Skip to content

Commit 2e79130

Browse files
authored
Merge pull request #22417 from MicrosoftDocs/siosulli-patch-9
Update linux-support-ebpf.md
2 parents 9ec7a56 + e85b436 commit 2e79130

1 file changed

Lines changed: 19 additions & 12 deletions

File tree

microsoft-365/security/defender-endpoint/linux-support-ebpf.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ ms.date: 07/19/2023
2121

2222
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
2323

24-
> [!IMPORTANT]
25-
> Some information relates to prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
26-
2724
**Applies to:**
2825

2926
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
@@ -47,7 +44,8 @@ With eBPF, events previously obtained from the auditd event provider now flow fr
4744
In addition, the eBPF sensor uses capabilities of the Linux kernel without requiring the use of a kernel module that helps increase system stability.
4845

4946
> [!NOTE]
50-
> In the preview version eBPF will be used in conjunction with auditd while auditd will be used only for logging data and network protection events and will capture these events without any custom rules and flow them automatically. Be aware that auditd will be removed in future versions.
47+
> eBPF will be used in conjunction with auditd. Auditd will be used to capture user login events only and flow them automatically. Be aware that auditd will be gradually removed in future versions.
48+
5149

5250
## System prerequisites
5351

@@ -64,22 +62,34 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
6462
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
6563
| Oracle Linux UEK | 7.9 | 5.4 |
6664

67-
When the eBPF sensor is enabled on an endpoint, Defender for Endpoint on Linux updates supplementary_events_subsystem to ebpf.
68-
6965
## Use eBPF
7066

71-
The eBPF sensor will be automatically turned on and gradually rolled out across all insider machines over the coming days following this publication. You will need Microsoft Defender for Endpoint version 101.23062.0005 or later to experience the most recent improvements using the new sensor.
67+
The eBPF sensor will be automatically enabled for all customers on agent versions “101.23082.0006” and above. When the eBPF sensor is enabled on an endpoint, Defender for Endpoint on Linux updates supplementary_events_subsystem to ebpf.
7268

7369
:::image type="content" source="../../media/defender-endpoint/ebpf-subsystem-linux.png" alt-text="ebpf subsystem highlight in the mdatp health command" lightbox="../../media/defender-endpoint/ebpf-subsystem-linux.png":::
7470

75-
If you're running a production build and interested in evaluating the eBPF preview functionality, you can use the following mdatp config command (requires privileges):
71+
If you want to manually disable eBPF, you can run the following command:
7672

7773
```bash
7874
sudo mdatp config ebpf-supplementary-event-provider --value [enabled/disabled]
7975
```
8076

8177
> [!IMPORTANT]
82-
> If you disable eBPF, the supplementary event provider switches back to auditd.
78+
> If you disable eBPF, the supplementary event provider switches back to auditd. </br>
79+
> In the event eBPF doesn't become enabled or is not supported on any specific kernel, it will automatically switch back to auditd and retain all auditd custom rules.
80+
81+
### Immutable mode of Auditd
82+
83+
After enabling eBPF, customers using auditd in immutable mode must reboot their system in order to clear the audit rules added by Microsoft Defender for Endpoint. This is because immutable mode of auditd freezes the rules file and prevents it from being edited or overwritten. To verify that the audit rules have been cleared, run the following command after the reboot:
84+
85+
```bash
86+
% sudo auditctl -l
87+
```
88+
The output of the command should show no rules or any user added rules. If the rules weren't removed, follow these steps to clear the audit rules file:
89+
90+
1. Switch to ebpf mode
91+
2. Remove the file /etc/audit/rules.d/mdatp.rules
92+
3. Reboot the machine
8393

8494
### Troubleshooting and diagnostics
8595

@@ -95,9 +105,6 @@ The following two sets of data help analyze potential issues and determine the m
95105

96106
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
97107

98-
> [!NOTE]
99-
> In the preview version, diagnostic capabilities for top processes consuming eBPF resources and troubleshooting capabilities for configuring eBPF exclusions are not supported. These functionalities will be available in future versions.
100-
101108
## See also
102109

103110
- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md)

0 commit comments

Comments
 (0)