Skip to content

Commit 53839c9

Browse files
authored
Merge pull request #3334 from MicrosoftDocs/mde-video-updates
MDE Videos
2 parents 0589dee + ddd67ff commit 53839c9

7 files changed

+61
-39
lines changed

defender-endpoint/data-collection-analyzer.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,19 +17,20 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 03/26/2025
20+
ms.date: 04/01/2025
2121
---
2222

2323
# Data collection for advanced troubleshooting on Windows
2424

2525
**Applies to:**
2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28-
2928
- Microsoft Defender for Business
30-
3129
- Microsoft Defender Antivirus
3230

31+
> [!TIP]
32+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
33+
3334
When collaborating with Microsoft support professionals, you might be asked to use the client analyzer to collect data for troubleshooting of more complex scenarios. The analyzer script supports other parameters for that purpose and can collect a specific log set based on the observed symptoms that need to be investigated.
3435

3536
Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their description:
@@ -48,7 +49,7 @@ Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their
4849
|`-v`|Uses antivirus [MpCmdRun.exe command line argument](/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus) with most verbose -trace flags. |Anytime an advanced troubleshooting is needed. Such as when troubleshooting Cloud Protection (MAPS) reporting failures, Platform Update failures, Engine update failures, Security Intelligence Update failures, False negatives, etc. Can also be used with `-b`, `-c`, `-h`, or `-l`.|`MsMpEng.exe` |
4950
|`-t` |Starts verbose trace of all client-side components relevant to Endpoint DLP, which is useful for scenarios where [DLP actions](/microsoft-365/compliance/endpoint-dlp-learn-about#endpoint-activities-you-can-monitor-and-take-action-on) aren't happening as expected for files. |When running into issues where the Microsoft Endpoint Data Loss Prevention (DLP) actions expected aren't occurring.|`MpDlpService.exe` |
5051
|`-q`|Calls into DLPDiagnose.ps1 script from the analyzer `Tools` directory that validates the basic configuration and requirements for Endpoint DLP. |Checks the basic configuration and requirements for Microsoft Endpoint DLP|`MpDlpService.exe`|
51-
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2 or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52+
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
5253
|`-z` |Configures registry keys on the machine to prepare it for full machine memory dump collection via [CrashOnCtrlScroll](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard). This would be useful for analysis of computer freeze issues. \* Hold down the rightmost CTRL key, then press the SCROLL LOCK key twice. |Machine hanging or being unresponsive or slow. High memory usage (Memory leak): a) User mode: Private bytes b) Kernel mode: paged pool or nonpaged pool memory, handle leaks.|`MSSense.exe` or `MsMpEng.exe` |
5354
|`-k` |Uses [NotMyFault](/sysinternals/downloads/notmyfault) tool to force the system to crash and generate a machine memory dump. This would be useful for analysis of various OS stability issues. |Same as above.|`MSSense.exe` or `MsMpEng.exe` |
5455

@@ -65,14 +66,14 @@ The analyzer, and all of the scenario flags listed in this article, can be initi
6566

6667
When you use `RemoteMDEClientAnalyzer.cmd`, it calls into `psexec` to download the tool from the configured file share and then run it locally via `PsExec.exe`.
6768

68-
The CMD script uses the `-r` flag to specify that it is running remotely within SYSTEM context, and so no prompt is presented to the user.
69+
The CMD script uses the `-r` flag to specify that it's running remotely within SYSTEM context, and so no prompt is presented to the user.
6970

7071
That same flag can be used with `MDEClientAnalyzer.cmd` to avoid a prompt to the user to specify the number of minutes for data collection. For example, consider `MDEClientAnalyzer.cmd -r -i -m 5`.
7172

7273
- `-r` indicates that tool is being run from remote (or non-interactive context).
7374
- `-i` is the scenario flag for collection of network trace along with other related logs.
7475
- `-m #` denotes the number of minutes to run (we used 5 minutes in our example).
7576

76-
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you will get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77+
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you'll get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
7778

7879
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/overview-client-analyzer.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 03/12/2025
20+
ms.date: 04/01/2025
2121
---
2222

2323
# Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
@@ -26,7 +26,7 @@ ms.date: 03/12/2025
2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828

29-
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you may want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
29+
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you might want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
3030

3131
Besides obvious sensor health issues, MDECA can collect other traces, logs, and diagnostic information for troubleshooting complex scenarios such as:
3232

@@ -39,15 +39,18 @@ Besides obvious sensor health issues, MDECA can collect other traces, logs, and
3939
- [Run the client analyzer on Linux](run-analyzer-linux.md)
4040
- [Run the client analyzer on macOS](run-analyzer-macos.md)
4141

42+
> [!TIP]
43+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
44+
4245
## Privacy notice
4346

44-
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint.
47+
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you might be experiencing with Microsoft Defender for Endpoint.
4548

46-
- The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
49+
- The collected data might contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
4750

4851
- Once data collection is complete, the tool saves the data locally on the machine within a subfolder and compressed zip file.
4952

50-
- No data is automatically sent to Microsoft. If you are using the tool during collaboration on a support issue, you may be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
53+
- No data is automatically sent to Microsoft. If you're using the tool during collaboration on a support issue, you might be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
5154

5255
For more information about Secure File Exchange, see [How to use Secure File Exchange to exchange files with Microsoft Support](/troubleshoot/azure/general/secure-file-exchange-transfer-files)
5356

@@ -59,9 +62,9 @@ For more information about our privacy statement, see [Microsoft Privacy Stateme
5962

6063
- The analyzer can run on supported editions of [Windows](minimum-requirements.md#supported-windows-versions), [Linux](/defender-endpoint/mde-linux-prerequisites), or [macOS](microsoft-defender-endpoint-mac.md#system-requirements) either before of after onboarding to Microsoft Defender for Endpoint.
6164

62-
- For Windows devices, if you are running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
65+
- For Windows devices, if you're running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
6366

6467
> [!NOTE]
65-
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allows the analyzer to run connectivity checks to cloud without being blocked.
68+
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allow the analyzer to run connectivity checks to cloud without being blocked.
6669
6770
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/run-analyzer-linux.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 03/12/2025
12+
ms.date: 04/01/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -31,6 +31,8 @@ f1.keywords: NOCSH
3131
3232
If you have issues with Microsoft Defender for Endpoint on Linux and need support, you might be asked to provide the output from the Client Analyzer tool. This article explains how to use the tool on your device or with live response. You can use either a Python-based solution or a binary version that doesn't need Python.
3333

34+
> [!TIP]
35+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
3436
3537
## Running the binary version of the client analyzer
3638

@@ -126,6 +128,9 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
126128
sudo ./mde_support_tool.sh -d
127129
```
128130
131+
> [!TIP]
132+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
133+
129134
## Command line options
130135
Below are the command line options provided by client analyzer
131136
@@ -370,15 +375,15 @@ A single report `installation_report.json` is generated. The keys in the file ar
370375
371376
| Key | Remarks |
372377
| ------------- | ------------- |
373-
| agent_version | Version of Defender for Endpoint installed |
378+
| agent_version | Version of Defender for Endpoint installed. |
374379
| onboarding_status | The onboarding and ring info |
375-
| support_status | MDE is supported with the current system configurations |
376-
| distro | The distro on which the agent is installed in supported or not |
377-
| connectivitytest | The connectivity test stratus|
378-
| min_requirement | The minimum requirements for CPU and Memory are met|
379-
| external_depedency | The external dependencies are satisfied or not |
380+
| support_status | MDE is supported with the current system configurations. |
381+
| distro | The distro on which the agent is installed in supported or not. |
382+
| connectivitytest | The connectivity tests status.|
383+
| min_requirement | The minimum requirements for CPU and Memory are met.|
384+
| external_depedency | The external dependencies are satisfied or not. |
380385
| mde_health | Health status of MDE Agent|
381-
| folder_perm | The required folder permissions are met or not |
386+
| folder_perm | The required folder permissions are met or not. |
382387
383388
#### Exclude mode
384389
@@ -525,7 +530,8 @@ The following script performs the first six steps of the [Running the Python ver
525530
./mde_support_tool.sh
526531
527532
```
528-
533+
> [!TIP]
534+
> Watch this video to learn more about endpoint settings: [Defender for Endpoint client analyzer endpoint settings](https://www.youtube.com/watch?v=Frw2xFjzphE)
529535
#### Run the client analyzer install scripts
530536
531537
1. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you want to investigate.

defender-endpoint/run-analyzer-macos.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: macos
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 01/08/2025
12+
ms.date: 04/01/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -27,6 +27,9 @@ If you're experiencing reliability or device health issues with Microsoft Defend
2727
1. Using a binary version (no external Python dependency)
2828
2. Using a Python-based solution
2929

30+
> [!TIP]
31+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
32+
3033
## Use the binary version of the client analyzer
3134

3235
1. Download the [XMDE Client Analyzer Binary](https://go.microsoft.com/fwlink/?linkid=2297517) tool to the macOS machine you need to investigate.
@@ -81,7 +84,7 @@ The client analyzer depends on few extra PIP packages (`decorator`, `sh`, `distr
8184
The tool currently requires Python version 3 or later to be installed on your device. If your device is behind a proxy, then you can pass the proxy server as an environment variable to the `mde_support_tool.sh` script. For example: `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`.
8285

8386
> [!WARNING]
84-
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
87+
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, it's recommended that you install the packages into a user PIP environment.
8588
8689
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac machine you're investigating.
8790

@@ -124,7 +127,7 @@ The tool currently requires Python version 3 or later to be installed on your de
124127
./mde_support_tool.sh
125128
```
126129
127-
7. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
130+
7. When you download files on macOS, it automatically adds a new extended attribute called com.apple.quarantine which is scanned by Gatekeeper. Before running, you'll want to remove this extended attribute:
128131

129132
```bash
130133
xattr -c MDESupportTools
@@ -134,14 +137,17 @@ The tool currently requires Python version 3 or later to be installed on your de
134137

135138
"You might get a "MDESupportTool" Not Opened
136139
137-
Apple could not verify "MDESupportTool" is free of malware that may harm your Mac or compromise your privacy"
140+
Apple couldn't verify "MDESupportTool" is free of malware that might harm your Mac or compromise your privacy"
138141

139142
8. To collect actual diagnostic package and generate the result archive file, run again as root:
140143

141144
```bash
142145
sudo ./mde_support_tool.sh -d
143146
```
144-
147+
148+
> [!TIP]
149+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
150+
145151
## Command line options
146152

147153
### Primary command lines

0 commit comments

Comments
 (0)