Skip to content

Commit c7c4432

Browse files
committed
Update run-analyzer-macos-linux.md
1 parent 77db0c2 commit c7c4432

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -274,8 +274,8 @@ The files generated when using this mode are summarized in the following table:
274274
| `syslog.zip` | The files under /var/log/syslog |
275275
| `messages.zip` | The files under /var/log/messages |
276276
| `conflicting_processes_information.txt` | Defender for Endpoint Conflicting Processes |
277-
| `exclusions.txt` | List of AV exclusions |
278-
| `definitions.txt` | AV definition info |
277+
| `exclusions.txt` | List of Antivirus exclusions |
278+
| `definitions.txt` | Antivirus definition info |
279279
| `mde_directories.txt` | List of files in the Defender for Endpoint directories |
280280
| `disk_usage.txt` | Disk usage details |
281281
| `mde_user.txt` | Defender for Endpoint User Info |
@@ -289,33 +289,34 @@ The files generated when using this mode are summarized in the following table:
289289
| `meminfo.txt` | Detailed information about the system's memory usage |
290290
| `cpuinfo.txt` | CPU Information |
291291
| `lsns_info.txt` | Linux namespace information |
292-
| `lsof.txt` | Defender for Endpoint Open File Descriptors Information [^1] |
292+
| `lsof.txt` | Defender for Endpoint Open File Descriptors Information <br/>(see the note after this table) |
293293
| `sestatus.txt` | Defender for Endpoint Open File Descriptors Information |
294294
| `lsmod.txt` | Status of modules in the Linux kernel |
295295
| `dmesg.txt` | Messages from the kernel ring buffer |
296296
| `kernel_lockdown.txt` | kernel lockdown Info |
297-
| `rtp_statistics.txt` | Defender for Endpoint Real Time Protection(RTP) statistics [^1] |
297+
| `rtp_statistics.txt` | Defender for Endpoint Real Time Protection(RTP) statistics <br/>(see the note after this table) |
298298
| `libc_info.txt` | libc library information |
299299
| `uptime_info.txt` | Time since last restart |
300300
| `last_info.txt` | Listing of last logged in users |
301301
| `locale_info.txt` | Show current locale |
302-
| `tmp_files_owned_by_mdatp.txt` | /tmp files owned by group:mdatp [^1] |
303-
| `mdatp_config.txt` | All the Defender for Endpoint configurations [^1] |
304-
| `mpenginedb.db`, `mpenginedb.db-wal`, `mpenginedb.db-shm` | AV definitions file [^1] |
302+
| `tmp_files_owned_by_mdatp.txt` | /tmp files owned by group:mdatp <br/>(see the note after this table) |
303+
| `mdatp_config.txt` | All the Defender for Endpoint configurations <br/>(see the note after this table) |
304+
| `mpenginedb.db`<br/>`mpenginedb.db-wal`<br/> `mpenginedb.db-shm` | Antivirus definitions file <br/>(see the note after this table) |
305305
| `iptables_rules.txt` | Linux iptables rules |
306306
| `network_info.txt` | Network information |
307307
| `sysctl_info.txt` | kernel settings info |
308308
| `hostname_diagnostics.txt` | Hostname diagnostics information |
309-
| `mde_event_statistics.txt` | Defender for Endpoint Event statistics [^1] |
310-
| `mde_ebpf_statistics.txt` | Defender for Endpoint eBPF statistics [^1] |
309+
| `mde_event_statistics.txt` | Defender for Endpoint Event statistics <br/>(see the note after this table) |
310+
| `mde_ebpf_statistics.txt` | Defender for Endpoint eBPF statistics <br/>(see the note after this table) |
311311
| `kernel_logs.zip` | Kernel logs |
312312
| `mdc_log.zip` | Microsoft Defender for Cloud logs |
313313
| `netext_config.txt` | |
314-
| `threat_list.txt` | List of threats detected by Defender for Endpoint [^1] |
314+
| `threat_list.txt` | List of threats detected by Defender for Endpoint <br/>(see the note after this table) |
315315
| `top_output.txt `| Process running in the machine when the tool was run |
316316
| `top_summary.txt` | Memory and CPU usage analytics of the process running |
317317
318-
[^1]: Only when Defender for Endpoint is installed.
318+
> [!NOTE]
319+
> This file is present only when Defender for Endpoint is installed.
319320
320321
### Positional arguments
321322
@@ -436,7 +437,7 @@ Add exclusions for audit-d monitoring.
436437
437438
Usage example: `sudo ./MDESupportTool exclude -d /var/foo/bar`
438439
439-
### AuditD Rate Limiter
440+
### AuditD rate limiter
440441
441442
Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
442443
@@ -455,7 +456,7 @@ Usage example: `sudo ./mde_support_tool.sh ratelimit -e true`
455456
> [!NOTE]
456457
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
457458
458-
### AuditD Skip Faulty Rules
459+
### AuditD skips faulty rules
459460
460461
This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there's a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the `-c` option.
461462

0 commit comments

Comments
 (0)