Intel® VTune™ Profiler ——异常检测,没有感觉到惊艳,性能的话还是热点分析更好用,另外microarch 分析可以深入cpu看性能问题
一开始需要安装一个driver!
Install the Sampling Drivers for Windows* Targets
To install the drivers on Windows* 7 (deprecated) and Windows* Server 2008 R2 operating systems, you must enable the SHA-2 code signing support for these systems by applying Microsoft Security update 3033929. If the security update is not installed, event-based sampling analysis types will not work properly on your system.
To verify the sampling driver is installed correctly on a Microsoft Windows* OS, open the command prompt as an administrator and run the
amplxe-sepreg.exe
utility located at
<
>/bin64
. To make sure your system meets all the requirements necessary for the hardware event-based sampling collection, enter:
amplxe-sepreg.exe -c
This command performs the following dependency checks required to install the sampling driver:
-
platform, architecture, and OS environment
-
availability of the sampling driver binaries:sepdrv4_x.sys,socperf2_x.sys, andsepdal.sys
-
administrative privileges
-
32/64-bit installation
To check whether the sampling driver is loaded, enter:
amplxe-sepreg.exe -s
If the sampling driver is not installed but the system is supported by the
VTune
, execute the following command with the administrative privileges to install the driver: Profiler
amplxe-sepreg.exe -i
使用amplxe-sepreg.exe -i 安装成功后!
管理员运行即出现:
修改为10ms,开始运行:
可以看到在进行硬件指令数据采集的时候,几乎是不占用CPU的!!!
group那里没有event cpu数据???咋回事???是因为选择的模式不对!!只有microarchtecture 分析才会有!!!
在这里,才有CPU event count,
注意采集的数据非常大!采用1ms,有700多MB数据!!!
标签:
安全分析
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 全程不用写代码,我用AI程序员写了一个飞机大战
· MongoDB 8.0这个新功能碉堡了,比商业数据库还牛
· 记一次.NET内存居高不下排查解决与启示
· 白话解读 Dapr 1.15:你的「微服务管家」又秀新绝活了
· DeepSeek 开源周回顾「GitHub 热点速览」
2021-08-02 fortiXDR调研
2021-08-02 fortinet XDR 和 EDR产品调研
2021-08-02 思科secure endpoint
2018-08-02 利用被入侵的路由器迈入内网——抓包,利用路由器漏洞入侵,进行流量劫持
2017-08-02 DNS反射放大攻击分析——DNS反射放大攻击主要是利用DNS回复包比请求包大的特点,放大流量,伪造请求包的源IP地址为受害者IP,将应答包的流量引入受害的服务器