Prerequisites
- RepCLI Authentication must be enabled. If RepCLI Authentication was not enabled during the initial sensor install then RepCLI Authentication can be enabled on existing sensor installations
- Create a folder where all logs will be saved. For the purposes of this document, this location will be referenced as c:\temp although the c:\temp file location can be replaced with whatever location you have specified for saving the log files.
- Procmon configured for a Low Altitude capture (may require reboot to setup).
- Windows Performance Recorder
- The command line version is included by default on Windows 10 and above.
- The Graphical User Interface can be installed for other versions.
Reproduce the behavior when Sensor is Active
- Open a command line prompt using "Run as Administrator".
- Run the following command to start the WPR Trace (ETL) Log and reset counters depending on the estimated time needed to reproduce
Less than 5 Minutes
C:\temp>wpr -start GeneralProfile -start CPU -start Registry -start FileIO -start DiskIO -start Minifilter -start Network -filemode
More than 5 Minutes
C:\temp>wpr -start GeneralProfile -start CPU -start Registry -start FileIO -start DiskIO -start Network -filemode
- Reproduce the behavior
- Document exact steps taken to reproduce to provide to Support
- Note local machine time when testing started, and timezone of machine
- Note local time when issue occurred
- Collect the wpr-active.etl, counters.txt, and psc_sensor.zip
A. C:\Program Files\Confer>repcli counters > C:\temp\counters.txt -- Change to desired location
B. C:\temp>wpr -stop c:\temp\wpr-active.etl
C. C:\Program Files\Confer>repcli capture c:\temp -- Change to desired location
Collecting diagnostic data (this may take a few minutes)...
....
Captured diagnostic data in c:\temp\psc_sensor.zip
- Rename counters.txt to wpr-active-counters.txt, and psc_sensor.zip to wpr-active-psc_sensor.zip
- Run the following commands to collect the Procmon, Sensor logs, Counter logs :
A. C:\WINDOWS\system32>cd c:\program files\confer
B. C:\Program Files\Confer>sc qprotection cbdefense --Result will show either ANTIMALWARE LIGHT or None. If none skip to step H.
C. C:\Program Files\Confer>repcli bypass 1
D. C:\Program Files\Confer>repcli registerProtectedSvcs 0
E. C:\Program Files\Confer>repcli stopCbServices
F. C:\Program Files\Confer>sc start cbdefense
G. C:\Program Files\Confer>repcli bypass 0
H. C:\Program Files\Confer>repcli deletepolicy 1DED7E47-CE4C-448E-AD01-6F4AC3CE7F5D
I. C:\Program Files\Confer>repcli resetcounters
- Launch Procmon.exe
- Start collection in Procmon (CTRL+E)
- Reproduce the behavior
- Document exact steps taken to reproduce to provide to Support
- Note local machine time when testing started, and timezone of machine
- Note local time when issue occurred
- Stop collection in Procmon (CTRL+E) and save the log file
- In the Save pop-up window, Select "Events to save: All events" and "Format: PML"
- Change the file name to procmon-active.PML
- Click "Save" and save to C:\temp
- Run commands to collect counters.txt and psc_sensor.zip
A. C:\Program Files\Confer>repcli counters > C:\temp\counters.txt -- Change to desired location
B. C:\Program Files\Confer>repcli capture c:\temp -- Change to desired location
Collecting diagnostic data (this may take a few minutes)...
....
Captured diagnostic data in c:\temp\psc_sensor.zip
- Rename counters.txt to procmon-active-counters.txt, and psc_sensor.zip to procmon-active-psc_sensor.zip
Reproduce the behavior when Sensor is in Bypass
- Place the sensor into bypass mode:
C:\Program Files\Confer>repcli bypass 1
- Run the following command to start the WPR Trace (ETL) Log and reset counters depending on the estimated time needed to reproduce
Less than 5 Minutes
C:\temp>wpr -start GeneralProfile -start CPU -start Registry -start FileIO -start DiskIO -start Minifilter -start Network -filemode
More than 5 Minutes
wpr -start GeneralProfile -start CPU -start Registry -start FileIO -start DiskIO -start Network -filemode
- Reproduce the behavior
- Document exact steps taken to reproduce to provide to Support
- Note local machine time when testing started, and timezone of machine
- Note local time when issue occurred
- Collect the wpr-bypass.etl
C:\temp>wpr -stop c:\temp\wpr-bypass.etl
- Launch Procmon.exe
- Start collection in Procmon (CTRL+E)
- Reproduce the behavior
- Document exact steps taken to reproduce to provide to Support
- Note local machine time when testing started, and timezone of machine
- Note local time when issue occurred
- Stop collection in Procmon (CTRL+E) and save the log file
- In the Save pop-up window, Select "Events to save: All events" and "Format: PML"
- Change the file name to procmon-bypass.PML
- Click "Save" and save to C:\temp
- Run commands to restore sensor:
A. C:\Program Files\Confer>repcli registerProtectedSvcs 1 -- Unnecessary if was skipped in step Sensor Active Step 6
B. C:\Program Files\Confer>repcli stopCbServices
NOTE: If using a sensor version prior to 3.6.0.1897, edit cfg.ini and remove "UnregisterProtected=True"
C. C:\Program Files\Confer>sc start cbdefense
D. C:\Program Files\Confer>repcli bypass 0
- Go to C:\temp, zip the files below and rename zip as perf-logs.zip
- wpr-active.etl
- wpr-active-counters.txt
- wpr-active-psc_sensor.zip
- wpr-bypass.etl
- procmon-active.PML
- procmon-active-counters.txt
- procmon-active-psc_sensor.zip
- procmon-bypass.PML
- Upload the zip to the case
- Once the upload completes, please comment on the support case that the data is available for review