You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -39,116 +39,110 @@ Depending on the applications that you are running and your device characteristi
39
39
## Troubleshoot performance issues using Real-time Protection Statistics
40
40
41
41
**Applies to:**
42
-
- Only performance issues related to AV
42
+
- Only performance issues related to antivirus
43
43
44
44
Real-time protection (RTP) is a feature of Defender for Endpoint on Linux that continuously monitors and protects your device against threats. It consists of file and process monitoring and other heuristics.
45
45
46
46
The following steps can be used to troubleshoot and mitigate these issues:
47
47
48
-
1. Disable real-time protection using one of the following methods and observe whether the performance improves. This approach helps narrow down whether Defender for Endpoint on Linux is contributing to the performance issues.
48
+
1. Disable real-time protection using one of the following methods and observe whether the performance improves. This approach helps narrow down whether Defender for Endpoint on Linux is contributing to the performance issues. If your device is not managed by your organization, real-time protection can be disabled from the command line:
49
49
50
-
If your device is not managed by your organization, real-time protection can be disabled from the command line:
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
59
59
60
-
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
61
-
62
-
> [!NOTE]
63
-
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
60
+
> [!NOTE]
61
+
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
64
62
65
63
2. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on Linux.
66
64
67
-
> [!NOTE]
68
-
> This feature is available in version 100.90.70 or newer.
65
+
> [!NOTE]
66
+
> This feature is available in version 100.90.70 or newer.
69
67
70
-
This feature is enabled by default on the `Dogfood` and `InsiderFast` channels. If you're using a different update channel, this feature can be enabled from the command line:
68
+
This feature is enabled by default on the `Dogfood` and `InsiderFast` channels. If you're using a different update channel, this feature can be enabled from the command line:
The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact.
128
-
For example, the output of the command will be something like the below:
The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact. For example, the output of the command will be something like the below:
143
126
144
-
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
> The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
141
+
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
148
142
149
-
5. Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues and re-enable real-time protection.
143
+
> [!NOTE]
144
+
> The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
150
145
151
-
For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).
152
146
153
147
## Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer
154
148
@@ -158,14 +152,14 @@ The following steps can be used to troubleshoot and mitigate these issues:
158
152
The Microsoft Defender for Endpoint Client Analyzer (MDECA) can collect traces, logs, and diagnostic information in order to troubleshoot performance issues on [onboarded devices](onboard-configure.md) on Linux.
159
153
160
154
> [!NOTE]
161
-
>
162
155
> - The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information such as (but not limited to) IP addresses, PC names that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint. For more information about our privacy statement, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
163
156
> - As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](mac-whatsnew.md) and confirming that the issue still persists before investigating further.
164
157
165
158
To run the client analyzer for troubleshooting performance issues, see [Run the client analyzer on macOS and Linux](run-analyzer-macos-linux.md).
166
159
167
-
> [!NOTE]
168
-
> In case after following the above steps, the performance problem persists, please contact customer support for further instructions and mitigation.
160
+
## Configure Global Exclusions for better performance
161
+
162
+
Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues. For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md). IF you still have performace issues, contact support for further instructions and mitigation.
169
163
170
164
## Troubleshoot AuditD performance issues
171
165
@@ -181,54 +175,33 @@ To run the client analyzer for troubleshooting performance issues, see [Run the
181
175
182
176
In certain server workloads, two issues might be observed:
183
177
184
-
- **High CPU** resource consumption from ***mdatp_audisp_plugin*** process.
178
+
-`High CPU` resource consumption from `mdatp_audisp_plugin` process.
185
179
186
-
- ***/var/log/audit/audit.log*** becoming large or frequently rotating.
180
+
-`/var/log/audit/audit.log` becoming large or frequently rotating.
187
181
188
-
These issues may occur on servers with many events flooding AuditD.
182
+
These issues may occur on servers with many events flooding AuditD. Such issues can arise if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events. To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
189
183
190
-
> [!NOTE]
191
-
> As a best practice, we recommend to configure AuditD logs to rotate when the maximum file size limit is reached.
192
-
>
193
-
> This will prevent AuditD logs accumulating in a single file and the rotated log files can be moved out to save disk space.
194
-
>
195
-
> To achieve this, you can set the value for **max_log_file_action** to **rotate** in the [auditd.conf](https://linux.die.net/man/8/auditd.conf) file.
184
+
As a best practice, we recommend to configure AuditD logs to rotate when the maximum file size limit is reached. This configuration prevents AuditD logs from accumulating in a single file, and the rotated log files can be moved out to save disk space. To achieve this, you can set the value for `max_log_file_action` to `rotate` in the [auditd.conf](https://linux.die.net/man/8/auditd.conf) file.
196
185
197
-
This can happen if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events.
198
-
199
-
To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
200
-
201
186
> [!NOTE]
202
-
> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further.
203
-
>
204
-
> That there are additional configurations that can affect AuditD subsystem CPU strain.
205
-
>
206
-
> Specifically, in [auditd.conf](https://linux.die.net/man/8/auditd.conf), the value for **disp_qos** can be set to "lossy" to reduce the high CPU consumption.
207
-
>
208
-
> However, this means that some events may be dropped during peak CPU consumption.
187
+
> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further. That there are additional configurations that can affect AuditD subsystem CPU strain. Specifically, in [auditd.conf](https://linux.die.net/man/8/auditd.conf), the value for `disp_qos` can be set to `lossy` to reduce the high CPU consumption. However, this means that some events may be dropped during peak CPU consumption.
209
188
210
189
### XMDEClientAnalyzer
211
190
212
191
When you use [XMDEClientAnalyzer](run-analyzer-macos-linux.md), the following files will display output that provides insights to help you troubleshoot issues.
213
192
214
-
- auditd_info.txt
215
-
- auditd_log_analysis.txt
193
+
-`auditd_info.txt`
194
+
-`auditd_log_analysis.txt`
216
195
217
196
#### auditd_info.txt
218
197
219
-
Contains general AuditD configuration and will display:
198
+
Contains general AuditD configuration and displays the following information:
220
199
221
200
- What processes are registered as AuditD consumers.
222
201
223
-
- **Auditctl -s** output with **enabled=2**
224
-
225
-
- Suggests auditd is in immutable mode (requires restart for any config changes to take effect).
226
-
227
-
- **Auditctl -l** output
202
+
-`Auditctl -s` output with `enabled=2` (Suggests auditd is in immutable mode (requires restart for any config changes to take effect.)
228
203
229
-
- Will show what rules are currently loaded into the kernel (which may be different that what exists on disk in "/etc/auditd/rules.d/mdatp.rules").
230
-
231
-
- Will show which rules are related to Microsoft Defender for Endpoint.
204
+
-`Auditctl -l` output (Shows what rules are currently loaded into the kernel, which might differ from what exists on disk in `/etc/auditd/rules.d/mdatp.rules`. Also shows which rules are related to Microsoft Defender for Endpoint.)
232
205
233
206
#### auditd_log_analysis.txt
234
207
@@ -250,23 +223,23 @@ Contains important aggregated information that is useful when investigating Audi
250
223
251
224
### Exclusion Types
252
225
253
-
The XMDEClientAnalyzer support tool contains syntax that can be used to add AuditD exclusion configuration rules:
226
+
The XMDEClientAnalyzer support tool contains syntax that can be used to add AuditD exclusion configuration rules.
254
227
255
228
AuditD exclusion – support tool syntax help:
256
229
257
230
:::image type="content" source="media/auditd-exclusion-support-tool-syntax-help.png" alt-text="syntax that can be used to add AuditD exclusion configuration rules" lightbox="media/auditd-exclusion-support-tool-syntax-help.png":::
258
231
259
232
**By initiator**
260
233
261
-
- **-e/ -exe** full binary path > Removes all events by this initiator
234
+
-`-e/ -exe` full binary path > Removes all events by this initiator
262
235
263
236
**By path**
264
237
265
-
- **-d / -dir** full path to a directory > Removes filesystem events targeting this directory
238
+
-`-d / -dir` full path to a directory > Removes filesystem events targeting this directory
266
239
267
240
Examples:
268
241
269
-
If "`/opt/app/bin/app`" writes to "`/opt/app/cfg/logs/1234.log`", then you can use the support tool to exclude with various options:
242
+
If `/opt/app/bin/app` writes to `/opt/app/cfg/logs/1234.log`, then you can use the support tool to exclude with various options:
270
243
271
244
`-e /opt/app/bin/app`
272
245
@@ -313,4 +286,5 @@ When the ratelimit is enabled a rule will be added in AuditD to handle 2500 even
313
286
## See also
314
287
315
288
-[Investigate agent health issues](health-status.md)
289
+
316
290
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments