You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-macos.md
+12-79Lines changed: 12 additions & 79 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
9
9
ms.subservice: macos
10
10
ms.localizationpriority: medium
11
11
ms.topic: troubleshooting-general
12
-
ms.date: 10/31/2024
12
+
ms.date: 11/01/2024
13
13
ms.custom: partner-contribution
14
14
ms.collection:
15
15
- m365-security
@@ -24,9 +24,6 @@ f1.keywords: NOCSH
24
24
25
25
If you're experiencing reliability or device health issues with Microsoft Defender for Endpoint on macOS, you can use the XMDE Client Analyzer to diagnose these issues. This article describes two ways to use the client analyzer tool:
26
26
27
-
-[Use the binary version of the client analyzer](#use-the-binary-version-of-the-client-analyzer)
28
-
-
29
-
30
27
1. Using a binary version (no external Python dependency)
31
28
2. Using a Python-based solution
32
29
@@ -65,13 +62,12 @@ If you're experiencing reliability or device health issues with Microsoft Defend
65
62
-`SupportToolLinuxBinary.zip`: For all Linux devices
66
63
-`SupportToolMacOSBinary.zip`: For Mac devices
67
64
68
-
5. Depending on the machine you're investigating, unzip the appropriate file.
69
-
70
-
| OS type | Terminal command |
71
-
|---|---|
72
-
| Linux |`unzip -q SupportToolLinuxBinary.zip`|
73
-
| Mac |`unzip -q SupportToolMacOSBinary.zip`|
65
+
1. Unzip the SupportToolMacOSBinary.zip.
74
66
67
+
```bash
68
+
unzip -q SupportToolMacOSBinary.zip
69
+
```
70
+
75
71
6. Run the tool as root to generate your diagnostic package:
76
72
77
73
```bash
@@ -87,11 +83,11 @@ The tool currently requires Python version 3 or later to be installed on your de
87
83
> [!WARNING]
88
84
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
89
85
90
-
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac or Linux machine you're investigating.
86
+
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac machine you're investigating.
91
87
92
88
If you're using a terminal, download the tool by running the following command:
Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
231
-
232
-
> [!NOTE]
233
-
> This functionality exists for Linux only.
234
-
235
-
```console
236
-
-h, --help show this help message and exit
237
-
-e <true/false>, --enable <true/false> enable/disable the rate limit with default values
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
244
-
245
-
### AuditD Skip Faulty Rules
246
-
247
-
This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there's a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the -c option.
248
-
249
-
> [!NOTE]
250
-
> This functionality is only available on Linux.
251
-
252
-
```console
253
-
-h, --help show this help message and exit
254
-
-e <true/false>, --enable <true/false> enable/disable the option to skip the faulty rules. In case no argumanet is passed, the option will be true by default.
> This functionality skips faulty rules. The faulty rule then needs to be further identified and fixed.
261
-
262
-
## Result package contents on macOS and Linux
195
+
## Result package contents on macOS
263
196
264
197
| File | Description |
265
198
|---|---|
266
199
|`report.html`| The main HTML output file that contains the findings and guidance from running the client analyzer tool on the device. This file is only generated when running the Python-based version of the client analyzer tool. |
267
-
|`mde_diagnostic.zip`| Same diagnostic output that gets generated when running `mdatp diagnostic create` on either [macOS](mac-resources.md#collecting-diagnostic-information) or [Linux](linux-resources.md#collect-diagnostic-information). |
200
+
|`mde_diagnostic.zip`| Same diagnostic output that gets generated when running `mdatp diagnostic create` on [macOS](mac-resources.md#collecting-diagnostic-information). |
268
201
|`mde.xml`| XML output that is generated while running and is used to build the html report file. |
269
202
|`Processes_information.txt`| Contains the details of the running Microsoft Defender for Endpoint related processes on the system. |
270
203
|`Log.txt`| Contains the same log messages written on screen during the data collection. |
0 commit comments