Wiki source code of RangeeOS - Microsoft Defender einrichten
Last modified by Tobias Wintrich on 2025/09/04 12:50
Hide last authors
| author | version | line-number | content |
|---|---|---|---|
| |
4.1 | 1 | It is possible to install and configure **Microsoft Defender for Endpoint** on RangeeOS. |
| |
1.2 | 2 | |
| 3 | {{info}} | ||
| |
4.1 | 4 | This article was created and tested with the following software versions: |
| |
1.2 | 5 | |
| |
2.1 | 6 | * Firmware 13.00 Build 103 |
| |
1.2 | 7 | * microsoft-defender_24082.0001-x64 13.00 Build 003 |
| 8 | {{/info}} | ||
| 9 | |||
| 10 | = Installation = | ||
| 11 | |||
| |
4.1 | 12 | Install the software module **microsoft-defender_24082.0001-x64** on your Thin Client or TCMS. |
| |
1.2 | 13 | |
| |
4.1 | 14 | Instructions for installing updates can be found here: [[RangeeOS - Firmware13 - Update / Upgrade / Downgrade>>path:/HowTos/RangeeOS%20-%20Firmware-%20und%20Softwareupdate/]] |
| 15 | If the software module is not yet available for download, please contact: [[**support@rangee.com**>>mailto:support@rangee.com]] | ||
| |
1.2 | 16 | |
| |
4.1 | 17 | = Configuration = |
| |
1.2 | 18 | |
| |
4.1 | 19 | After installation, you can configure Defender via **Connections & Applications** -> **Microsoft Defender for Endpoint**. |
| |
1.2 | 20 | |
| 21 | == Onboarding == | ||
| 22 | |||
| |
4.1 | 23 | To onboard the client into your Defender environment, you need the onboarding package from the Microsoft Defender portal: |
| 24 | [[https:~~/~~/learn.microsoft.com/en-us/defender-endpoint/linux-install-with-ansible#download-the-onboarding-package-applicable-to-both-the-methods>>https://learn.microsoft.com/en-us/defender-endpoint/linux-install-with-ansible#download-the-onboarding-package-applicable-to-both-the-methods]] | ||
| |
1.2 | 25 | |
| 26 | {{info}} | ||
| |
4.1 | 27 | Unlike described there, the onboarding package can be created under **System** -> **Settings** -> **Endpoints** -> **Device Management** -> **Onboarding** (as of 04.09.2025) |
| |
1.2 | 28 | {{/info}} |
| 29 | |||
| |
4.1 | 30 | The downloaded ZIP file contains the file "MicrosoftDefenderATPOnboardingLinuxServer.py". Upload this file to your device using the corresponding option. |
| 31 | This step must be repeated on every device where Defender is to be used. | ||
| |
1.2 | 32 | |
| |
4.1 | 33 | After successful onboarding, the current Defender status will be displayed under "Information": |
| |
1.2 | 34 | |
| |
4.1 | 35 | [[image:1756982689475-844.png]] |
| |
1.2 | 36 | |
| |
4.1 | 37 | The client/TCMS will also appear online in the Microsoft Security Center approximately 5–20 minutes after onboarding. |
| |
1.2 | 38 | |
| |
4.1 | 39 | == Options == |
| |
1.2 | 40 | |
| |
4.1 | 41 | Once the client is onboarded, you can perform the following actions under **Connections & Applications** -> **Microsoft Defender for Endpoint**: |
| |
1.2 | 42 | |
| |
4.1 | 43 | * Enable Microsoft Defender for Endpoint: activates the Defender service |
| 44 | * Enable cloud protection | ||
| 45 | * Enable cloud diagnostics data collection | ||
| 46 | * Enable real-time protection | ||
| 47 | * Sign out device: removes the Defender configuration (Offboarding) | ||
| 48 | * Log file: displays the last scan log | ||
| 49 | * Quick scan: performs a quick system scan | ||
| 50 | * Full scan: performs a full system scan | ||
| |
1.2 | 51 | |
| |
4.1 | 52 | Findings and unusual events are also reported in the Microsoft Security Portal. |