Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Configure your security settings
Microsoft Defender for Endpoint on Linux includes antivirus, anti-malware protection, endpoint detection, and response capabilities. This article summarizes important security settings to configure and includes links to other resources.
| Settings | Description |
|---|---|
| 1. Configure static proxy discovery. | Configuring a static proxy helps ensure telemetry is submitted and helps avoid network timeouts. Perform this task during and after your Defender for Endpoint installation. For more information, see Configure Microsoft Defender for Endpoint on Linux for static proxy discovery. |
| 2. Configure your antivirus scans. | You can schedule automatic antivirus scans by using either Anacron or Crontab. For more information, see the following articles: |
| 3. Configure your security settings and policies. | You can use the Microsoft Defender portal (Defender for Endpoint Security Settings Management) or a configuration profile (.json file) to configure Defender for Endpoint on Linux. Or, you can use command line to configure certain settings. For more information, see the following articles: |
| 4. Configure and validate exclusions (as appropriate) | You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux. Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all associated antivirus detections, EDR alerts, and visibility for the excluded item. For more information, see Configure and validate exclusions for Microsoft Defender for Endpoint on Linux. |
| 5. Configure the eBPF-based sensor. | The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux is automatically enabled for all customers by default for agent versions 101.23082.0006 and later. It provides supplementary event data for Linux operating systems and helps reduce the possibility of conflicts between applications. For more information, see Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux. |
| 6. Configure Offline Security Intelligence Update (as appropriate) | Offline Security Intelligence Update enables you to configure security intelligence updates for Linux servers with limited or no exposure to the internet. You can set up a local hosting server ("mirror server") that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints can pull the updates from your mirror server at a predefined interval. For more information, see Configure offline security intelligence update for Microsoft Defender for Endpoint on Linux. |
| 7. Deploy updates. | Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. For more information, see Deploy updates for Microsoft Defender for Endpoint on Linux. |
| 8. Configure network protection (Preview) | Network protection helps prevent users from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the internet. For more information, see Network protection for Linux. |
Important
If you want to run multiple security solutions side by side, see Considerations for performance, configuration, and support.
You might have already configured mutual security exclusions for devices onboarded to Microsoft Defender for Endpoint. If you still need to set mutual exclusions to avoid conflicts, see Add Microsoft Defender for Endpoint to the exclusion list for your existing solution.
Options for configuring security settings
To configure your security settings in Defender for Endpoint on Linux, you have two main options:
Use the Microsoft Defender portal (Defender for Endpoint Security Settings Management)
or
Use a configuration profile
You can use the command line to configure specific settings, gather diagnostics, run scans, and more. For more information, see Linux resources: Configure using command line.
Defender for Endpoint Security Settings Management
You can configure Defender for Endpoint on Linux in the Microsoft Defender portal at (https://security.microsoft.com) using Defender for Endpoint Security Settings Management. For more information, including how to create, edit, and verify security policies, see Use Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus.
Configuration profile
You can configure settings in Defender for Endpoint on Linux through a configuration profile that uses a .json file. After you set up your profile, you can deploy it by using your management tool of choice. Preferences managed by the enterprise take precedence over preferences set locally on the device.
In other words, users in your enterprise aren't able to change preferences that are set through this configuration profile. If exclusions were added through the managed configuration profile, they can only be removed through the managed configuration profile. The command line works for exclusions added locally.
This article describes the structure of this profile (including a recommended profile you can use to get started) and instructions on how to deploy the profile.
Configuration profile structure
The configuration profile is a .json file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can be simple (for example, a numerical value) or complex (for example, a nested list of preferences).
Typically, you use a configuration management tool to push a file named mdatp_managed.json to the location /etc/opt/microsoft/mdatp/managed/.
The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections.
Recommended configuration profile
This section includes two configuration profile examples:
- Sample profile to help you get started with recommended settings.
- Full configuration profile example for organizations who want more granular control over security settings.
To get started, we recommend using the first sample profile for your organization. For more granular control, you can use the full configuration profile example instead.
Sample profile
The following configuration profile helps you take advantage of important protection features in Defender for Endpoint on Linux. The profile includes the following configuration:
- Enable real-time protection (RTP).
- Specify how the following threat types are handled:
- Potentially unwanted applications (PUA) are blocked.
- Archive bombs (file with a high compression rate) are audited to the product logs.
- Enable automatic security intelligence updates.
- Enable cloud-delivered protection.
- Enable automatic sample submission at
safelevel.
{
"antivirusEngine":{
"enforcementLevel":"real_time",
"threatTypeSettings":[
{
"key":"potentially_unwanted_application",
"value":"block"
},
{
"key":"archive_bomb",
"value":"audit"
}
]
},
"cloudService":{
"automaticDefinitionUpdateEnabled":true,
"automaticSampleSubmissionConsent":"safe",
"enabled":true,
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
}
}
Full configuration profile example
The following configuration profile contains entries for all settings described in this article and can be used for more advanced scenarios where you want more control.
{
"antivirusEngine":{
"enforcementLevel":"passive",
"behaviorMonitoring": "disabled",
"scanAfterDefinitionUpdate":true,
"scanArchives":true,
"scanHistoryMaximumItems": 10000,
"scanResultsRetentionDays": 90,
"maximumOnDemandScanThreads":2,
"exclusionsMergePolicy":"merge",
"allowedThreats":[
"<EXAMPLE DO NOT USE>EICAR-Test-File (not a virus)"
],
"disallowedThreatActions":[
"allow",
"restore"
],
"nonExecMountPolicy":"unmute",
"unmonitoredFilesystems": ["nfs,fuse"],
"enableFileHashComputation": false,
"threatTypeSettingsMergePolicy":"merge",
"threatTypeSettings":[
{
"key":"potentially_unwanted_application",
"value":"block"
},
{
"key":"archive_bomb",
"value":"audit"
}
],
"scanFileModifyPermissions":false,
"scanFileModifyOwnership":false,
"scanNetworkSocketEvent":false,
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/<EXAMPLE DO NOT USE>",
"offlineDefinitionUpdateFallbackToCloud":false,
"offlineDefinitionUpdate":"disabled"
},
"cloudService":{
"enabled":true,
"diagnosticLevel":"optional",
"automaticSampleSubmissionConsent":"safe",
"automaticDefinitionUpdateEnabled":true,
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/",
"definitionUpdatesInterval":28800
},
"features":{
"moduleLoad":"disabled",
"supplementarySensorConfigurations":{
"enableFilePermissionEvents":"disabled",
"enableFileOwnershipEvents":"disabled",
"enableRawSocketEvent":"disabled",
"enableBootLoaderCalls":"disabled",
"enableProcessCalls":"disabled",
"enablePseudofsCalls":"diabled",
"enableEbpfModuleLoadEvents":"disabled",
"sendLowfiEvents":"disabled"
},
"ebpfSupplementaryEventProvider":"enabled",
"offlineDefinitionUpdateVerifySig": "disabled"
},
"networkProtection":{
"enforcementLevel":"disabled",
"disableIcmpInspection":true
},
"edr":{
"groupIds":"GroupIdExample",
"tags": [
{
"key": "GROUP",
"value": "Tag"
}
]
},
"exclusionSettings":{
"exclusions":[
{
"$type":"excludedPath",
"isDirectory":true,
"path":"/home/*/git<EXAMPLE DO NOT USE>",
"scopes": [
"epp"
]
},
{
"$type":"excludedPath",
"isDirectory":true,
"path":"/run<EXAMPLE DO NOT USE>",
"scopes": [
"global"
]
},
{
"$type":"excludedPath",
"isDirectory":false,
"path":"/var/log/system.log<EXAMPLE DO NOT USE><EXCLUDED IN ALL SCENARIOS>",
"scopes": [
"epp", "global"
]
},
{
"$type":"excludedFileExtension",
"extension":".pdf<EXAMPLE DO NOT USE>",
"scopes": [
"epp"
]
},
{
"$type":"excludedFileName",
"name":"/bin/cat<EXAMPLE DO NOT USE><NO SCOPE PROVIDED - GLOBAL CONSIDERED>"
}
],
"mergePolicy":"admin_only"
}
}
Antivirus, antimalware, and EDR settings in Defender for Endpoint on Linux
Whether you use a configuration profile (.json file) or the Microsoft Defender portal (Security Settings Management), you can configure your antivirus, antimalware, and EDR settings in Defender for Endpoint on Linux. The following sections describe where and how to configure your settings.
Antivirus engine preferences
The antivirusEngine section of the configuration profile manages the preferences of the antivirus component of the product.
| Description | JSON Value | Defender portal value |
|---|---|---|
| Key | antivirusEngine |
Antivirus Engine |
| Data type | Dictionary (nested preference) | Collapsed Section |
See the following subsections for a description of the dictionary contents and policy properties.
Enforcement level for Microsoft Defender Antivirus
Specifies the enforcement preference of antivirus engine. There are three values for setting enforcement level:
Real-time (
real_time): Real-time protection (scan files as they're modified) is enabled.On-demand (
on_demand): Files are scanned only on demand:- Real-time protection is off.
- Definition updates occur only when a scan starts, even if
automaticDefinitionUpdateEnabledis set totruein on-demand mode.
Passive (
passive): Runs the antivirus engine in passive mode:- Real-time protection is off. Microsoft Defender Antivirus doesn't remediate threats.
- On-demand scanning is on. Scan capabilities are still available on the device.
- Automatic threat remediation is off. No files are moved and your security administrator is expected to take required action.
- Security intelligence updates are on. Alerts are available in the security administrator's organization.
- Definition updates occur only when a scan starts, even if
automaticDefinitionUpdateEnabledis set totrue. - Endpoint detection and response (EDR) is on. The output of the
mdatp healthcommand on the device showsengine not loadedfor theengine_load_versionproperty. The engine is related to antivirus, not EDR.
Note
- Available in Defender for Endpoint version
101.10.72or later. - In version
101.23062.0001or later, the default value ispassive. In previous versions, the default wasreal_time. - We also recommended using scheduled scans as per requirement.
Enable or disable behavior monitoring (if RTP is enabled)
Important
This feature works only when the enforcement level is real-time.
Specifies whether behavior monitoring and blocking capability is enabled or disabled on the device.
| Description | JSON Value | Defender portal value |
|---|---|---|
| Key | behaviorMonitoring | Enable behavior monitoring |
| Data type | String | Drop down |
| Possible values | disabled (default) enabled |
Not configured Disabled (Default) Enabled |
Note
Available in Defender for Endpoint version 101.45.00 or later.
Run a scan after definitions are updated
Important
This feature works only when the enforcement level is set to real-time.
Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting triggers an antivirus scan on the running processes of the device.
| Description | JSON Value | Defender portal value |
|---|---|---|
| Key | scanAfterDefinitionUpdate |
Enable Scanning after definition update |
| Data type | Boolean | Drop down |
| Possible values | true (default) false |
Not configuredDisabledEnabled (Default) |
Note
Available in Defender for Endpoint version 101.45.00 or later.
Scan archives (on-demand antivirus scans only)
Specifies whether to scan archives during on-demand antivirus scans.
| Description | JSON Value | Defender portal value |
|---|---|---|
| Key | scanArchives |
Enable scanning of archives |
| Data type | Boolean | Drop down |
| Possible values | true (default) false |
Not configured Disabled Enabled (Default) |
Note
- Available in Microsoft Defender for Endpoint version
101.45.00or later. - Archive files are never scanned during RTP. Files in the archive are scanned after you extract them. The scanArchives option forces archive scanning during on-demand scans only.
Degree of parallelism for on-demand scans
Specifies the degree of parallelism for on-demand scans. This setting corresponds to the number of processor threads used by the scan. This setting affects CPU usage and the duration of on-demand scans.
| Description | JSON Value | Defender portal value |
|---|---|---|
| Key | maximumOnDemandScanThreads |
maximum on demand scan threads |
| Data type | Integer | Toggle Switch & Integer |
| Possible values | 2 (default). Allowed values are integers between 1 and 64. |
Not Configured (Default toggle off defaults to 2)Configured (toggle on) and integer between 1 and 64. |
Note
Available in Microsoft Defender for Endpoint version 101.45.00 or later.
Exclusion merge policy
Note
We recommend configuring exclusions and the merge policy in exclusionSettings. This approach allows you to configure epp and global scope exclusions with a single mergePolicy. The settings in this section apply only to epp exclusions unless the merge policy in exclusionSettings is admin_only.
Specifies whether to use user-defined exclusions on the device. Valid values are:
admin_only: Use only admin-defined exclusions configured by Defender for Endpoint policy. Use this value to prevent users from defining their own exclusions.merge: Use a combination of admin-defined and user-defined exclusions.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | exclusionsMergePolicy |
Exclusions merge |
| Data type | String | Drop down |
| Possible values | merge (default)admin_only |
Not configuredmerge (Default)admin_only |
Note
Available in Defender for Endpoint version 100.83.73 or later.
Scan exclusions
Entities excluded from scans. You specify exclusions as an array of items. Admins can specify as many elements as necessary, in any order. You specify exclusions using full paths, extensions, or file names.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | exclusions |
Scan exclusions |
| Data type | Dictionary (nested preference) | Dynamic Properties List |
See the following subsections for a description of the dictionary contents.
Type of exclusion
Specifies the type of content excluded from scans.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | $type |
Type |
| Data type | String | Drop Down |
| Possible values | excludedPath excludedFileExtension excludedFileName |
Path File extension Process name |
Path to excluded content
Exclude content from the scan by full file path.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | path | Path |
| Data type | String | String |
| Possible values | valid paths | valid paths |
| Comments | Applicable only if $type is excludedPath |
Accessed in Edit instance popup |
Path type (file / directory)
Specifies whether the path property refers to a file or a directory.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | isDirectory |
Is directory |
| Data type | Boolean | Drop down |
| Possible values | false (default) true |
EnabledDisabled |
| Comments | Applicable only if $type is excludedPath |
Accessed in Edit instance popup |
File extension excluded from the scan
Exclude content from the scan by file extension.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | extension | File extension |
| Data type | String | String |
| Possible values | valid file extensions | valid file extensions |
| Comments | Applicable only if $type is excludedFileExtension |
Accessed in Configure instance popup |
Process excluded from the scan
Specifies a process for which all file activity is excluded from scanning. You can specify the process by name (for example, cat) or full path (for example, /bin/cat).
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | name | File name |
| Data type | String | String |
| Possible values | any string | any string |
| Comments | Applicable only if $type is excludedFileName |
Accessed in Configure instance popup |
Muting nonexec mounts
Specifies the behavior of RTP on mount points marked as noexec. Valid values are:
- Unmuted (
unmute): All mount points are scanned as part of RTP. This value is the default. - Muted (
mute): Mount points marked asnoexecaren't scanned as part of RTP.- Database servers can keep database file.
- File servers can keep data file mount points.
- Backup can keep data file mount points.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | nonExecMountPolicy |
non execute mount mute |
| Data type | String | Drop down |
| Possible values | unmute (default) mute |
Not configured unmute (Default) mute |
Note
Available in Defender for Endpoint version 101.85.27 or later.
Unmonitor filesystems
Specifies the filesystems that aren't monitored by (are excluded from) RTP. The specified filesystems are still scanned by Quick, Full, and custom scans in Microsoft Defender Antivirus.
When you add or remove a filesystem from the unmonitored list, Microsoft validates the eligibility of the filesystem for monitoring by RTP (removed from the list) or no monitoring by RTP (added to the list).
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | unmonitoredFilesystems |
Unmonitored Filesystems |
| Data type | Array of strings | Dynamic String List |
By default, the following filesystems are monitored by RTP:
btrfsecryptfsext2ext3ext4fuseblkjfsoverlayramfsreiserfstmpfsvfatxfs
By default, the following filesystems are unmonitored by RTP:
cifs*fusenfsnfs4*smb*
These filesystems are also unmonitored by Quick and Full scans, but are scannable by custom scans.
* Currently, RTP monitoring of this filesystem is in Preview.
For example, to remove nfs and nfs4 from the list of unmonitored filesystems (which means nfs and nfs4 are monitored by RTP after validation), update the managed config file with the following entry:
{
"antivirusEngine":{
"unmonitoredFilesystems": ["cifs","fuse","smb"]
}
}
To remove all entries from the list of unmonitored filesystems, use the following entry:
{
"antivirusEngine":{
"unmonitoredFilesystems": []
}
}
Configure file hash computation feature
Enables or disables file hash computation for files scanned by Defender for Endpoint. Enabling this feature might affect device performance. For more information, see Create indicators for files.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableFileHashComputation |
Enable file hash computation |
| Data type | Boolean | Drop down |
| Possible values | false (default) true |
Not configuredDisabled (default)Enabled |
Note
Available in Defender for Endpoint version 101.85.27 or later.
Allowed threats
Specifies the names of threats that aren't blocked by Defender for Endpoint. Instead, these threats are allowed to run.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | allowedThreats |
Allowed threats |
| Data type | Array of strings | Dynamic String List |
Disallowed threat actions
Restricts the allowed actions by the device user when threats are detected. The actions included in this list aren't displayed in the user interface.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | disallowedThreatActions |
Disallowed threat actions |
| Data type | Array of strings | Dynamic String List |
| Possible values | allow (restricts users from allowing threats) restore (restricts users from restoring threats from the quarantine) |
allow (restricts users from allowing threats) restore (restricts users from restoring threats from the quarantine) |
Note
Available in Defender for Endpoint version 100.83.73 or later.
Threat type settings
Control how certain threat types are handled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | threatTypeSettings |
Threat type settings |
| Data type | Dictionary (nested preference) | Dynamic Properties List |
See the following subsections for a description of the dictionary contents.
Threat type
Specifies the type of threat.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | key | Threat type |
| Data type | String | Drop down |
| Possible values | potentially_unwanted_application archive_bomb |
potentially_unwanted_application archive_bomb |
Action to take
Specifies the action when the previously specified threats types are detected. Valid values are:
- Audit: The device isn't protected against this type of threat, but an entry about the threat is logged. This value is the Default.
- Block: The device is protected against this type of threat and you're notified in the Microsoft Defender portal.
- Off: The device isn't protected against this type of threat and nothing is logged.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | value | Action to take |
| Data type | String | Drop down |
| Possible values | audit (default) block off |
audit block off |
Threat type settings merge policy
Specifies whether to use user-defined threat type settings on the device. Valid values are:
admin_only: Use only admin-defined threat type settings. Use this value to prevent users from defining their own threat type settings.merge: Use a combination of admin-defined and user-defined threat type settings.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | threatTypeSettingsMergePolicy |
Threat type settings merge |
| Data type | String | Drop down |
| Possible values | merge (default) admin_only |
Not configuredmerge (Default)admin_only |
Note
Available in Defender for Endpoint version 100.83.73 or later.
Antivirus scan history retention (in days)
Specify the number of days that results are retained in the scan history on the device. Old scan results are removed from the history. Old quarantined files are also removed from the disk.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | scanResultsRetentionDays |
Scan results retention |
| Data type | String | Toggle switch and Integer |
| Possible values | 90 (default). Valid values are 1 to 180 days. |
Not configured (toggle off; 90-day default) Configured (toggle on) and allowed value 1 to 180 days. |
Note
Available in Defender for Endpoint version 101.04.76 or later.
Maximum number of items in the antivirus scan history
Specify the maximum number of entries to keep in the scan history. Entries include all on-demand scans and all antivirus detections.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | scanHistoryMaximumItems |
Scan history size |
| Data type | String | Toggle and Integer |
| Possible values | 10000 (default). Allowed values are from 5000 items to 15000 items. |
Not configured (toggle off - 10000 default)Configured (toggle on) and allowed value from 5000 to 15000 items. |
Note
Available in Defender for Endpoint version 101.04.76 or later.
Exclusion setting preferences
Note
Global exclusions are available in Defender for Endpoint version 101.24092.0001 or later.
The exclusionSettings section of the configuration profile configures various exclusions for Microsoft Defender for Endpoint for Linux.
| Description | JSON Value |
|---|---|
| Key | exclusionSettings |
| Data type | Dictionary (nested preference) |
See the following sections for a description of the dictionary contents.|
Note
- Previously configured antivirus exclusions in the antivirusEngine section in managed JSON continue to function.
- You can specify antivirus exclusions in this section or in the
antivirusEngine) section. You should add all other exclusion type in this section, because theexclusionSettingssection is designed to centrally host all exclusion types.
Merge policy
Exclusion merge policy
Specifies whether to use user-defined exclusions on the device. Valid values are:
admin_only: Use only admin-defined exclusions configured by Defender for Endpoint policy. Use this value to prevent users from defining their own exclusions.merge: Use a combination of admin-defined and user-defined exclusions.
This setting applies to exclusions of all scopes.
| Description | JSON Value |
|---|---|
| Key | mergePolicy |
| Data type | String |
| Possible values | merge (default) admin_only |
Note
Available in Defender for Endpoint version Sept 2023 or later.
Exclusions
Entities excluded from scans. You specify exclusions as an array of items. Admins can specify as many elements as necessary, in any order. You specify exclusions using full paths, extensions, or file names. For each exclusion, you can specify a scope. The default scope is global.
| Description | JSON Value |
|---|---|
| Key | exclusions |
| Data type | Dictionary (nested preference) |
See the following subsections for a description of the dictionary contents.
Type of exclusion
Specifies the type of content excluded from scans.
| Description | JSON Value |
|---|---|
| Key | $type |
| Data type | String |
| Possible values | excludedPathexcludedFileExtension excludedFileName |
Scope of exclusion (optional)
Specifies the exclusion scope of excluded content. Valid values are:
eppglobal
If you don't specify an exclusion scope in managed configuration, the value global is used.
Note
Previously configured antivirus exclusions under antivirusEngine in managed JSON continue to function with the scope epp because they were in the antivirusEngine section.
| Description | JSON Value |
|---|---|
| Key | scopes |
| Data type | Set of strings |
| Possible values | epp global |
Note
Previously applied exclusions using (mdatp_managed.json) or by CLI are unaffected. The scope for these exclusions is epp because they were in the antivirusEngine section.
Path to excluded content
Exclude content from scans by full file path.
| Description | JSON Value |
|---|---|
| Key | path |
| Data type | String |
| Possible values | valid paths |
| Comments | Applicable only if $type is excludedPath. Wildcards aren't supported if the exclusion has a global scope. |
Path type (file / directory)
Specifies whether the path property refers to a file or a directory.
Note
The File path must already exist if you add a file exclusion with global scope.
| Description | JSON Value |
|---|---|
| Key | isDirectory |
| Data type | Boolean |
| Possible values | false (default) true |
| Comments | Applicable only if $type is excludedPath. Wildcards aren't supported if the exclusion has a global scope. |
File extension excluded from the scan
Exclude content from scans by file extension.
| Description | JSON Value |
|---|---|
| Key | extension |
| Data type | String |
| Possible values | valid file extensions |
| Comments | Applicable only if $type is excludedFileExtension. Not supported if the exclusion has a global scope. |
Process excluded from the scan
Exclude all file activity by a process from scans. Valid values are:
- Process name. For example,
cat. - Full path. For example,
/bin/cat.
| Description | JSON Value |
|---|---|
| Key | name |
| Data type | String |
| Possible values | any string |
| Comments | Applicable only if $type is excludedFileName. Wildcards and process names aren't supported if the exclusion has a global scope. You need to provide the full path. |
Advanced scan options
You can configure the following settings to enable certain advanced scanning features.
Important
Enabling these features might affect device performance. We recommended the default values unless recommended otherwise by Microsoft Support.
Configure scanning of file modify permissions events
Specifies whether Defender for Endpoint scans files when their permissions changed to set the executed bits.
Note
This setting is meaningful only when enableFilePermissionEvents is enabled. For more information, see the Advanced optional features section later in this article.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | scanFileModifyPermissions |
Not available |
| Data type | Boolean | n/a |
| Possible values | false (default) true |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Configure scanning of file modify ownership events
Specifies whether Defender for Endpoint scans files with changed ownership.
Note
This setting is meaningful only when enableFileOwnershipEvents is enabled. For more information, see the Advanced optional features section later in this article.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | scanFileModifyOwnership |
Not available |
| Data type | Boolean | n/a |
| Possible values | false (default) true |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Configure scanning of raw socket events
Specifies whether Defender for Endpoint scans network socket events. For example:
- Creating raw sockets / packet sockets.
- Setting socket options.
Note
- This setting is meaningful only when Behavior Monitoring is enabled.
- This setting is meaningful only when
enableRawSocketEventis enabled. For more information, see the Advanced optional features section later in this article.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | scanNetworkSocketEvent |
Not available |
| Data type | Boolean | n/a |
| Possible values | false (default) true |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Cloud-delivered protection preferences
The cloudService entry in the configuration profile configures the cloud-driven protection feature.
Note
Cloud-delivered protection is applicable with any Enforcement level settings (real_time, on_demand, or passive).
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | cloudService |
Cloud delivered protection preferences |
| Data type | Dictionary (nested preference) | Collapsed section |
See the following subsections for a description of the dictionary contents and policy settings.
Enable or disable cloud delivered protection
Specify whether cloud-delivered protection is enabled on the device. To improve the security, we recommend keeping this feature turned on.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enabled |
Enable cloud delivered protection |
| Data type | Boolean | Drop down |
| Possible values | true (default) false |
Not configured Disabled Enabled (Default) |
Diagnostic collection level
Specify the level of diagnostic information sent to Microsoft. For more information, see Privacy for Microsoft Defender for Endpoint on Linux.
Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | diagnosticLevel |
Diagnostic data collection level |
| Data type | String | Drop down |
| Possible values | optional required (default) |
Not configuredoptional (Default)required |
Configure cloud block level
Specify the aggressiveness of Defender for Endpoint in blocking and scanning suspicious files. Valid values are:
- Normal (
normal): The value is the default. - Moderate (
moderate): Deliver verdicts only for high confidence detections. - High (
high): Aggressively block unknown files while optimizing for performance. This value has greater chance of blocking unharmful files. - High Plus (
high_plus): Aggressively block unknown files and apply extra protection measures. This value might affect client device performance. - Zero Tolerance (
zero_tolerance): Block all unknown programs.
If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan. Otherwise, it's less aggressive and therefore blocks and scans with less frequency.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | cloudBlockLevel |
Configure cloud block level |
| Data type | String | Drop down |
| Possible values | normal (default) moderate high high_plus zero_tolerance |
Not configuredNormal (default) Moderate High High_Plus Zero_Tolerance |
Note
Available in Defender for Endpoint version 101.56.62 or later.
Enable or disable automatic sample submissions
Specifies whether suspicious samples (likely to contain threats) are sent to Microsoft. Valid values are:
- None: No suspicious samples are submitted to Microsoft.
- Safe: Only suspicious samples that don't contain personal information are automatically submitted. This value is the default.
- All: All suspicious samples are submitted to Microsoft.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | automaticSampleSubmissionConsent |
Enable automatic sample submissions |
| Data type | String | Drop down |
| Possible values | none safe (default) all |
Not configuredNoneSafe (Default)All |
Enable or disable automatic security intelligence updates
Specifies whether security intelligence updates are installed automatically.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | automaticDefinitionUpdateEnabled |
Automatic security intelligence updates |
| Data type | Boolean | Drop down |
| Possible values | true (default) false |
Not configuredDisabledEnabled (Default) |
Depending on the enforcement level, the automatic security intelligence updates are installed differently. In RTP mode, updates are installed periodically. In Passive or On-Demand mode, updates are installed before every scan.
Advanced optional features
Use the following settings to enable certain advanced optional features.
Important
Enabling these features might affect device performance. We recommend the default values unless recommended otherwise by Microsoft Support.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | features | Not available |
| Data type | Dictionary (nested preference) | n/a |
See the following subsections for a description of the dictionary contents.
Module load feature
Specifies whether module load events (file open events on shared libraries) are monitored.
Note
This setting is meaningful only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | moduleLoad |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.68.80 or later.
Remediate Infected File feature
Specifies whether infected processes that open or load infected files get remediated in RTP mode.
Note
These processes don't appear in the threat list because they aren't malicious. THe processes are terminated only because they loaded the threat file in memory.
| Description | JSON Value | Defender Portal Value |
|---|---|---|
| Key | remediateInfectedFile | Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.24122.0001 or later.
Supplementary sensor configurations
Use the following settings to configure certain advanced supplementary sensor features.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | supplementarySensorConfigurations |
Not available |
| Data type | Dictionary (nested preference) | n/a |
See the following sections for a description of the dictionary contents.
Configure monitoring of file modify permissions events
Specifies whether file modify permissions events (chmod) are monitored.
Note
When this feature is enabled, Defender for Endpoint monitors changes to the executed bits of files, but doesn't scan these events. For more information, see the Advanced scanning features section.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableFilePermissionEvents |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Configure monitoring of file modify ownership events
Specifies whether file modify ownership events (chown) are monitored.
Note
When this feature is enabled, Defender for Endpoint monitors changes to the ownership of files, but doesn't scan these events. For more information, see the Advanced scanning features.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableFileOwnershipEvents |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Configure monitoring of raw socket events
Specifies whether network socket events involving creation of raw sockets / packet sockets, or setting socket option, are monitored.
Note
- This feature is applicable only when Behavior Monitoring is enabled.
- When this feature is enabled, Defender for Endpoint monitors these network socket events, but doesn't scan these events. For more information, see Advanced scanning features section.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableRawSocketEvent |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.|
Configure monitoring of boot loader events
Specifies whether boot loader events are monitored and scanned.
Note
This setting is meaningful only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableBootLoaderCalls |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.68.80 or later.
Configure monitoring of ptrace events
Specifies whether ptrace events are monitored and scanned.
Note
This feature is applicable only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableProcessCalls |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.68.80 or later.
Configure monitoring of pseudofs events
Specifies whether pseudofs events are monitored and scanned.
Note
This feature is applicable only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enablePseudofsCalls |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.68.80 or later.
Configure monitoring of module load events using eBPF
Specifies whether module load events are monitored by eBPF and scanned.
Note
This feature is applicable only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableEbpfModuleLoadEvents |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.68.80 or later.
Configure monitoring of open events from specific filesystems using eBPF
Specifies whether open events from procfs are monitored by eBPF.
Note
This feature is applicable only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableOtherFsOpenEvents |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.24072.0001 or later.
Configure source enrichment of events using eBPF
Specifies whether events are enriched with metadata at source in eBPF.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableEbpfSourceEnrichment |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.24072.0001 or later.
Enable Antivirus Engine Cache
Specifies whether metadata of events scanned by the antivirus engine are cached.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enableAntivirusEngineCache |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.24072.0001 or later.
Report suspicious antivirus events to EDR
Specifies whether suspicious events from Antivirus are reported to EDR.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | sendLowfiEvents |
Not available |
| Data type | String | n/a |
| Possible values | disabled (default) enabled |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Network protection configurations
Note
- Currently, this feature is in Preview.
- These settings are meaningful only when Network Protection is on. For more information, see Turn on network protection for Linux.
Use the following settings to configure advanced Network Protection inspection features that control traffic inspected by Network Protection.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | networkProtection |
Network protection |
| Data type | Dictionary (nested preference) | Collapsed section |
See the following subsections for a description of the dictionary contents.
Enforcement Level
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | enforcementLevel |
Enforcement Level |
| Data type | String | Drop down |
| Possible values | disabled (default) audit block |
Not configureddisabled (default)auditblock |
Configure ICMP inspection
Specifies whether ICMP events are monitored and scanned.
Note
This feature is applicable only when Behavior Monitoring is enabled.
| Description | JSON Value | Microsoft Defender portal value |
|---|---|---|
| Key | disableIcmpInspection |
Not available |
| Data type | Boolean | n/a |
| Possible values | true (default) false |
n/a |
Note
Available in Defender for Endpoint version 101.23062.0010 or later.
Add tag or group ID to the configuration profile
When you first run the mdatp health command, the tag and group ID values are blank. To add a tag or group ID to the mdatp_managed.json file, follow these steps:
Open the configuration profile from the path
/etc/opt/microsoft/mdatp/managed/mdatp_managed.json.In the
cloudServiceblock at the bottom of the file, add the required tag or group ID at the end of the closing curly bracket for thecloudServiceblock as shown in the following example.}, "cloudService": { "enabled": true, "diagnosticLevel": "optional", "automaticSampleSubmissionConsent": "safe", "automaticDefinitionUpdateEnabled": true, "proxy": "http://proxy.server:port/" }, "edr": { "groupIds":"GroupIdExample", "tags": [ { "key": "GROUP", "value": "Tag" } ] } }Note
- Add a comma after the closing curly bracket at the end of the
cloudServiceblock. - Verify there are two closing curly brackets after you add
tagsorgroupIdsblocks as shown in the example. - Currently, the only supported key name for tags is
GROUP.
- Add a comma after the closing curly bracket at the end of the
Configuration profile validation
The configuration profile must be a valid JSON-formatted file. Many tools are available for you to verify the configuration profile. For example, run the following command if you have python installed on your device:
python -m json.tool mdatp_managed.json
If the file is formatted correctly, the command returns the exit code 0. Otherwise, errors are displayed and the command returns the exit code 1.
Verifying that the mdatp_managed.json file is working as expected
To verify that your /etc/opt/microsoft/mdatp/managed/mdatp_managed.json is working properly, you should see [managed] next to these settings:
cloud_enabledcloud_automatic_sample_submission_consentpassive_mode_enabledreal_time_protection_enabledautomatic_definition_update_enabled
Tip
For most configurations in mdatp_managed.json, you don't need to restart the mdatp daemon. The following configurations require a daemon restart to take effect:
cloud-diagnosticlog-rotation-parameters
Configuration profile deployment
After you create the configuration profile for your organization, you can deploy it using your current management tools. Defender for Endpoint on Linux reads the managed configuration from /etc/opt/microsoft/mdatp/managed/mdatp_managed.json.