Microsoft Defender for Endpoint on Linux now supports global exclusion policies that unify antivirus and endpoint detection settings. This feature reduces false positives, boosts performance, and streamlines security management by allowing centralized exclusions of files, folders, and processes across AV and EDR. Unique :

Manage Global Exclusion Policies for Linux with Microsoft Defender
If you’re running Linux servers, you know how tricky managing antivirus (AV) and endpoint detection and response (EDR) exclusions can be. Microsoft just made it easier. Their latest update for Microsoft Defender for Endpoint on Linux introduces global exclusions that work across both AV and EDR. This means fewer false positives, better performance, and smoother security operations.
What’s New?
Global exclusions are now generally available for Linux workloads. This unified exclusion scope lets security teams exclude files, folders, and processes from both antivirus and endpoint detection simultaneously. Previously, managing separate exclusions for AV and EDR was a hassle and often caused performance issues or disruptions.
“Global exclusions allow organizations to effortlessly exclude specific files, folders, and processes from both AV and EDR using a single, centralized configuration.”
By centralizing exclusions, Microsoft Defender helps reduce noise from trusted apps and custom Linux environments. This is especially useful for servers running high input/output workloads or custom software.
Major Updates and Benefits
- Unified Scope: One exclusion policy applies to both antivirus and endpoint detection and response.
- Performance Boost: Excluding noisy or resource-heavy processes reduces CPU and memory usage.
- Fewer False Positives: Trusted files and apps, like Tanium, won’t get flagged incorrectly anymore.
- Centralized Management: Configure exclusions easily via Microsoft Defender portal, Intune, or JSON policies.
“By excluding trusted files and processes, you can avoid incorrect detections and focus on high-fidelity signals.”
How It Works
Global exclusions operate at the sensor level, filtering out trusted sources early—before AV or EDR engines process them. These exclusions apply to real-time protection and passive mode but don’t affect on-demand scans. You can exclude files, folders, or processes depending on your needs.
Configuration is flexible: use the Defender portal’s security settings, Microsoft Intune’s endpoint security blade, or JSON-based policies for advanced setups. This makes scaling exclusions across large Linux environments straightforward.
Getting Started
To use global exclusions, upgrade to Microsoft Defender for Endpoint version 1024090001 or later. Microsoft’s documentation offers step-by-step guidance on configuring and validating your exclusion policies.
In short, this update is a game-changer for Linux security admins. It streamlines managing exclusions, improves system performance, and cuts down on false alarms. If you manage Linux endpoints, it’s time to check out these new global exclusions.
From the New blog articles in Microsoft Community Hub