Saturday, March 25, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Linux > Microsoft Defender has been improved for Linux endpoints

Microsoft Defender has been improved for Linux endpoints

Microsoft Defender has now been improved for Linux, it can isolate vulnerable Linux endpoints just as it does on Windows.


Ezgi Koc Ezgi Koc
February 2, 2023
2 min read
Microsoft Defender has been improved for Linux
  • There are some cases where you might need to disconnect a device from the network so you can stop the attacker from using it, isolating the endpoints can help in such situations.
  • Microsoft Defender for Endpoint now provides the same level of protection against Linux endpoints as it does on Windows.
  • It is recommended to use a split-tunneling VPN to protect Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection data.

Microsoft Defender can now isolate compromised Linux endpoints just as it does on Windows. Some attack scenarios may require you to disable a device from the network so you can stop the attacker from controlling it. This new feature works the same way on Linux as it does on Windows. This disables the device from communicating with the network, while still allowing the Defender for Endpoint service to monitor it.

Supports many enterprise distros

This new feature is supported by Microsoft Defender for Endpoint on all distributions of Linux that are listed below:

  • Red Hat Enterprise Linux 6.7 or higher (Preview)
  • Red Hat Enterprise Linux 7.2 or higher
  • Red Hat Enterprise Linux 8.x
  • Red Hat Enterprise Linux 9.x
  • CentOS 6.7 or higher (Preview)
  • CentOS 7.2 or higher
  • Ubuntu 16.04 LTS or higher LTS
  • Debian 9 or higher
  • SUSE Linux Enterprise Server 12 or higher
  • Oracle Linux 7.2 or higher
  • Oracle Linux 8.x
  • Amazon Linux 2
  • Fedora 33 or higher

The post announcing this also adds that when you isolate a device, only certain processes and websites are allowed to run. So, if you have a VPN tunnel connected to a device, it won’t be able to access the Microsoft Defender for Endpoint cloud service after you’ve isolated it. So Microsoft recommends using a split-tunneling VPN to protect Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection data.

Linux endpoint manual isolation

In the Microsoft 365 Defender portal, navigate to the device page of the Linux device. Click “Isolate Device”.

isolate device

You can see the progress of the action in the Action Center once it has been finished on the device. You can reconnect your device from the same menu.

Linux endpoint isolation using API

Linux isolation is available using APIs. For more details, please refer to the resource below: 

Isolate machine API

See more Linux News

A comprehensive guide to understanding Linux: What is Linux?


Tags: Microsoft DefenderWindows Defender
Ezgi Koc

Ezgi Koc

Ezgi Koc is an editor at Cloud7. She graduated from Ege University with a bachelor's degree in English Language and Literature. She has always had great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Linux Mint 21.2 “Victoria” preview

What's new in Linux Mint 21.2 “Victoria”?

Related News

What is a Daemon in Linux?

What is a Daemon in Linux?

March 24, 2023 6:30 pm
7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
Photopea: The best Photoshop alternative for Linux

Photopea review: The best free Photoshop alternative for Linux

How to manage DNS settings in Linux

How to manage DNS settings in Linux

March 23, 2023 9:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux
  • CloudFest 2023 is completed

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.