You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. Change to the tool's directory by entering the following command:
51
+
52
+
```bash
53
+
cd XMDEClientAnalyzerBinary
54
+
```
55
+
56
+
4. Two new zip files are produced:
57
+
58
+
- **SupportToolLinuxBinary.zip** : For all Linux devices
59
+
- **SupportToolMacOSBinary.zip** : For Mac devices
60
+
61
+
5. Unzip one of the above 2 zip files based on the machine you need to investigate.
62
+
63
+
When using a terminal, unzip the file by entering one of the following commands based on OS type:
64
+
65
+
- Linux
66
+
67
+
```bash
68
+
unzip -q SupportToolLinuxBinary.zip
69
+
```
70
+
71
+
- Mac
72
+
73
+
```bash
74
+
unzip -q SupportToolMacOSBinary.zip
75
+
```
76
+
77
+
6. Run the tool as _root_ to generate diagnostic package:
78
+
79
+
```bash
80
+
sudo ./MDESupportTool -d
81
+
```
82
+
83
+
## Running the Python-based client analyzer
84
+
85
+
> [!NOTE]
86
+
> - The analyzer depends on few extra PIP packages (`decorator`, `sh`, `distro`, `lxml`, and `psutil`) which are installed in the operating system when in root to produce the result output. If not installed, the analyzer attempts to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
87
+
> - In addition, the tool currently requires Python version 3 or later to be installed on your device.
88
+
> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the `mde_support_tool.sh` script. For example: `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`.
89
+
90
+
> [!WARNING]
91
+
> Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
92
+
93
+
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
94
+
95
+
If you're using a terminal, download the tool by running the following command:
Use OS tracing facilities to record Defender for Endpoint performance traces.
192
+
193
+
> [!NOTE]
194
+
> This functionality exists in the Python solution only.
195
+
196
+
```console
197
+
-h, --help show this help message and exit
198
+
--length LENGTH Length of time to record the trace (in seconds).
199
+
--mask MASK Mask to select with event to trace. Defaults to all
200
+
```
201
+
202
+
On running this command for the first time, it installs a Profile configuration.
203
+
204
+
Follow this to approve profile installation: [Apple Support Guide](https://support.apple.com/guide/mac-help/configuration-profiles-standardize-settings-mh35561/mac#:~:text=Install%20a%20configuration%20profile%20you%E2%80%99ve%20received).
205
+
206
+
Usage example `./mde_support_tool.sh trace --length 5`
Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
240
+
241
+
> [!NOTE]
242
+
> This functionality exists for Linux only.
243
+
244
+
```console
245
+
-h, --help show this help message and exit
246
+
-e <true/false>, --enable <true/false> enable/disable the rate limit with default values
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
253
+
254
+
### AuditD Skip Faulty Rules
255
+
256
+
This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there's a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the -c option.
257
+
258
+
> [!NOTE]
259
+
> This functionality is only available on Linux.
260
+
261
+
```console
262
+
-h, --help show this help message and exit
263
+
-e <true/false>, --enable <true/false> enable/disable the option to skip the faulty rules. In case no argumanet is passed, the option will be true by default.
> This functionality will be skipping the faulty rules. The faulty rule then needs to be further identified and fixed.
270
+
271
+
## Result package contents on macOS and Linux
272
+
273
+
- report.html
274
+
275
+
Description: The main HTML output file that contains the findings and guidance from running the client analyzer tool on the device. This file is only generated when running the Python-based version of the client analyzer tool.
276
+
277
+
- mde_diagnostic.zip
278
+
279
+
Description: Same diagnostic output that gets generated when running *mdatp diagnostic create* on either [macOS](mac-resources.md#collecting-diagnostic-information) or [Linux](linux-resources.md#collect-diagnostic-information).
280
+
281
+
- mde.xml
282
+
283
+
Description: XML output that is generated while running and is used to build the html report file.
284
+
285
+
- Processes_information.txt
286
+
287
+
Description: contains the details of the running Microsoft Defender for Endpoint related processes on the system.
288
+
289
+
- Log.txt
290
+
291
+
Description: contains the same log messages written on screen during the data collection.
292
+
293
+
- Health.txt
294
+
295
+
Description: The same basic health output that is shown when running *mdatp health* command.
296
+
297
+
- Events.xml
298
+
299
+
Description: Additional XML file used by the analyzer when building the HTML report.
300
+
301
+
- Audited_info.txt
302
+
303
+
Description: details on audited service and related components for [Linux](linux-resources.md) OS.
304
+
305
+
- perf_benchmark.tar.gz
306
+
307
+
Description: The performance test reports. You'll see this only if you're using the performance parameter.
308
+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments