You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-connectivity.md
+40-9Lines changed: 40 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,18 +12,18 @@ ms.collection:
12
12
- mde-linux
13
13
ms.topic: troubleshooting-general
14
14
ms.subservice: linux
15
-
ms.date: 03/28/2025
15
+
ms.date: 04/27/2026
16
16
appliesto:
17
17
- Microsoft Defender for Endpoint Plan 1
18
18
- Microsoft Defender for Endpoint Plan 2
19
-
20
19
---
20
+
21
21
# Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
22
22
23
23
24
24
## Run the connectivity test
25
25
26
-
To test if Defender for Endpoint on Linux can communicate to the cloud with the current network settings, run a connectivity test from the command line:
26
+
To test if Microsoft Defender for Endpoint on Linux can communicate with the cloud using the current network settings, run a connectivity test from the command line:
27
27
28
28
```bash
29
29
mdatp connectivity test
@@ -48,9 +48,40 @@ Testing connection with https://uk-v20.events.data.microsoft.com/ping ... [OK]
48
48
Testing connection with https://v20.events.data.microsoft.com/ping ... [OK]
49
49
```
50
50
51
-
If the connectivity test fails, check if the device has Internet access. Also check to see if network connections are blocked by a proxy or firewall. For more information, see [Verify that devices can connect to Defender for Endpoint cloud services](mde-linux-prerequisites.md#verify-if-devices-can-connect-to-defender-for-endpoint-cloud-services).
51
+
If the connectivity test fails, check if the device has Internet access. Also check to see if a proxy or firewall blocks network connections. For more information, see [Verify that devices can connect to Defender for Endpoint cloud services](mde-linux-prerequisites.md#verify-if-devices-can-connect-to-defender-for-endpoint-cloud-services).
52
+
53
+
Check to see if the connection is under SSL or HTTPS inspection. If so, add Microsoft Defender for Endpoint to the allow list.
54
+
55
+
Failures with curl error 35 or 60 typically indicate certificate pinning rejection caused by TLS/SSL inspection. For diagnostic steps and resolution, see [TLS/SSL inspection](#tlsssl-inspection).
56
+
57
+
58
+
## TLS/SSL inspection
59
+
60
+
Microsoft Defender for Endpoint on Linux doesn't support TLS/SSL inspection.
61
+
62
+
| Symptom or error | What it indicates | Required action |
|`curl error 60`| Certificate validation failure. | TLS/SSL inspection is active. Configure a bypass. |
65
+
|`CERTIFICATE_VERIFY_FAILED`| Certificate chain has been replaced. | TLS/SSL inspection is active. Configure a bypass. |
66
+
|`HTTP 502 Bad Gateway`| TLS session disrupted by proxy or firewall. | TLS/SSL inspection is active. Configure a bypass. |
67
+
68
+
69
+
To verify whether TLS/SSL inspection is enabled, run the following commands:
52
70
53
-
Failures with curl error 35 or 60, indicate certificate pinning rejection. Check to see if the connection is under SSL or HTTPS inspection. If so, add Microsoft Defender for Endpoint to the allowlist.
Review the certificate issuer in the output. The issuer must be Microsoft, not your proxy certificate authority (CA). If it reflects your organization’s proxy or firewall certificate authority (CA), TLS/SSL inspection is active and breaking Microsoft Defender for Endpoint connectivity.
77
+
78
+
Make sure to exempt all Microsoft Defender for Endpoint service domains from TLS/SSL inspection on your proxy or firewall. After you apply the changes, run:
79
+
80
+
81
+
```bash
82
+
sudo systemctl restart mdatp
83
+
mdatp connectivity test
84
+
```
54
85
55
86
## Troubleshooting steps for environments without proxy or with transparent proxy
56
87
@@ -70,25 +101,25 @@ OK https://cdn.x.cp.wd.microsoft.com/ping
70
101
## Troubleshooting steps for environments with static proxy
71
102
72
103
> [!WARNING]
73
-
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
104
+
> PAC, WPAD, and authenticated proxies aren't supported. Ensure that you're using only a static proxy or transparent proxy.
74
105
>
75
-
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
106
+
> For security reasons, SSL inspection and intercepting proxies aren't supported. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store doesn't allow for interception.
76
107
77
108
If a static proxy is required, add a proxy parameter to the above command, where `proxy_address:port` correspond to the proxy address and port:
Ensure that you use the same proxy address and port as configured in the `/lib/system/system/mdatp.service` file. Check your proxy configuration if there are errors from the above commands.
114
+
Use the same proxy address and port as configured in the `/lib/system/system/mdatp.service` file. Check your proxy configuration if you see errors from the preceding commands.
84
115
85
116
To set the proxy for mdatp, use the following command:
86
117
87
118
```bash
88
119
mdatp config proxy set --value http://address:port
89
120
```
90
121
91
-
Upon success, attempt another connectivity test from the command line:
122
+
If the command succeeds, try another connectivity test from the command line:
0 commit comments