Skip to content

Commit 366c99f

Browse files
authored
Merge pull request #7193 from DeCohen/WI562935-linux-add-tlsssl-inspection-prohibition
## TLS/SSL inspection not supported
2 parents 942ac89 + 8c4003c commit 366c99f

1 file changed

Lines changed: 40 additions & 9 deletions

File tree

defender-endpoint/linux-support-connectivity.md

Lines changed: 40 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,18 +12,18 @@ ms.collection:
1212
- mde-linux
1313
ms.topic: troubleshooting-general
1414
ms.subservice: linux
15-
ms.date: 03/28/2025
15+
ms.date: 04/27/2026
1616
appliesto:
1717
- Microsoft Defender for Endpoint Plan 1
1818
- Microsoft Defender for Endpoint Plan 2
19-
2019
---
20+
2121
# Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
2222

2323

2424
## Run the connectivity test
2525

26-
To test if Defender for Endpoint on Linux can communicate to the cloud with the current network settings, run a connectivity test from the command line:
26+
To test if Microsoft Defender for Endpoint on Linux can communicate with the cloud using the current network settings, run a connectivity test from the command line:
2727

2828
```bash
2929
mdatp connectivity test
@@ -48,9 +48,40 @@ Testing connection with https://uk-v20.events.data.microsoft.com/ping ... [OK]
4848
Testing connection with https://v20.events.data.microsoft.com/ping ... [OK]
4949
```
5050

51-
If the connectivity test fails, check if the device has Internet access. Also check to see if network connections are blocked by a proxy or firewall. For more information, see [Verify that devices can connect to Defender for Endpoint cloud services](mde-linux-prerequisites.md#verify-if-devices-can-connect-to-defender-for-endpoint-cloud-services).
51+
If the connectivity test fails, check if the device has Internet access. Also check to see if a proxy or firewall blocks network connections. For more information, see [Verify that devices can connect to Defender for Endpoint cloud services](mde-linux-prerequisites.md#verify-if-devices-can-connect-to-defender-for-endpoint-cloud-services).
52+
53+
Check to see if the connection is under SSL or HTTPS inspection. If so, add Microsoft Defender for Endpoint to the allow list.
54+
55+
Failures with curl error 35 or 60 typically indicate certificate pinning rejection caused by TLS/SSL inspection. For diagnostic steps and resolution, see [TLS/SSL inspection](#tlsssl-inspection).
56+
57+
58+
## TLS/SSL inspection
59+
60+
Microsoft Defender for Endpoint on Linux doesn't support TLS/SSL inspection.
61+
62+
| Symptom or error | What it indicates | Required action |
63+
| ----------------------------------------------------------- | ------------------------------------------ | ------------------------------------------------------------- |
64+
| `curl error 60` | Certificate validation failure. | TLS/SSL inspection is active. Configure a bypass. |
65+
| `CERTIFICATE_VERIFY_FAILED` | Certificate chain has been replaced. | TLS/SSL inspection is active. Configure a bypass. |
66+
| `HTTP 502 Bad Gateway` | TLS session disrupted by proxy or firewall. | TLS/SSL inspection is active. Configure a bypass. |
67+
68+
69+
To verify whether TLS/SSL inspection is enabled, run the following commands:
5270

53-
Failures with curl error 35 or 60, indicate certificate pinning rejection. Check to see if the connection is under SSL or HTTPS inspection. If so, add Microsoft Defender for Endpoint to the allowlist.
71+
```bash
72+
curl -v https://winatp-gw-weu.microsoft.com 2>&1 | grep "issuer"
73+
curl -v https://packages.microsoft.com 2>&1 | grep "issuer"
74+
```
75+
76+
Review the certificate issuer in the output. The issuer must be Microsoft, not your proxy certificate authority (CA). If it reflects your organization’s proxy or firewall certificate authority (CA), TLS/SSL inspection is active and breaking Microsoft Defender for Endpoint connectivity.
77+
78+
Make sure to exempt all Microsoft Defender for Endpoint service domains from TLS/SSL inspection on your proxy or firewall. After you apply the changes, run:
79+
80+
81+
```bash
82+
sudo systemctl restart mdatp
83+
mdatp connectivity test
84+
```
5485

5586
## Troubleshooting steps for environments without proxy or with transparent proxy
5687

@@ -70,25 +101,25 @@ OK https://cdn.x.cp.wd.microsoft.com/ping
70101
## Troubleshooting steps for environments with static proxy
71102

72103
> [!WARNING]
73-
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
104+
> PAC, WPAD, and authenticated proxies aren't supported. Ensure that you're using only a static proxy or transparent proxy.
74105
>
75-
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
106+
> For security reasons, SSL inspection and intercepting proxies aren't supported. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store doesn't allow for interception.
76107
77108
If a static proxy is required, add a proxy parameter to the above command, where `proxy_address:port` correspond to the proxy address and port:
78109

79110
```bash
80111
curl -x http://proxy_address:port -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
81112
```
82113

83-
Ensure that you use the same proxy address and port as configured in the `/lib/system/system/mdatp.service` file. Check your proxy configuration if there are errors from the above commands.
114+
Use the same proxy address and port as configured in the `/lib/system/system/mdatp.service` file. Check your proxy configuration if you see errors from the preceding commands.
84115

85116
To set the proxy for mdatp, use the following command:
86117

87118
```bash
88119
mdatp config proxy set --value http://address:port
89120
```
90121

91-
Upon success, attempt another connectivity test from the command line:
122+
If the command succeeds, try another connectivity test from the command line:
92123

93124
```bash
94125
mdatp connectivity test

0 commit comments

Comments
 (0)