onboarding package from Microsoft Defender Security Center:
|
|||||||
|
|
||||||
1. Copy WindowsDefenderATPOnboarding.py to the target machine.
|
1. Copy WindowsDefenderATPOnboarding.py to the target machine.
|
||||||
|
|
||||||
Initially the client machine is not associated with an organization. Note that the *orgId* attribute is blank.
|
Initially the client machine is not associated with an organization. Note that the *orgId* attribute is blank:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ mdatp --health orgId
|
$ mdatp --health orgId
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Run WindowsDefenderATPOnboarding.py (note that in order to run this command you must have `python` installed on the device).
|
2. Run WindowsDefenderATPOnboarding.py, and note that, in order to run this command, you must have `python` installed on the device:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ python WindowsDefenderATPOnboarding.py
|
$ python WindowsDefenderATPOnboarding.py
|
||||||
@ -218,7 +218,7 @@ Download the onboarding package from Microsoft Defender Security Center:
|
|||||||
[your organization identifier]
|
[your organization identifier]
|
||||||
```
|
```
|
||||||
|
|
||||||
4. A few minutes following the completion of the installation, you can see the status by running the following command. A return value of `1` denotes that the product is functioning as expected.
|
4. A few minutes after you complete the installation, you can see the status by running the following command. A return value of `1` denotes that the product is functioning as expected:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ mdatp --health healthy
|
$ mdatp --health healthy
|
||||||
@ -227,7 +227,7 @@ Download the onboarding package from Microsoft Defender Security Center:
|
|||||||
|
|
||||||
5. Run a detection test to verify that the machine is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded machine:
|
5. Run a detection test to verify that the machine is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded machine:
|
||||||
|
|
||||||
- Ensure that real-time protection is enabled (denoted by a result of `1` from running the following command).
|
- Ensure that real-time protection is enabled (denoted by a result of `1` from running the following command):
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ mdatp --health realTimeProtectionEnabled
|
$ mdatp --health realTimeProtectionEnabled
|
||||||
@ -246,10 +246,10 @@ Download the onboarding package from Microsoft Defender Security Center:
|
|||||||
$ mdatp --threat --list --pretty
|
$ mdatp --threat --list --pretty
|
||||||
```
|
```
|
||||||
|
|
||||||
## Logging installation issues
|
## Log installation issues
|
||||||
|
|
||||||
See [Logging installation issues](linux-resources.md#logging-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
|
See [Log installation issues](linux-resources.md#log-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
|
||||||
|
|
||||||
## Uninstallation
|
## Uninstallation
|
||||||
|
|
||||||
See [Uninstalling](linux-resources.md#uninstalling) for details on how to remove Microsoft Defender ATP for Linux from client devices.
|
See [Uninstall](linux-resources.md#uninstall) for details on how to remove Microsoft Defender ATP for Linux from client devices.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user