|
| 1 | +--- |
| 2 | +title: Install Microsoft Defender for Endpoint on Linux |
| 3 | +description: Describes how to install and use Microsoft Defender for Endpoint on Linux. |
| 4 | +ms.service: defender-endpoint |
| 5 | +author: KesemSharabi |
| 6 | +ms.author: kesharab |
| 7 | +ms.localizationpriority: medium |
| 8 | +manager: bagol |
| 9 | +audience: ITPro |
| 10 | +ms.collection: |
| 11 | +- m365-security |
| 12 | +- tier3 |
| 13 | +- mde-linux |
| 14 | +ms.topic: article |
| 15 | +ms.subservice: linux |
| 16 | +search.appverid: met150 |
| 17 | +ms.date: 11/09/2025 |
| 18 | +appliesto: |
| 19 | + - Microsoft Defender for Business |
| 20 | + - Microsoft Defender for Endpoint Plan 1 |
| 21 | + - Microsoft Defender for Endpoint Plan 2 |
| 22 | + |
| 23 | +--- |
| 24 | +# Install Defender for Endpoint on Linux |
| 25 | + |
| 26 | +This article is aimed at security admins who want to install [Defender for Endpoint](microsoft-defender-endpoint.md) on Linux servers. The article covers prerequisites, and links to additional deployment and configuration documents. |
| 27 | + |
| 28 | +## Prerequisites |
| 29 | + |
| 30 | +This section lists the prerequisites for installing Defender for Endpoint on Linux. |
| 31 | + |
| 32 | +### Minimum system requirements |
| 33 | + |
| 34 | +* **CPU** - One CPU core |
| 35 | +* **Disk Space** - 2GB |
| 36 | +* **Memory** - 1GB of RAM |
| 37 | + |
| 38 | +### Supported Linux distributions |
| 39 | + |
| 40 | +The table in this section lists supported distributions. When running Defender for Endpoint on unsupported distributions, the kernel version has to be at least `3.10.0-327`. |
| 41 | + |
| 42 | +|Distribution |Version |x64 (AMD64/EM64T) | |
| 43 | +|---------|---------|---------| |
| 44 | +|Alma |8.4 and higher | | |
| 45 | +|Amazon Linux |2</br>2023 |2</br>2023 | |
| 46 | +|CentOS |7.2 and higher, excluding CentOS Stream</br>CentOS Stream 9 and higher | | |
| 47 | +|Debian |9 - 12 |11</br>12 | |
| 48 | +|Fedora |33 - 42 | | |
| 49 | +|Mariner |2 | | |
| 50 | +|Oracle Linux |7.2 and higher |8.x</br>9.x | |
| 51 | +|Red Hat Enterprise Linux |7.2 and higher | | |
| 52 | +|RHEL | |8.x</br>9.x | |
| 53 | +|Rocky |8.7 and higher | | |
| 54 | +|SUSE Linux Enterprise Server |12.x</br>15.x |SP5</br>SP6 | |
| 55 | +|Ubuntu |16.04 LTS</br>18.04 LTS</br>20.04 LTS</br>22.04 LTS</br>24.04 LTS |20.04</br>22.04</br>24.04 | |
| 56 | + |
| 57 | +### Permissions |
| 58 | + |
| 59 | +To install Defender for Endpoint on Linux, you need the following permissions: |
| 60 | + |
| 61 | +* Administrative privileges on the Linux server endpoint |
| 62 | +* An appropriate [role](/defender-endpoint/prepare-deployment#role-based-access-control) assigned in Defender for Endpoint |
| 63 | + |
| 64 | +### Network access |
| 65 | + |
| 66 | +You need access to `*.endpoint.security.microsoft.com`. If needed, you can [configure static proxy access](linux-static-proxy-configuration.md). |
| 67 | + |
| 68 | +### Management tools |
| 69 | + |
| 70 | +Installed *systemd* system manager. |
| 71 | + |
| 72 | +### Supported filesystems for scans |
| 73 | + |
| 74 | +This table lists supported filesystems for [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), and quick, full, and custom scans. |
| 75 | + |
| 76 | +|Real-time protection and quick or full scans|Custom scans| |
| 77 | +|---|---| |
| 78 | +|`btrfs`|All filesystems are supported| |
| 79 | +|`ecryptfs`|`Efs`| |
| 80 | +|`ext2`|`S3fs`| |
| 81 | +|`ext3`|`Blobfuse`| |
| 82 | +|`ext4`|`Lustr`| |
| 83 | +|`fuse`|`glustrefs`| |
| 84 | +|`fuseblk`|`Afs`| |
| 85 | +|`jfs`|`sshfs`| |
| 86 | +|`nfs` (v3 only)|`cifs`| |
| 87 | +|`overlay`|`smb`| |
| 88 | +|`ramfs`|`gcsfuse`| |
| 89 | +|`reiserfs`|`sysfs`| |
| 90 | +|`tmpfs`| | |
| 91 | +|`udf`| | |
| 92 | +|`vfat`| | |
| 93 | +|`xfs`| | |
| 94 | + |
| 95 | +## Deploy Defender for Endpoint on Linux |
| 96 | + |
| 97 | +The links in this section describe the methods you can use to deploy Defender for Endpoint on Linux. |
| 98 | + |
| 99 | +Installing Defender for Endpoint in any location other than the default install path isn't supported. |
| 100 | + |
| 101 | +Defender for Endpoint creates an *mdatp* user with random UID and GID values. If you want to control these values, create an *mdatp* user before installation using the `/usr/sbin/nologin` shell option. For example, `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`. |
| 102 | + |
| 103 | +* [Installer script](/defender-endpoint/linux-installer-script) |
| 104 | +* [Ansible](/defender-endpoint/linux-install-with-ansible) |
| 105 | +* [Chef](/defender-endpoint/linux-deploy-defender-for-endpoint-with-chef) |
| 106 | +* [Puppet](/defender-endpoint/linux-install-with-puppet) |
| 107 | +* [SaltStack](/defender-endpoint/linux-install-with-saltack) |
| 108 | +* [Manual deployment](/defender-endpoint/linux-install-manually) |
| 109 | +* [Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint) |
| 110 | +* [Deployment guidance for Defender for Endpoint on Linux Server with SAP](/defender-endpoint/mde-linux-deployment-on-sap) |
| 111 | + |
| 112 | +## Configure Defender for Endpoint on Linux |
| 113 | + |
| 114 | +After installing Defender for Endpoint on Linux, use the links in this section to configure your system. |
| 115 | + |
| 116 | +### Security settings |
| 117 | + |
| 118 | +To manage your Defender for Endpoint security settings, select one of these configuration options. |
| 119 | + |
| 120 | +* [Security settings management](/defender-endpoint/mde-security-settings-management) - Use the Defender portal to configure and manage your policies. |
| 121 | +* [Configure security settings on Linux](/defender-endpoint/linux-preferences) - Use a JSON file to configure your security settings. |
| 122 | + |
| 123 | +### Exclusions |
| 124 | + |
| 125 | +High input and output (I/O) workloads from certain applications can experience performance issues when Defender for Endpoint is installed. Such applications include *Jenkins*, *Jira*, and database workloads such as *OracleDB* and *Postgres*. If you see performance degradation, consider setting exclusions for trusted applications. |
| 126 | + |
| 127 | +* [Configure and validate exclusions](/defender-endpoint/linux-exclusions) |
| 128 | +* [Mistakes to avoid when defining exclusions](/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus) |
| 129 | + |
| 130 | +## Updates |
| 131 | + |
| 132 | +Microsoft publishes Defender for Endpoint [Linux software updates](linux-whatsnew.md) on a monthly basis. Each version of Defender for Endpoint on Linux is set to expire after nine months. To deploy new updates, follow the [deploy updates](linux-updates.md) instructions. |
0 commit comments