You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-linux.md
+40-13Lines changed: 40 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
9
9
ms.subservice: linux
10
10
ms.localizationpriority: medium
11
11
ms.topic: troubleshooting-general
12
-
ms.date: 10/31/2024
12
+
ms.date: 11/01/2024
13
13
ms.custom: partner-contribution
14
14
ms.collection:
15
15
- m365-security
@@ -163,7 +163,7 @@ The Python version of the client analyzer accepts command line parameters to per
163
163
164
164
```
165
165
166
-
#### Rung the client analyzer script
166
+
#### Run the client analyzer script
167
167
168
168
> [!NOTE]
169
169
> If you have an active live response session you can skip Step 1.
@@ -189,6 +189,34 @@ This section provides instructions on how to run the tool locally on the Linux m
189
189
190
190
### Run the binary version of the client analyzer
191
191
192
+
#### Summary:
193
+
194
+
1. Obtain from [https://aka.ms/xmdeclientanalyzerbinary](https://aka.ms/xmdeclientanalyzerbinary). Or, if your Linux server has internet access use `wget` to download the file:
4. Follow the on-screen instructions and then follow up with at the end of the log collection, the logs will be located in the `/tmp` directory.
213
+
214
+
5. The log set will be owned by root user so you may need root privileges to remove the log set.
215
+
216
+
6. Upload the file for the support engineer.
217
+
218
+
#### Details:
219
+
192
220
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine you need to investigate.
193
221
194
222
If you're using a terminal, download the tool by entering the following command:
@@ -217,18 +245,17 @@ This section provides instructions on how to run the tool locally on the Linux m
217
245
cd XMDEClientAnalyzerBinary
218
246
```
219
247
220
-
4. Two new zip files are produced:
248
+
1. Two new zip files are produced:
221
249
222
250
-`SupportToolLinuxBinary.zip`: For all Linux devices
223
-
-`SupportToolMacOSBinary.zip`: For Mac devices
224
-
225
-
5. Depending on the operating system, unzip the appropriate file for the machine you want to investigate.
226
-
227
-
| OS type | Command |
228
-
|--|--|
229
-
| Linux |`unzip -q SupportToolLinuxBinary.zip`|
230
-
| Mac |`unzip -q SupportToolMacOSBinary.zip`|
251
+
-`SupportToolMacOSBinary.zip`: For Mac devices, ignore this one.
252
+
253
+
1. Unzip the SupportToolLinuxBinary.zip for the Linux machine you want to investigate.
231
254
255
+
```bash
256
+
unzip -q SupportToolLinuxBinary.zip
257
+
```
258
+
232
259
6. Run the tool as root to generate diagnostic package:
233
260
234
261
```bash
@@ -245,11 +272,11 @@ This section provides instructions on how to run the tool locally on the Linux m
245
272
> [!WARNING]
246
273
> Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
247
274
248
-
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
275
+
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Linux machine you need to investigate.
249
276
250
277
If you're using a terminal, download the tool by running the following command:
0 commit comments