Skip to content

Commit c385e84

Browse files
Improve grammar and clarity in documentation
1 parent 6381a77 commit c385e84

File tree

1 file changed

+13
-16
lines changed

1 file changed

+13
-16
lines changed

defender-endpoint/linux-support-perf.md

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ search.appverid: met150
2929

3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3131
32-
This document provides instructions on how to narrow down performance issues related to Defender for Endpoint on Linux using the available diagnostic tools to be able to understand and mitigate the existing resource shortages and the processes that are making the system into such situations. Performance problems are mainly caused by bottlenecks in one or more hardware subsystems, depending on the profile of resource utilization on the system. Sometimes applications are sensitive to disk I/O resources and may need more CPU capacity, and sometimes some configurations are not sustainable, and may trigger too many new processes, and open too many file descriptors.
32+
This document provides instructions on how to narrow down performance issues related to Defender for Endpoint on Linux using the available diagnostic tools to be able to understand and mitigate the existing resource shortages and the processes that are making the system into such situations. Bottlenecks in one or more hardware subsystems mainly cause performance problems, depending on the profile of resource utilization on the system. Sometimes applications are sensitive to disk I/O resources and may need more CPU capacity, and sometimes some configurations are not sustainable, and may trigger too many new processes, and open too many file descriptors.
3333

3434
Depending on the applications that you are running and your device characteristics, you may experience suboptimal performance when running Defender for Endpoint on Linux. In particular, applications or system processes that access many resources such as CPU, Disk, and Memory over a short timespan can lead to performance issues in Defender for Endpoint on Linux.
3535

3636
> [!WARNING]
37-
> Before starting, **please make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
37+
> Before starting, **make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
3838
39-
There are 3 distinct ways to troubleshoot noisy processes and directories using exclusions provided by the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
39+
There are three distinct ways to troubleshoot noisy processes and directories using exclusions provided by the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
4040
1. Using Real-time Protection Statistics
4141
2. Using Hot Event Sources
4242
3. Using eBPF Statistics
@@ -60,10 +60,10 @@ The following steps can be used to troubleshoot and mitigate these issues:
6060
Configuration property updated
6161
```
6262

63-
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
63+
If your organization manages your device, your administrator can disable real-time protection using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
6464

6565
> [!NOTE]
66-
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
66+
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case, please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
6767
6868
2. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on Linux.
6969

@@ -153,10 +153,9 @@ The following steps can be used to troubleshoot and mitigate these issues:
153153
**Applies to:**
154154
- Performance issues in files and executables which are consuming most CPU cycles in the entire filesystem.
155155

156-
Hot event sources is a feature that allows customers to identify which process or directory is responsible for high resource consumption. To investigate which process/executable is generating the most noise, follow the steps below.
157-
156+
Hot event sources is a feature that allows customers to identify which process or directory is responsible for high resource consumption. To investigate which process/executable is generating the most noise, follow these steps.
158157
> [!NOTE]
159-
> These commmands require you to have root permissions. Ensure that sudo can be used.
158+
> These commands require you to have root permissions. Ensure that sudo can be used.
160159
161160
First, check the log level on your machine.
162161

@@ -177,8 +176,7 @@ To collect current statistics (for files),
177176
```bash
178177
sudo mdatp diagnostic hot-event-sources files
179178
```
180-
The output of which will look similar to the following on the console (this is just a snippet of the entire output). Here, the first row is the count (frequency of occurrence) and the second is the file path.;
181-
179+
The output looks similar to the following on the console (this is just a snippet of the entire output). Here, the first row shows the count (frequency of occurrence) and the second shows the file path.
182180
```console
183181
Total Events: 11179 Time: 12s. Throughput: 75.3333 events/sec.
184182
=========== Top 684 Hot Event Sources ===========
@@ -223,15 +221,14 @@ The output of which will look similar to the following on the console (this is j
223221
}
224222
```
225223

226-
In the above example, we can see that the file /mnt/RamDisk/postgres_data/pg_wal/0000000100000014000000A5 generates the most activity.
227-
224+
In the example, we can see that the file /mnt/RamDisk/postgres_data/pg_wal/0000000100000014000000A5 generates the most activity.
228225
Also, similarly for the executables,
229226

230227
```bash
231228
sudo mdatp diagnostic hot-event-sources executables
232229
```
233230

234-
The output of which will look similar to the following on the console;
231+
The output looks similar to the following on the console.
235232

236233
```console
237234
Total Events: 47382 Time: 18s. Throughput: 157 events/sec.
@@ -278,14 +275,14 @@ This is the output saved in the hot event source report in json;
278275
```
279276
In this example, after 18s the command shows that the executables; /usr/lib/postgresql/12/bin/psql and /usr/lib/postgresql/12/bin/postgres (deleted) generate the most activity.
280277

281-
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in `count` row and add a global process exclusion (in case of executable) or a global file/folder exclusion (in case of file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
278+
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in the count row and add a global process exclusion (if it's an executable) or a global file/folder exclusion (if it's a file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
282279

283280
## Troubleshoot performance issues using eBPF Statistics
284281

285282
**Applies to:**
286283
- All file/ process events, including system call based performance issues.
287284

288-
eBPF (extended Berkeley Packet Filter) statistics command gives insights into the top event/process that's generating the most file events, along with their syscall ids. When system calls are being made from the system, there is a high amount of workload geenrated on your system. eBPF statistcs can be used to identify such issues.
285+
eBPF (extended Berkeley Packet Filter) statistics command gives insights into the top event/process that's generating the most file events, along with their syscall IDs. When system calls are being made from the system, there's a high amount of workload generated on your system. eBPF statistics can be used to identify such issues.
289286

290287
To collect current statistics using eBPF statistics, run:
291288

@@ -340,7 +337,7 @@ Configure Microsoft Defender for Endpoint on Linux with exclusions for the proce
340337
The XMDEClientAnalyzer support tool contains syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events.
341338

342339
> [!NOTE]
343-
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
340+
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This the number of events for other subscribers as well.
344341
345342
The ratelimit option can be used to enable/disable this rate limit.
346343

0 commit comments

Comments
 (0)