@@ -274,8 +274,8 @@ The files generated when using this mode are summarized in the following table:
274
274
| ` syslog.zip` | The files under /var/log/syslog |
275
275
| ` messages.zip` | The files under /var/log/messages |
276
276
| ` conflicting_processes_information.txt` | Defender for Endpoint Conflicting Processes |
277
- | ` exclusions.txt` | List of AV exclusions |
278
- | ` definitions.txt` | AV definition info |
277
+ | ` exclusions.txt` | List of Antivirus exclusions |
278
+ | ` definitions.txt` | Antivirus definition info |
279
279
| ` mde_directories.txt` | List of files in the Defender for Endpoint directories |
280
280
| ` disk_usage.txt` | Disk usage details |
281
281
| ` mde_user.txt` | Defender for Endpoint User Info |
@@ -289,33 +289,34 @@ The files generated when using this mode are summarized in the following table:
289
289
| ` meminfo.txt` | Detailed information about the system' s memory usage |
290
290
| `cpuinfo.txt` | CPU Information |
291
291
| `lsns_info.txt` | Linux namespace information |
292
- | `lsof.txt` | Defender for Endpoint Open File Descriptors Information [^1] |
292
+ | `lsof.txt` | Defender for Endpoint Open File Descriptors Information <br/>(see the note after this table) |
293
293
| `sestatus.txt` | Defender for Endpoint Open File Descriptors Information |
294
294
| `lsmod.txt` | Status of modules in the Linux kernel |
295
295
| `dmesg.txt` | Messages from the kernel ring buffer |
296
296
| `kernel_lockdown.txt` | kernel lockdown Info |
297
- | `rtp_statistics.txt` | Defender for Endpoint Real Time Protection(RTP) statistics [^1] |
297
+ | `rtp_statistics.txt` | Defender for Endpoint Real Time Protection(RTP) statistics <br/>(see the note after this table) |
298
298
| `libc_info.txt` | libc library information |
299
299
| `uptime_info.txt` | Time since last restart |
300
300
| `last_info.txt` | Listing of last logged in users |
301
301
| `locale_info.txt` | Show current locale |
302
- | `tmp_files_owned_by_mdatp.txt` | /tmp files owned by group:mdatp [^1] |
303
- | `mdatp_config.txt` | All the Defender for Endpoint configurations [^1] |
304
- | `mpenginedb.db`, `mpenginedb.db-wal`, `mpenginedb.db-shm` | AV definitions file [^1] |
302
+ | `tmp_files_owned_by_mdatp.txt` | /tmp files owned by group:mdatp <br/>(see the note after this table) |
303
+ | `mdatp_config.txt` | All the Defender for Endpoint configurations <br/>(see the note after this table) |
304
+ | `mpenginedb.db`<br/> `mpenginedb.db-wal`<br/> `mpenginedb.db-shm` | Antivirus definitions file <br/>(see the note after this table) |
305
305
| `iptables_rules.txt` | Linux iptables rules |
306
306
| `network_info.txt` | Network information |
307
307
| `sysctl_info.txt` | kernel settings info |
308
308
| `hostname_diagnostics.txt` | Hostname diagnostics information |
309
- | `mde_event_statistics.txt` | Defender for Endpoint Event statistics [^1] |
310
- | `mde_ebpf_statistics.txt` | Defender for Endpoint eBPF statistics [^1] |
309
+ | `mde_event_statistics.txt` | Defender for Endpoint Event statistics <br/>(see the note after this table) |
310
+ | `mde_ebpf_statistics.txt` | Defender for Endpoint eBPF statistics <br/>(see the note after this table) |
311
311
| `kernel_logs.zip` | Kernel logs |
312
312
| `mdc_log.zip` | Microsoft Defender for Cloud logs |
313
313
| `netext_config.txt` | |
314
- | `threat_list.txt` | List of threats detected by Defender for Endpoint [^1] |
314
+ | `threat_list.txt` | List of threats detected by Defender for Endpoint <br/>(see the note after this table) |
315
315
| `top_output.txt `| Process running in the machine when the tool was run |
316
316
| `top_summary.txt` | Memory and CPU usage analytics of the process running |
317
317
318
- [^1]: Only when Defender for Endpoint is installed.
318
+ > [!NOTE]
319
+ > This file is present only when Defender for Endpoint is installed.
319
320
320
321
### Positional arguments
321
322
@@ -436,7 +437,7 @@ Add exclusions for audit-d monitoring.
436
437
437
438
Usage example: `sudo ./MDESupportTool exclude -d /var/foo/bar`
438
439
439
- ### AuditD Rate Limiter
440
+ ### AuditD rate limiter
440
441
441
442
Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
442
443
@@ -455,7 +456,7 @@ Usage example: `sudo ./mde_support_tool.sh ratelimit -e true`
455
456
> [!NOTE]
456
457
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
457
458
458
- ### AuditD Skip Faulty Rules
459
+ ### AuditD skips faulty rules
459
460
460
461
This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there' s a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the ` -c` option.
461
462
0 commit comments