If you are using PMC Endpoint Manager version 4.2.1 or newer, this article does not apply to your deployment. Starting with version 4.2.1, PMC has migrated to a Debian 12-based OS and the previously described compatibility issue with Microsoft Defender for Cloud in Azure no longer occurs.
This article applies to PMC deployments in Microsoft Azure that are using versions earlier than 4.2.1 (prior to the Debian 12 base). It provides guidance around the intersection of PMC virtual appliance deployments and Microsoft Defender for Cloud configuration.
Starting with PMC version 3.x and higher, PMC can be deployed to Microsoft Azure Cloud as a virtual machine. For PMC 3.x, 4.0.x, and 4.1.x, it is advisable to place the PMC virtual machine in a dedicated Resource Group within your Azure subscription. You can either create a new Resource Group during the VM deployment process or move the PMC VM to a dedicated Resource Group afterward.
When PMC is deployed on Azure and the Defender for Cloud option is enabled for the subscription covering the PMC VM, certain issues have been observed (for versions earlier than 4.2.1). Specifically:
The Azure Linux Agent (waagent) may attempt to install VM extensions tied to Defender for Cloud.
Some of the Microsoft packages installed by those extensions are incompatible with the Debian 11-based PMC appliance (used in versions prior to 4.2.1).
These services may log large volumes of messages to the system journal, consuming storage space excessively and potentially leading to system stability or performance problems.
To avoid the potential issues when using PMC versions that are based on Debian 11 or earlier, we recommend applying an Azure Policy to prevent the installation of Defender extensions on the PMC-dedicated VM(s):
In the Azure Portal, open Policy (search “Policy”).
Go to Authoring → Definitions and click + Policy definition.
For Definition location, select the subscription covering your PMC VM.
Enter a name (for example: Prevent Defender extensions installation).
Under Category, select Compute.
Under Policy Rule, paste the following JSON:
Save the new Policy definition.
Now assign the policy: go to Authoring → Assignments → Assign policy.
Under Scope, choose the subscription and the Resource Group dedicated for your PMC virtual machine(s).
Under Policy definition, select the one you just created. Set Enforcement to Enabled.
On the Parameters tab of the assignment, set the Denied extension parameter value to:
Review + create to save the policy assignment.
Within the Resource Group containing the PMC VM(s), verify under Settings → Policies that the assignment appears.
If you are currently running PMC version prior to 4.2.1, we strongly recommend upgrading to version 4.2.1 or newer. By upgrading, you will benefit from:
The switch to a Debian 12-based OS, which resolves the compatibility concern with Defender for Cloud extensions.
The fact that the workaround described in Section 4 is no longer required.
Improved long-term support and stability for new deployments.
See the release notes for version 4.2.1 for full details.
Using PMC 4.2.1 or newer? → This KB article does not apply.
Using PMC version earlier than 4.2.1? → Follow the guidance above to prevent Defender for Cloud extension installation on the PMC VM or upgrade to version 4.2.1+.