You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/security/defender-endpoint/mde-linux-deployment-on-sap.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ ms.date: 01/10/2024
27
27
28
28
This article provides deployment guidance for Microsoft Defender for Endpoint on Linux for SAP. You'll learn about recommended SAP OSS(Online Services System) notes, the system requirements, prerequisites, important configuration settings, recommended antivirus exclusions, and guidance on scheduling antivirus scans.
29
29
30
-
Conventional security defenses that have been commonly used to protect SAP systems such as isolating infrastructure behind firewalls and limiting interactive Operating System logons are no longer considered sufficient to mitigate modern sophisticated threats. It's essential to deploy modern defenses to detect and contain threats in real-time. SAP applications unlike most other workloads require basic assessment and validation before deploying Microsoft Defender for Endpoint. The Enterprise Security administrators should contact the SAP Basis Team prior to deploying Defender for Endpoint. The SAP Basis Team should be cross trained with a basic level of knowledge about Defender for Endpoint.
30
+
Conventional security defenses that have been commonly used to protect SAP systems such as isolating infrastructure behind firewalls and limiting interactive operating system logons are no longer considered sufficient to mitigate modern sophisticated threats. It's essential to deploy modern defenses to detect and contain threats in real-time. SAP applications unlike most other workloads require basic assessment and validation before deploying Microsoft Defender for Endpoint. The Enterprise Security administrators should contact the SAP Basis Team prior to deploying Defender for Endpoint. The SAP Basis Team should be cross trained with a basic level of knowledge about Defender for Endpoint.
31
31
32
32
## Recommended SAP OSS Notes
33
33
@@ -133,7 +133,7 @@ sudo service azsecd restart
133
133
sudo azsecd status
134
134
```
135
135
136
-
The following articles details how to configure AV exclusions for processes, files, and folders per individual VM:
136
+
The following articles detail how to configure AV exclusions for processes, files, and folders per individual VM:
137
137
138
138
-[Set up exclusions for Microsoft Defender Antivirus scans | Microsoft Learn](configure-exclusions-microsoft-defender-antivirus.md)
139
139
-[Common mistakes to avoid when defining exclusions | Microsoft Learn](common-exclusion-mistakes-microsoft-defender-antivirus.md)
@@ -153,7 +153,7 @@ Scheduled scans for SAP ECC, BW, CRM, SCM, Solution Manager, and other component
153
153
## Useful Commands & Links
154
154
155
155
If, during manual zypper installation on Suse an error “Nothing provides ‘policycoreutils’” occurs, refer to:
156
-
[Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md)
156
+
[Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
157
157
158
158
There are several command-line commands that can control the operation of mdatp. To enable the passive mode you can use the following command:
0 commit comments