Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion defender-endpoint/linux-preferences.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Microsoft Defender for Endpoint on Linux includes antivirus, anti-malware protec
|Settings|Description|
|---|---|
|1. Configure static proxy discovery.|Configuring a static proxy helps ensure telemetry is submitted and helps avoid network timeouts. Perform this task during and after your Defender for Endpoint installation. <br/><br/> For more information, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md).|
|2. Configure your antivirus scans.|You can schedule automatic antivirus scans by using either Anacron or Crontab. <br/><br/> For more information, see the following articles: <ul><li>[Use Anacron to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux](schedule-antivirus-scan-anacron.md)</li><li>[Use Crontab to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux](schedule-antivirus-scan-crontab.md)</li></ul>|
|2. Configure your antivirus scans.|You can use the Microsoft Defender portal (Defender for Endpoint Security Settings Management) or by using either Anacron or Crontab. <br/><br/> For more information, see the following articles: <ul><li>[Defender for Endpoint Security Settings Management](#defender-for-endpoint-security-settings-management)<ul><li>[Use Anacron to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux](schedule-antivirus-scan-anacron.md)</li><li>[Use Crontab to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux](schedule-antivirus-scan-crontab.md)</li></ul>|
|3. Configure your security settings and policies.|You can use the Microsoft Defender portal (Defender for Endpoint Security Settings Management) or a configuration profile (`.json` file) to configure Defender for Endpoint on Linux. Or, you can use command line to configure certain settings. <br/><br/> For more information, see the following articles: <ul><li>[Defender for Endpoint Security Settings Management](#defender-for-endpoint-security-settings-management)</li><li> [Configuration profile](#configuration-profile)</li><li>[Command line](linux-resources.md#configure-from-the-command-line)</li></ul>|
|4. Configure and validate exclusions (as appropriate)|You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux. Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all associated antivirus detections, EDR alerts, and visibility for the excluded item. <br/><br/> For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).|
|5. Configure the eBPF-based sensor.|The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux is automatically enabled for all customers by default for agent versions `101.23082.0006` and later. It provides supplementary event data for Linux operating systems and helps reduce the possibility of conflicts between applications. <br/><br/> For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md).|
Expand Down
Loading