Skip to content

Commit 8820d21

Browse files
authored
Merge pull request #5074 from zeeshan1995/patch-8
Revise XMDE Client Analyzer instructions for Linux
2 parents ee0f99e + ccd3bf3 commit 8820d21

File tree

1 file changed

+64
-49
lines changed

1 file changed

+64
-49
lines changed

defender-endpoint/run-analyzer-linux.md

Lines changed: 64 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Run the client analyzer on Linux
33
description: Run the Defender for Endpoint client analyzer on Linux
4-
author: batamig
5-
ms.author: bagol
4+
author: paulinbar
5+
ms.author: painbar
66
manager: bagol
77
ms.reviewer: yongrhee
88
ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 05/24/2025
12+
ms.date: 09/23/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -29,42 +29,48 @@ f1.keywords: NOCSH
2929

3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131
32-
If you have issues with Microsoft Defender for Endpoint on Linux and need support, you might be asked to provide the output from the Client Analyzer tool. This article explains how to use the tool on your device or with live response. You can use either a Python-based solution or a binary version that doesn't need Python.
32+
If you have issues with Microsoft Defender for Endpoint on Linux and need support, you might be asked to provide the output from the Client Analyzer tool. It is a diagnostic tool which help administrators and support teams troubleshoot issues with Microsoft Defender for Endpoint. It collects detailed information about installation, configuration, service health, logs, connectivity status, etc. This tool is primarily used for checking system health, validating configurations, and helping troubleshoot potential issues.
33+
34+
This article explains how to use the tool on your device or with live response. You can use either a Python-based solution or a binary version that doesn't need Python.
3335

3436
> [!TIP]
3537
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
3638
37-
## Running the binary version of the client analyzer
39+
## Run the binary version of the client analyzer
40+
The binary version of client analyzer is made available in two ways:
41+
- Shipped with Microsoft Defender for Linux
42+
- Shipped as a standalone tool
3843

39-
### Run ClientAnalyzer binary shipped MDE:
44+
### Run the Client Analyzer binary shipped with Microsoft Defender for Linux:
4045
> [!NOTE]
41-
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/binary`
46+
> Starting with the Defender for Endpoint version `101.25082.0000`, the Client Analyzer is shipped with an agent. It can be found at the following location: `/opt/microsoft/mdatp/tools/client_analyzer/binary`
47+
48+
To run this client analyzer follow these steps:
4249

43-
To run this client analyzer follow the steps:
44-
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/binary`:
50+
1. Go to the directory `/opt/microsoft/mdatp/tools/client_analyzer/binary`:
4551

4652
```bash
47-
cd /opt/microsoft/mdatp/conf/client_analyzer/binary
53+
cd /opt/microsoft/mdatp/tools/client_analyzer/binary
4854
```
49-
2. Run the tool as _root_ to generate diagnostic package:
55+
2. Run the tool as _root_ to generate a diagnostic package:
5056

5157
```bash
5258
sudo ./MDESupportTool -d
5359
```
54-
### Download and run ClientAnalyzer binary
60+
### Download and run the Client Analyzer standalone binary tool
5561

56-
Follow the below steps if you are using Defender for Endpoint older than `101.25062.0000`
62+
Follow the steps below to use the standalone ClientAnalyzer binary
5763

58-
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine that you're to investigating. If you're using a terminal, download the tool by entering the following command:
64+
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine that you need to investigate. If you're using a terminal, download the tool by entering the following command:
5965
6066
```bash
61-
wget --quiet -O XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
67+
wget --quiet -O XMDEClientAnalyzerBinary.zip "https://go.microsoft.com/fwlink/?linkid=2336125"
6268
```
6369
64-
2. Verify the download.
70+
2. Verify the download:
6571
6672
```bash
67-
echo 'C65A4E4C6851D130942BFACD147A9D18B8A92B4F50FACF519477FD1C41A1C323 XMDEClientAnalyzerBinary.zip' | sha256sum -c
73+
echo '042692269A7208AB30B4355A6FC1CD0A25FE59356D96CCD2E7F1F61DF9B4B85D XMDEClientAnalyzerBinary.zip' | sha256sum -c
6874
```
6975
7076
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.
@@ -81,21 +87,26 @@ Follow the below steps if you are using Defender for Endpoint older than `101.25
8187
8288
5. Two new zip files are produced:
8389
84-
- **SupportToolLinuxBinary.zip**: For all Linux devices
85-
- **SupportToolMacOSBinary.zip**: For Mac devices
90+
- **SupportToolLinuxamd64Binary.zip**: For x86 Linux devices
91+
- **SupportToolLinuxarm64Binary.zip**: For ARM Linux devices
8692
87-
6. Unzip `SupportToolLinuxBinary.zip` file.
93+
6. Unzip the sepecific zip based on your Linux OS architecture. For example, we use here the `SupportToolLinuxamd64Binary.zip` file.
8894
8995
```bash
90-
unzip -q SupportToolLinuxBinary.zip
96+
unzip -q SupportToolLinuxamd64Binary.zip
9197
```
92-
7. Run the tool as _root_ to generate diagnostic package:
98+
7. Run the tool as _root_ to generate a diagnostic package:
9399
94100
```bash
95101
sudo ./MDESupportTool -d
96102
```
97103
98-
## Running the Python-based client analyzer
104+
## Run the Python-based client analyzer
105+
106+
The python version of client analyzer is made available in two ways:
107+
108+
- Shipped with Microsoft Defender for Linux
109+
- Shipped as a standalone tool
99110
100111
> [!NOTE]
101112
> - The analyzer depends on a few extra PIP packages (`decorator`, `sh`, `distro`, `lxml`, and `psutil`) which are installed in the operating system when in root to produce the result output. If not installed, the analyzer attempts to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
@@ -105,15 +116,17 @@ Follow the below steps if you are using Defender for Endpoint older than `101.25
105116
> [!WARNING]
106117
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, we recommend that you install the packages into a user PIP environment.
107118
108-
### Run ClientAnalyzer python version shipped MDE
119+
### Run Client Analyzer python version shipped with Microsoft Defender for Linux
120+
109121
> [!NOTE]
110-
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/python`
122+
> Starting with the Defender for Endpoint version `101.25082.0000`, the Client Analyzer is shipped with an agent. It can be found at the following location: `/opt/microsoft/mdatp/tools/client_analyzer/python`
123+
124+
To run this client analyzer follow these steps:
111125
112-
To run this client analyzer follow the steps:
113-
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/python`:
126+
1. Go to directory `/opt/microsoft/mdatp/tools/client_analyzer/python`:
114127
115128
```bash
116-
cd /opt/microsoft/mdatp/conf/client_analyzer/python
129+
cd /opt/microsoft/mdatp/tools/client_analyzer/python
117130
```
118131
2. Run as a root user to install required dependencies.
119132
@@ -126,45 +139,45 @@ To run this client analyzer follow the steps:
126139
sudo ./mde_support_tool.sh -d
127140
```
128141
129-
### Download and run ClientAnalyzer python version
142+
### Download and run the Client Analyzer standalone python version
130143
131144
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool on the Linux machine you need to investigate. If you're using a terminal, download the tool by entering the following command:
132145

133146
```bash
134-
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
147+
wget --quiet -O XMDEClientAnalyzerPython.zip "https://go.microsoft.com/fwlink/?linkid=2336046"
135148
```
136149

137-
2. Verify the download.
150+
2. Verify the download:
138151

139152
```bash
140-
echo '07E6A7B89E28A78309D5B6F1E25E4CDFBA9CA141450E422D76441C03AD3477E7 XMDEClientAnalyzer.zip' | sha256sum -c
153+
echo '9F29043CD3034DD4DF30B0EA25B37B5EE7BE5D81D5848CF047F9842B76C831EA XMDEClientAnalyzerPython.zip' | sha256sum -c
141154
```
142155

143-
3. Extract the contents of `XMDEClientAnalyzer.zip` on the machine.
156+
3. Extract the contents of `XMDEClientAnalyzer.zip` on the machine:
144157

145158
```bash
146-
unzip -q XMDEClientAnalyzer.zip -d XMDEClientAnalyzer
159+
unzip -q XMDEClientAnalyzerPython.zip -d XMDEClientAnalyzerPython
147160
```
148161

149-
4. Change the directory.
162+
4. Change the directory:
150163

151164
```bash
152-
cd XMDEClientAnalyzer
165+
cd XMDEClientAnalyzerPython
153166
```
154167

155-
5. Give the tool executable permission.
168+
5. Give the tool executable permission:
156169

157170
```bash
158171
chmod a+x mde_support_tool.sh
159172
```
160173

161-
6. Run as a nonroot user to install required dependencies.
174+
6. Run as a nonroot user to install required dependencies:
162175

163176
```bash
164177
./mde_support_tool.sh
165178
```
166179

167-
7. To collect the diagnostic package and generate the result archive file, run again as root.
180+
7. To collect the diagnostic package and generate the result archive file, run again as root:
168181

169182
```bash
170183
sudo ./mde_support_tool.sh -d
@@ -174,7 +187,8 @@ To run this client analyzer follow the steps:
174187
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
175188

176189
## Command line options
177-
Below are the command line options provided by client analyzer
190+
191+
Below are the command line options provided by client analyzer:
178192

179193
```console
180194
@@ -237,8 +251,7 @@ optional arguments:
237251
238252
### Diagnostics mode
239253
240-
Diagnostics mode is used to collect extensive set of machine information, such as memory, disk, and MDATP logs.
241-
This set of files gives the primary set of information required to debug any issue related to Defender For Endpoint.
254+
Diagnostics mode is used to collect extensive set of machine information, such as memory, disk, and MDATP logs. This set of files gives the primary set of information required to debug any issue related to Defender For Endpoint.
242255
243256
The options supported are as follows:
244257
@@ -339,6 +352,7 @@ The files generated when using this mode are summarized in the following table:
339352
| `top_summary.txt` | Memory and CPU usage analytics of the process running |
340353
341354
### Optional arguments for Client Analyzer
355+
342356
Client Analyzer provides the following optional arguments for extra data collection:
343357
344358
#### Collect performance info
@@ -453,7 +467,8 @@ This mode adds exclusions for `audit-d` monitoring.
453467
454468
```
455469
456-
Usage example:
470+
Usage example:
471+
457472
```console
458473
sudo ./MDESupportTool exclude -d /var/foo/bar`
459474
```
@@ -470,6 +485,7 @@ This option sets the rate limit globally for AuditD causing a drop in all the au
470485
```
471486
472487
Usage example:
488+
473489
```console
474490
sudo ./mde_support_tool.sh ratelimit -e true
475491
```
@@ -489,6 +505,7 @@ This option enables you to skip the faulty rules added in the auditd rules file
489505
```
490506
491507
Usage example:
508+
492509
```console
493510
sudo ./mde_support_tool.sh skipfaultyrules -e true
494511
```
@@ -511,8 +528,8 @@ The XMDE Client Analyzer tool can be downloaded as a [binary](https://aka.ms/XMD
511528
512529
Download and extract the XMDE Client Analyzer. You can use either the binary or Python version, as follows:
513530
514-
- [Binary version of the Client Analyzer](run-analyzer-linux.md#running-the-binary-version-of-the-client-analyzer)
515-
- [Python version of the Client Analyzer](run-analyzer-linux.md#running-the-python-based-client-analyzer)
531+
- [Binary version of the Client Analyzer](run-analyzer-linux.md#run-the-binary-version-of-the-client-analyzer)
532+
- [Python version of the Client Analyzer](run-analyzer-linux.md#run-the-python-based-client-analyzer)
516533
517534
Due to the limited commands available in live response, the steps detailed must be executed in a bash script. By splitting the installation and execution portion of these commands, it's possible to run the install script once, and run the execution script multiple times.
518535
@@ -521,7 +538,7 @@ Due to the limited commands available in live response, the steps detailed must
521538
522539
#### Binary client analyzer install script
523540
524-
The following script performs the first six steps of the [Running the Binary version of the Client Analyzer](run-analyzer-linux.md#running-the-binary-version-of-the-client-analyzer). When complete, the XMDE Client Analyzer binary is available from the `/tmp/XMDEClientAnalyzerBinary/ClientAnalyzer` directory.
541+
The following script performs the first six steps of the [Running the Binary version of the Client Analyzer](run-analyzer-linux.md#run-the-binary-version-of-the-client-analyzer). When complete, the XMDE Client Analyzer binary is available from the `/tmp/XMDEClientAnalyzerBinary/ClientAnalyzer` directory.
525542
526543
1. Create a bash file `InstallXMDEClientAnalyzer.sh` and paste the following content into it.
527544
@@ -547,7 +564,7 @@ The following script performs the first six steps of the [Running the Binary ver
547564
548565
#### Python client analyzer install script
549566
550-
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](run-analyzer-linux.md#running-the-python-based-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
567+
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](run-analyzer-linux.md#run-the-python-based-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
551568
552569
1. Create a bash file `InstallXMDEClientAnalyzer.sh` and paste the following content into it.
553570
@@ -673,8 +690,6 @@ The Python version of the client analyzer accepts command line parameters to per
673690
674691
- [Address false positives/negatives in Microsoft Defender for Endpoint](/defender-endpoint/defender-endpoint-false-positives-negatives)
675692
676-
677-
678693
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
679694
680695

0 commit comments

Comments
 (0)