You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-perf.md
+47-57Lines changed: 47 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Depending on the applications that you are running and your device characteristi
36
36
> [!WARNING]
37
37
> Before starting, **make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
38
38
39
-
There are three distinct ways to troubleshoot noisy processes and directories using exclusions provided by the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
39
+
There are three distinct ways to troubleshoot noisy processes and directories using the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
40
40
1. Using Real-time Protection Statistics
41
41
2. Using Hot Event Sources
42
42
3. Using eBPF Statistics
@@ -103,47 +103,46 @@ The following steps can be used to troubleshoot and mitigate these issues:
103
103
104
104
The output of this command shows all processes and their associated scan activity.
105
105
106
-
3.On your Linux system, download the sample Python parser **high_cpu_parser.py** using the command:
The output of this command should be similar to the following:
111
+
The output of the which is a list of the top 4 contributors to performance issues. For example, the output of the command will be something like the following:
The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact. For example, the output of the command will be something like the below:
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
145
+
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it (carefully evaluate if it is safe to exclude). For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
147
146
148
147
> [!NOTE]
149
148
> The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
@@ -266,16 +265,25 @@ This is the output saved in the hot event source report in json;
In this example, after 18s the command shows that the executables; /usr/lib/postgresql/12/bin/psql and /usr/lib/postgresql/12/bin/postgres (deleted) generate the most activity.
275
+
In this example, after 18s the command shows that the executables; /usr/lib/postgresql/12/bin/psql and /usr/lib/postgresql/12/bin/postgres generate the most activity.
276
+
277
+
Once you've finished the investigation, you can change the log level back to "info".
278
+
279
+
```bash
280
+
sudo mdatp log level set --level info
281
+
```
282
+
```console
283
+
Log level configured successfully
284
+
```
277
285
278
-
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in the count row and add a global process exclusion (if it's an executable) or a global file/folder exclusion (if it's a file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
286
+
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in the count row and add a global process exclusion (if it's an executable) or a global file/folder exclusion (if it's a file) for it (carefully evaluate if it is safe to exclude). For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
279
287
280
288
## Troubleshoot performance issues using eBPF Statistics
281
289
@@ -313,7 +321,7 @@ To collect current statistics using eBPF statistics, run:
313
321
```
314
322
This command monitors the system for 20 seconds and shows the results. Here the top initiator path (postgresql/12/bin/psql) shows the path of the process that generated the most system calls.
315
323
316
-
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest `count` in the `Top initiator path` row and add a global process exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
324
+
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest `count` in the `Top initiator path` row and add a global process exclusion for it (carefully evaluate if it is safe to exclude). For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
317
325
318
326
## Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer
319
327
@@ -332,24 +340,6 @@ To run the client analyzer for troubleshooting performance issues, see [Run the
332
340
333
341
Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues. For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md). IF you still have performance issues, contact support for further instructions and mitigation.
334
342
335
-
### Rate Limiter
336
-
337
-
The XMDEClientAnalyzer support tool contains syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events.
338
-
339
-
> [!NOTE]
340
-
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This the number of events for other subscribers as well.
341
-
342
-
The ratelimit option can be used to enable/disable this rate limit.
When the ratelimit is enabled a rule will be added in AuditD to handle 2500 events/sec.
349
-
350
-
> [!NOTE]
351
-
> Please contact Microsoft support if you need assistance with analyzing and mitigating AuditD related performance issues, or with deploying AuditD exclusions at scale.
352
-
353
343
## See also
354
344
355
345
-[Investigate agent health issues](health-status.md)
0 commit comments