Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender XDR and better protect your organization's network.
You'll need to know the exact Linux distros and macOS versions that are compatible with Defender for Endpoint for the integration to work. For more information, see:
To onboard non-windows devices using a non-Microsoft solution:
In the navigation pane, select Partners and APIs > Connected Applications. Make sure the non-Microsoft solution is listed.
In the Connected Applications page, select the partner that supports your non-Windows devices.
Select View to open the partner's page. Follow the instructions provided on the page.
After creating an account or subscribing to the partner solution, you should get to a stage where an administrator (such as a tenant administrator) is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
Važno
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
Upozorenje
Repackaging the Defender for Endpoint installation package is not a supported scenario. Doing so can negatively impact the integrity of the product and lead to adverse results, including but not limited to triggering tampering alerts and updates failing to apply.
Offboard non-Windows devices
For macOS and Linux devices, you can choose to offboard through Microsoft Defender for Endpoint. In the navigation pane, select Settings > Offboard > Select Operating System to start the offboarding Process.
You can also offboard non-Windows devices by disabling the third-party integration. Enable coverage for devices running non-Windows platforms by integrating third-party solutions.
Learn about Microsoft Defender for Endpoint and its key capabilities, such as threat and vulnerability management, attack surface reduction, automated investigation and remediation, endpoint detection and response, and more.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.