You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-linux.md
+40-13Lines changed: 40 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
9
9
ms.subservice: linux
10
10
ms.localizationpriority: medium
11
11
ms.topic: troubleshooting-general
12
-
ms.date: 10/31/2024
12
+
ms.date: 11/01/2024
13
13
ms.custom: partner-contribution
14
14
ms.collection:
15
15
- m365-security
@@ -163,7 +163,7 @@ The Python version of the client analyzer accepts command line parameters to per
163
163
164
164
```
165
165
166
-
#### Rung the client analyzer script
166
+
#### Run the client analyzer script
167
167
168
168
> [!NOTE]
169
169
> If you have an active live response session you can skip Step 1.
@@ -189,6 +189,34 @@ This section provides instructions on how to run the tool locally on the Linux m
189
189
190
190
### Run the binary version of the client analyzer
191
191
192
+
#### Summary:
193
+
194
+
1. Obtain from [https://aka.ms/xmdeclientanalyzerbinary](https://aka.ms/xmdeclientanalyzerbinary). Or, if your Linux server has internet access use `wget` to download the file:
4. Follow the on-screen instructions and then follow up with at the end of the log collection, the logs will be located in the `/tmp` directory.
213
+
214
+
5. The log set will be owned by root user so you may need root privileges to remove the log set.
215
+
216
+
6. Upload the file for the support engineer.
217
+
218
+
#### Details:
219
+
192
220
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine you need to investigate.
193
221
194
222
If you're using a terminal, download the tool by entering the following command:
@@ -217,18 +245,17 @@ This section provides instructions on how to run the tool locally on the Linux m
217
245
cd XMDEClientAnalyzerBinary
218
246
```
219
247
220
-
4. Two new zip files are produced:
248
+
1. Two new zip files are produced:
221
249
222
250
-`SupportToolLinuxBinary.zip`: For all Linux devices
223
-
-`SupportToolMacOSBinary.zip`: For Mac devices
224
-
225
-
5. Depending on the operating system, unzip the appropriate file for the machine you want to investigate.
226
-
227
-
| OS type | Command |
228
-
|--|--|
229
-
| Linux |`unzip -q SupportToolLinuxBinary.zip`|
230
-
| Mac |`unzip -q SupportToolMacOSBinary.zip`|
251
+
-`SupportToolMacOSBinary.zip`: For Mac devices, ignore this one.
252
+
253
+
1. Unzip the SupportToolLinuxBinary.zip for the Linux machine you want to investigate.
231
254
255
+
```bash
256
+
unzip -q SupportToolLinuxBinary.zip
257
+
```
258
+
232
259
6. Run the tool as root to generate diagnostic package:
233
260
234
261
```bash
@@ -245,11 +272,11 @@ This section provides instructions on how to run the tool locally on the Linux m
245
272
> [!WARNING]
246
273
> Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
247
274
248
-
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
275
+
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Linux machine you need to investigate.
249
276
250
277
If you're using a terminal, download the tool by running the following command:
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-macos.md
+12-79Lines changed: 12 additions & 79 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
9
9
ms.subservice: macos
10
10
ms.localizationpriority: medium
11
11
ms.topic: troubleshooting-general
12
-
ms.date: 10/31/2024
12
+
ms.date: 11/01/2024
13
13
ms.custom: partner-contribution
14
14
ms.collection:
15
15
- m365-security
@@ -24,9 +24,6 @@ f1.keywords: NOCSH
24
24
25
25
If you're experiencing reliability or device health issues with Microsoft Defender for Endpoint on macOS, you can use the XMDE Client Analyzer to diagnose these issues. This article describes two ways to use the client analyzer tool:
26
26
27
-
-[Use the binary version of the client analyzer](#use-the-binary-version-of-the-client-analyzer)
28
-
-
29
-
30
27
1. Using a binary version (no external Python dependency)
31
28
2. Using a Python-based solution
32
29
@@ -65,13 +62,12 @@ If you're experiencing reliability or device health issues with Microsoft Defend
65
62
-`SupportToolLinuxBinary.zip`: For all Linux devices
66
63
-`SupportToolMacOSBinary.zip`: For Mac devices
67
64
68
-
5. Depending on the machine you're investigating, unzip the appropriate file.
69
-
70
-
| OS type | Terminal command |
71
-
|---|---|
72
-
| Linux |`unzip -q SupportToolLinuxBinary.zip`|
73
-
| Mac |`unzip -q SupportToolMacOSBinary.zip`|
65
+
1. Unzip the SupportToolMacOSBinary.zip.
74
66
67
+
```bash
68
+
unzip -q SupportToolMacOSBinary.zip
69
+
```
70
+
75
71
6. Run the tool as root to generate your diagnostic package:
76
72
77
73
```bash
@@ -87,11 +83,11 @@ The tool currently requires Python version 3 or later to be installed on your de
87
83
> [!WARNING]
88
84
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
89
85
90
-
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac or Linux machine you're investigating.
86
+
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac machine you're investigating.
91
87
92
88
If you're using a terminal, download the tool by running the following command:
Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
231
-
232
-
> [!NOTE]
233
-
> This functionality exists for Linux only.
234
-
235
-
```console
236
-
-h, --help show this help message and exit
237
-
-e <true/false>, --enable <true/false> enable/disable the rate limit with default values
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
244
-
245
-
### AuditD Skip Faulty Rules
246
-
247
-
This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there's a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the -c option.
248
-
249
-
> [!NOTE]
250
-
> This functionality is only available on Linux.
251
-
252
-
```console
253
-
-h, --help show this help message and exit
254
-
-e <true/false>, --enable <true/false> enable/disable the option to skip the faulty rules. In case no argumanet is passed, the option will be true by default.
> This functionality skips faulty rules. The faulty rule then needs to be further identified and fixed.
261
-
262
-
## Result package contents on macOS and Linux
195
+
## Result package contents on macOS
263
196
264
197
| File | Description |
265
198
|---|---|
266
199
|`report.html`| The main HTML output file that contains the findings and guidance from running the client analyzer tool on the device. This file is only generated when running the Python-based version of the client analyzer tool. |
267
-
|`mde_diagnostic.zip`| Same diagnostic output that gets generated when running `mdatp diagnostic create` on either [macOS](mac-resources.md#collecting-diagnostic-information) or [Linux](linux-resources.md#collect-diagnostic-information). |
200
+
|`mde_diagnostic.zip`| Same diagnostic output that gets generated when running `mdatp diagnostic create` on [macOS](mac-resources.md#collecting-diagnostic-information). |
268
201
|`mde.xml`| XML output that is generated while running and is used to build the html report file. |
269
202
|`Processes_information.txt`| Contains the details of the running Microsoft Defender for Endpoint related processes on the system. |
270
203
|`Log.txt`| Contains the same log messages written on screen during the data collection. |
0 commit comments