Skip to content

Commit d1d3436

Browse files
committed
Update run-analyzer-linux.md
1 parent 4155a73 commit d1d3436

File tree

1 file changed

+27
-38
lines changed

1 file changed

+27
-38
lines changed

defender-endpoint/run-analyzer-linux.md

Lines changed: 27 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -22,36 +22,26 @@ f1.keywords: NOCSH
2222

2323
# Run the client analyzer on Linux
2424

25-
#
26-
2725
**Applies to:**
2826
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2927
- [Microsoft Defender XDR](/defender-xdr)
3028

3129
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
3230
33-
When contacting support, you might be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool.
34-
35-
The XMDEClientAnalyzer is used for diagnosing Microsoft Defender for Endpoint health or reliability issues on onboarded devices running Linux.
31+
If you're experiencing reliability or device health issues with Defender for Endpoint on Linux, and you contact support, you might be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool. This article describes how to use the client analyzer tool locally on the device or together with live response.
3632

37-
There are two different ways to run the client analyzer tool using live response or locally:
3833

39-
1. Using a binary version (no external Python dependency)
40-
1. Using a Python-based solution
4134

42-
## Collect support logs in Microsoft Defender for Endpoint using live response
35+
The XMDEClientAnalyzer is used for diagnosing Microsoft Defender for Endpoint health or reliability issues on onboarded devices running Linux.
4336

44-
This section provides instructions on how to run the tool via Live Response on Linux machines.
37+
There are two different ways to run the client analyzer tool using live response or locally. In both cases, you can use a Python-based solution or a binary version that has no external Python dependency.
4538

46-
## Linux
39+
## Use live response in Defender for Endpoint to collect support logs
4740

4841
The XMDE Client Analyzer tool can be downloaded as a [binary](https://aka.ms/XMDEClientAnalyzerBinary) or [Python](https://aka.ms/XMDEClientAnalyzer) package that can be extracted and executed on Linux machines. Both versions of the XMDE Client Analyzer can be executed during a Live Response session.
4942

50-
### Prerequisites
51-
52-
- For installation the `unzip` package is required.
53-
54-
- For execution the `acl` package is required.
43+
- For installation, the `unzip` package is required.
44+
- For execution, the `acl` package is required.
5545

5646
> [!IMPORTANT]
5747
> Window uses the Carriage Return and Line Feed invisible characters to represent the end of one line and beginning of a new line in a file, but Linux systems uses only the Line Feed invisible character at the end of its file lines. When using the following scripts, if done on Windows, this difference can result in errors and failures of the scripts to run. A potential solution to this is to utilize the Windows Subsystem for Linux and the `dos2unix` package to reformat the script so it aligns with the Unix and Linux format standard.
@@ -193,7 +183,7 @@ The Python Client Analyzer accepts command line parameters to perform different
193183

194184
4. Select the downloaded file named `MDESupportTool.sh`, and then select **Confirm**.
195185

196-
1. While still in the Live Response session, use the following commands to run the analyzer and collect the resulting file.
186+
5. While still in the Live Response session, use the following commands to run the analyzer and collect the resulting file:
197187

198188
```
199189
run MDESupportTool.sh -parameters "--bypass-disclaimer -d"
@@ -204,41 +194,40 @@ The Python Client Analyzer accepts command line parameters to perform different
204194

205195
This section provides instructions on how to run the tool locally on the Linux machines.
206196

207-
## Running the binary version of the client analyzer
197+
### Running the binary version of the client analyzer
208198

209-
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine you need to investigate.
210-
If you're using a terminal, download the tool by entering the following command:
199+
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine you need to investigate.
200+
201+
If you're using a terminal, download the tool by entering the following command:
211202

212-
```
213203
```bash
214-
wget --quiet -O XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
215-
```
216-
```1. Verify the download.
204+
wget --quiet -O XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
205+
```
217206

218-
- Linux
207+
2. Verify the download.
219208

220-
```bash
221-
echo '2A9BF0A6183831BE43C7BCB7917A40D772D226301B4CDA8EE4F258D00B6E4E97 XMDEClientAnalyzerBinary.zip' | sha256sum -c
222-
```
209+
```bash
210+
echo '2A9BF0A6183831BE43C7BCB7917A40D772D226301B4CDA8EE4F258D00B6E4E97 XMDEClientAnalyzerBinary.zip' | sha256sum -c
211+
```
223212

224-
2. Extract the contents of _XMDEClientAnalyzerBinary.zip_ on the machine.
213+
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.
225214

226-
If you're using a terminal, extract the files by entering the following command:
215+
If you're using a terminal, extract the files by entering the following command:
227216

228-
```bash
229-
unzip -q XMDEClientAnalyzerBinary.zip -d XMDEClientAnalyzerBinary
230-
```
217+
```bash
218+
unzip -q XMDEClientAnalyzerBinary.zip -d XMDEClientAnalyzerBinary
219+
```
231220

232221
3. Change to the tool's directory by entering the following command:
233222

234-
```bash
235-
cd XMDEClientAnalyzerBinary
236-
```
223+
```bash
224+
cd XMDEClientAnalyzerBinary
225+
```
237226

238227
4. Two new zip files are produced:
239228

240-
- **SupportToolLinuxBinary.zip** : For all Linux devices
241-
- **SupportToolMacOSBinary.zip** : For Mac devices
229+
- `SupportToolLinuxBinary.zip`: For all Linux devices
230+
- `SupportToolMacOSBinary.zip`: For Mac devices
242231

243232
5. Unzip one of the above 2 zip files based on the machine you need to investigate.
244233

0 commit comments

Comments
 (0)