You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -39,112 +39,109 @@ Depending on the applications that you are running and your device characteristi
39
39
## Troubleshoot performance issues using Real-time Protection Statistics
40
40
41
41
**Applies to:**
42
-
- Only performance issues related to AV
42
+
- Only performance issues related to antivirus
43
43
44
44
Real-time protection (RTP) is a feature of Defender for Endpoint on Linux that continuously monitors and protects your device against threats. It consists of file and process monitoring and other heuristics.
45
45
46
46
The following steps can be used to troubleshoot and mitigate these issues:
47
47
48
-
1. Disable real-time protection using one of the following methods and observe whether the performance improves. This approach helps narrow down whether Defender for Endpoint on Linux is contributing to the performance issues.
48
+
1. Disable real-time protection using one of the following methods and observe whether the performance improves. This approach helps narrow down whether Defender for Endpoint on Linux is contributing to the performance issues. If your device is not managed by your organization, real-time protection can be disabled from the command line:
49
49
50
-
If your device is not managed by your organization, real-time protection can be disabled from the command line:
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
59
59
60
-
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
61
-
62
-
> [!NOTE]
63
-
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
60
+
> [!NOTE]
61
+
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
64
62
65
63
2. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on Linux.
66
64
67
-
> [!NOTE]
68
-
> This feature is available in version 100.90.70 or newer.
65
+
> [!NOTE]
66
+
> This feature is available in version 100.90.70 or newer.
69
67
70
-
This feature is enabled by default on the `Dogfood` and `InsiderFast` channels. If you're using a different update channel, this feature can be enabled from the command line:
68
+
This feature is enabled by default on the `Dogfood` and `InsiderFast` channels. If you're using a different update channel, this feature can be enabled from the command line:
The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact.
128
-
For example, the output of the command will be something like the below:
125
+
The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact. For example, the output of the command will be something like the below:
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
141
+
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
145
142
146
-
> [!NOTE]
147
-
> The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
143
+
> [!NOTE]
144
+
> The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
148
145
149
146
150
147
## Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer
@@ -155,7 +152,6 @@ The following steps can be used to troubleshoot and mitigate these issues:
155
152
The Microsoft Defender for Endpoint Client Analyzer (MDECA) can collect traces, logs, and diagnostic information in order to troubleshoot performance issues on [onboarded devices](onboard-configure.md) on Linux.
156
153
157
154
> [!NOTE]
158
-
>
159
155
> - The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information such as (but not limited to) IP addresses, PC names that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint. For more information about our privacy statement, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
160
156
> - As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](mac-whatsnew.md) and confirming that the issue still persists before investigating further.
161
157
@@ -164,10 +160,7 @@ To run the client analyzer for troubleshooting performance issues, see [Run the
164
160
165
161
## Configure Global Exclusions for better performance
166
162
167
-
Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues.
168
-
169
-
For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).
170
-
163
+
Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues. For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).
171
164
172
165
> [!NOTE]
173
166
> In case after following the above steps, the performance problem persists, please contact customer support for further instructions and mitigation.
@@ -190,50 +183,29 @@ In certain server workloads, two issues might be observed:
190
183
191
184
-***/var/log/audit/audit.log*** becoming large or frequently rotating.
192
185
193
-
These issues may occur on servers with many events flooding AuditD.
186
+
These issues may occur on servers with many events flooding AuditD. Such issues can arise if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events. To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
194
187
195
-
> [!NOTE]
196
-
> As a best practice, we recommend to configure AuditD logs to rotate when the maximum file size limit is reached.
197
-
>
198
-
> This will prevent AuditD logs accumulating in a single file and the rotated log files can be moved out to save disk space.
199
-
>
200
-
> To achieve this, you can set the value for **max_log_file_action** to **rotate** in the [auditd.conf](https://linux.die.net/man/8/auditd.conf) file.
188
+
As a best practice, we recommend to configure AuditD logs to rotate when the maximum file size limit is reached. This configuration prevents AuditD logs from accumulating in a single file, and the rotated log files can be moved out to save disk space. To achieve this, you can set the value for `max_log_file_action` to `rotate` in the [auditd.conf](https://linux.die.net/man/8/auditd.conf) file.
201
189
202
-
This can happen if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events.
203
-
204
-
To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
205
-
206
190
> [!NOTE]
207
-
> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further.
208
-
>
209
-
> That there are additional configurations that can affect AuditD subsystem CPU strain.
210
-
>
211
-
> Specifically, in [auditd.conf](https://linux.die.net/man/8/auditd.conf), the value for **disp_qos** can be set to "lossy" to reduce the high CPU consumption.
212
-
>
213
-
> However, this means that some events may be dropped during peak CPU consumption.
191
+
> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further. That there are additional configurations that can affect AuditD subsystem CPU strain. Specifically, in [auditd.conf](https://linux.die.net/man/8/auditd.conf), the value for `disp_qos` can be set to `lossy` to reduce the high CPU consumption. However, this means that some events may be dropped during peak CPU consumption.
214
192
215
193
### XMDEClientAnalyzer
216
194
217
195
When you use [XMDEClientAnalyzer](run-analyzer-macos-linux.md), the following files will display output that provides insights to help you troubleshoot issues.
218
196
219
-
- auditd_info.txt
220
-
- auditd_log_analysis.txt
197
+
-`auditd_info.txt`
198
+
-`auditd_log_analysis.txt`
221
199
222
200
#### auditd_info.txt
223
201
224
-
Contains general AuditD configuration and will display:
202
+
Contains general AuditD configuration and displays the following information:
225
203
226
204
- What processes are registered as AuditD consumers.
227
205
228
-
- **Auditctl -s** output with **enabled=2**
229
-
230
-
- Suggests auditd is in immutable mode (requires restart for any config changes to take effect).
231
-
232
-
- **Auditctl -l** output
233
-
234
-
- Will show what rules are currently loaded into the kernel (which may be different that what exists on disk in "/etc/auditd/rules.d/mdatp.rules").
206
+
-`Auditctl -s` output with `enabled=2` (Suggests auditd is in immutable mode (requires restart for any config changes to take effect.)
235
207
236
-
- Will show which rulesare related to Microsoft Defender for Endpoint.
208
+
-`Auditctl -l` output (Shows what rules are currently loaded into the kernel, which might differ from what exists on disk in `/etc/auditd/rules.d/mdatp.rules`. Also shows which rules are related to Microsoft Defender for Endpoint.)
0 commit comments