You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/identity-inventory.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
36
36
37
37
- Apply filters.
38
38
39
-
- Search for an identity by name or full UPN, Sid and Object ID.
39
+
- Search for an identity by name or full UPN, SID and Object ID.
40
40
41
41
- Export the list to a CSV file.
42
42
43
43
- Copy list link with the included filters configured.
44
44
45
-
## 
45
+
> [!NOTE]
46
+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47
+
48
+
## 
46
49
47
50
### Identity details
48
51
@@ -120,7 +123,7 @@ You can use this information to help you prioritize devices for security posture
120
123
121
124
### Navigate to the Identity inventory page
122
125
123
-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126
+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
Copy file name to clipboardExpand all lines: defender-endpoint/data-collection-analyzer.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,19 +17,20 @@ ms.collection:
17
17
ms.topic: conceptual
18
18
ms.subservice: ngp
19
19
search.appverid: met150
20
-
ms.date: 03/26/2025
20
+
ms.date: 04/01/2025
21
21
---
22
22
23
23
# Data collection for advanced troubleshooting on Windows
24
24
25
25
**Applies to:**
26
26
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
-
29
28
- Microsoft Defender for Business
30
-
31
29
- Microsoft Defender Antivirus
32
30
31
+
> [!TIP]
32
+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
33
+
33
34
When collaborating with Microsoft support professionals, you might be asked to use the client analyzer to collect data for troubleshooting of more complex scenarios. The analyzer script supports other parameters for that purpose and can collect a specific log set based on the observed symptoms that need to be investigated.
34
35
35
36
Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their description:
@@ -48,7 +49,7 @@ Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their
48
49
|`-v`|Uses antivirus [MpCmdRun.exe command line argument](/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus) with most verbose -trace flags. |Anytime an advanced troubleshooting is needed. Such as when troubleshooting Cloud Protection (MAPS) reporting failures, Platform Update failures, Engine update failures, Security Intelligence Update failures, False negatives, etc. Can also be used with `-b`, `-c`, `-h`, or `-l`.|`MsMpEng.exe`|
49
50
|`-t`|Starts verbose trace of all client-side components relevant to Endpoint DLP, which is useful for scenarios where [DLP actions](/microsoft-365/compliance/endpoint-dlp-learn-about#endpoint-activities-you-can-monitor-and-take-action-on) aren't happening as expected for files. |When running into issues where the Microsoft Endpoint Data Loss Prevention (DLP) actions expected aren't occurring.|`MpDlpService.exe`|
50
51
|`-q`|Calls into DLPDiagnose.ps1 script from the analyzer `Tools` directory that validates the basic configuration and requirements for Endpoint DLP. |Checks the basic configuration and requirements for Microsoft Endpoint DLP|`MpDlpService.exe`|
51
-
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2 or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52
+
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52
53
|`-z`|Configures registry keys on the machine to prepare it for full machine memory dump collection via [CrashOnCtrlScroll](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard). This would be useful for analysis of computer freeze issues. \* Hold down the rightmost CTRL key, then press the SCROLL LOCK key twice. |Machine hanging or being unresponsive or slow. High memory usage (Memory leak): a) User mode: Private bytes b) Kernel mode: paged pool or nonpaged pool memory, handle leaks.|`MSSense.exe` or `MsMpEng.exe`|
53
54
|`-k`|Uses [NotMyFault](/sysinternals/downloads/notmyfault) tool to force the system to crash and generate a machine memory dump. This would be useful for analysis of various OS stability issues. |Same as above.|`MSSense.exe` or `MsMpEng.exe`|
54
55
@@ -65,14 +66,14 @@ The analyzer, and all of the scenario flags listed in this article, can be initi
65
66
66
67
When you use `RemoteMDEClientAnalyzer.cmd`, it calls into `psexec` to download the tool from the configured file share and then run it locally via `PsExec.exe`.
67
68
68
-
The CMD script uses the `-r` flag to specify that it is running remotely within SYSTEM context, and so no prompt is presented to the user.
69
+
The CMD script uses the `-r` flag to specify that it's running remotely within SYSTEM context, and so no prompt is presented to the user.
69
70
70
71
That same flag can be used with `MDEClientAnalyzer.cmd` to avoid a prompt to the user to specify the number of minutes for data collection. For example, consider `MDEClientAnalyzer.cmd -r -i -m 5`.
71
72
72
73
-`-r` indicates that tool is being run from remote (or non-interactive context).
73
74
-`-i` is the scenario flag for collection of network trace along with other related logs.
74
75
-`-m #` denotes the number of minutes to run (we used 5 minutes in our example).
75
76
76
-
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you will get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77
+
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you'll get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77
78
78
79
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-ngp
18
18
search.appverid: met150
19
-
ms.date: 03/04/2025
19
+
ms.date: 04/01/2025
20
20
---
21
21
22
22
# Detect and block potentially unwanted applications
@@ -106,6 +106,12 @@ You can enable PUA protection with Microsoft Defender for Endpoint Security Sett
106
106
107
107
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
108
108
109
+
| Operating systems |Potentially Unwanted Protection (PUA) by default is set to:|
110
+
| -------- | -------- |
111
+
|Windows 11, Windows 10, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016|Audit mode (2)|
112
+
|Windows 11, Windows 10 + Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Endpoint for Business|Block mode (1)|
113
+
|Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 with the unified Microsoft Defender for Endpoint client + Microsoft Defender for Servers Plan 1 or Microsoft Defender for Servers Plan 2 or Microsoft Defender for Endpoint for servers|Block mode (1) |
114
+
109
115
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
110
116
111
117
See the following articles:
@@ -156,7 +162,7 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
156
162
Set-MpPreference -PUAProtection Enabled
157
163
```
158
164
159
-
Setting the value for this cmdlet to `Enabled` turns on the feature if it is disabled.
165
+
Setting the value for this cmdlet to `Enabled` turns on the feature if it's disabled.
160
166
161
167
#### To set PUA protection to audit mode
162
168
@@ -186,8 +192,8 @@ get-mpPreference | ft PUAProtection
186
192
|Value | Description|
187
193
| -------- | -------- |
188
194
|`0`| PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
189
-
|`1`| PUA Protection on. Detected items are blocked. They will show in history along with other threats.|
190
-
|`2`| Audit mode. Microsoft Defender Antivirus will detect potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
195
+
|`1`| PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196
+
|`2`| Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
191
197
192
198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
0 commit comments