Skip to content

Commit 7631c5a

Browse files
authored
Merge pull request #3633 from MicrosoftDocs/trouble-mode
Troubleshooting mode -- reference Mac version too
2 parents b4bda09 + 92170d5 commit 7631c5a

File tree

1 file changed

+49
-65
lines changed

1 file changed

+49
-65
lines changed

defender-endpoint/enable-troubleshooting-mode.md

Lines changed: 49 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-ngp
1616
ms.topic: conceptual
1717
ms.subservice: ngp
18-
ms.date: 03/04/2025
18+
ms.date: 05/01/2025
1919
---
2020

2121
# Get started with troubleshooting mode in Microsoft Defender for Endpoint
@@ -26,88 +26,87 @@ ms.date: 03/04/2025
2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828

29-
Troubleshooting mode in Microsoft Defender for Endpoint enables admins to troubleshoot various Microsoft Defender Antivirus features, even if devices are managed by organizational policies. For example, if [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled, [certain settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) can't be modified or turned off, but you can use troubleshooting mode on a device to edit those settings temporarily.
29+
Troubleshooting mode in Microsoft Defender for Endpoint enables administrators to troubleshoot various Microsoft Defender Antivirus features, even if devices are managed by organizational policies. For example, if [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled, [certain settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) can't be modified or turned off, but you can use troubleshooting mode on a device to edit those settings temporarily.
3030

31-
Troubleshooting mode is disabled by default, and requires you to turn it on for a device (and/or group of devices) for a limited time. Troubleshooting mode is exclusively an enterprise-only feature, and requires Microsoft Defender portal access.
31+
Troubleshooting mode is disabled by default, and requires you to turn it on for a device (and/or group of devices) for a limited time. Troubleshooting mode is exclusively an enterprise-only feature, and requires [Microsoft Defender portal](https://security.microsoft.com) access.
32+
33+
This article describes troubleshooting mode for Windows devices. For information about troubleshooting mode on Mac, see [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md).
3234

3335
> [!TIP]
3436
> - During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` on Windows devices.
3537
> - To check the state of [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md), you can use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) PowerShell cmdlet. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
36-
.
37-
## What do you need to know before you begin?
38-
39-
During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` or, on client operating systems, the Security Center app to temporarily disable tamper protection on your device and make your necessary configuration changes.
40-
41-
- Use troubleshooting mode to disable/change the tamper protection setting to perform:
38+
> - For Mac devices, see [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md).
4239
43-
- Microsoft Defender Antivirus functional troubleshooting /application compatibility (false positive application blocks).
44-
45-
- Local admins, with appropriate permissions, can change configurations on individual endpoints that are usually locked by policy. Having a device in troubleshooting mode can be helpful when diagnosing Microsoft Defender Antivirus performance and compatibility scenarios.
46-
47-
- Local admins can't turn off Microsoft Defender Antivirus, or uninstall it.
40+
## What do you need to know before you begin?
4841

49-
- Local admins can configure all other security settings in the Microsoft Defender Antivirus suite (for example, cloud protection, tamper protection).
42+
During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` or, on client operating systems, the Security Center app to temporarily disable tamper protection on your device and make your necessary configuration changes.
5043

51-
- Admins with "Manage Security settings" permissions have access to turn on troubleshooting mode.
44+
You can use troubleshooting mode to troubleshoot or check application compatibility with Microsoft Defender Antivirus, such as when false positives occur with application blocks.
5245

53-
- Microsoft Defender for Endpoint collects logs and investigation data throughout the troubleshooting process.
46+
With appropriate permissions, local administrators can change configuration on individual devices that are usually locked by policy. Having a device in troubleshooting mode can be helpful when diagnosing Microsoft Defender Antivirus performance and compatibility scenarios. Local administrators can't turn off Microsoft Defender Antivirus, or uninstall it. Local administrators can configure all other security settings in the Microsoft Defender Antivirus suite (for example, cloud protection, tamper protection).
5447

55-
- A snapshot of `MpPreference` is taken before troubleshooting mode begins.
48+
Administrators must have "Manage Security settings" permissions to turn on troubleshooting mode.
5649

57-
- A second snapshot is taken just before troubleshooting mode expires.
58-
59-
- Operational logs from during troubleshooting mode are also collected.
50+
Defender for Endpoint collects logs and investigation data throughout the troubleshooting process.
6051

61-
- Logs and snapshots are collected and are available for an admin to collect using the [Collect investigation package](respond-machine-alerts.md#collect-investigation-package-from-devices) feature on the device page. Microsoft doesn't remove this data from the device until an admin has collected it.
52+
- A snapshot of `MpPreference` is taken before troubleshooting mode begins.
53+
- A second snapshot is taken just before troubleshooting mode expires.
54+
- Operational logs from during troubleshooting mode are also collected.
55+
- Logs and snapshots are collected and are available for an administrator to collect using the [Collect investigation package](respond-machine-alerts.md#collect-investigation-package-from-devices) feature on the device page. Microsoft doesn't remove this data from the device until an administrator has collected it.
6256

63-
- Admins can also review the changes in settings that take place during troubleshooting mode in **Event Viewer** on the device itself.
64-
- Open Event Viewer, and then expand **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender**, and then select **Operational**.
65-
- Potential events can include events with IDs 5000, 5001, 5004, 5007 and others. See more details at [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.yml#event-id-5000).
57+
Administrators can also review the changes in settings that take place during troubleshooting mode in **Event Viewer** on the device itself.
6658

67-
- Troubleshooting mode automatically turns off after reaching the expiration time (it lasts for 4 hours). After expiration, all policy-managed configurations become read-only again and revert back to how the device was configured before enabling troubleshooting mode.
59+
- Open Event Viewer, and then expand **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender**, and then select **Operational**.
60+
- Potential events can include events with IDs 5000, 5001, 5004, 5007 and others. See more details at [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.yml#event-id-5000).
6861

69-
- It could take up to 15 minutes from the time the command is sent from Microsoft Defender XDR to when it becomes active on the device.
62+
Troubleshooting mode automatically turns off after reaching its expiration time (it lasts for 4 hours). When troubleshooting mode has expired, all policy-managed configurations become read-only again and revert to how the device was configured before enabling troubleshooting mode.
7063

71-
- Notifications are sent to the user when troubleshooting mode begins and when troubleshooting mode ends. A warning is also sent to indicate that troubleshooting mode is ending soon.
64+
It can take up to 15 minutes from the time the command is sent from Microsoft Defender XDR to when it becomes active on the device.
7265

73-
- The beginning and ending of troubleshooting mode is identified in the **Device Timeline** on the device page.
66+
Notifications are sent to the user when troubleshooting mode begins and when troubleshooting mode ends. A warning is also sent to indicate that troubleshooting mode is ending soon. The beginning and end of troubleshooting mode is also identified in the [Microsoft Defender portal](https://security.microsoft.com), in the **Device Timeline** on the device page.
7467

75-
- You can query all troubleshooting mode events in advanced hunting.
68+
You can query all troubleshooting mode events in advanced hunting.
7669

7770
> [!NOTE]
78-
> Policy management changes are applied to the device when it is actively in troubleshooting mode. However, the changes do not take effect until troubleshooting mode expires. Additionally, Microsoft Defender Antivirus Platform updates are not applied during Troubleshooting mode. Platform updates are applied when troubleshooting mode ends with a Windows update.
71+
> Policy management changes are applied to the device when it's actively in troubleshooting mode. However, the changes don't take effect until troubleshooting mode expires. Additionally, Microsoft Defender Antivirus Platform updates aren't applied during Troubleshooting mode. Platform updates are applied when troubleshooting mode ends with a Windows update.
7972
8073
## Prerequisites
8174

82-
- A device running Windows 10 (version 19044.1618 or later), Windows 11, Windows Server 2019, Windows Server 2022, or Windows Server 2025.
75+
- Devices must be running a supported operating system.
8376

84-
|Semester/Redstone|OS version|Release|
85-
|:---|:---|:---|
86-
| 21H2/SV1|>=22000.593|[KB5011563: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5019275) |
87-
| 20H1/20H2/21H1|>=19042.1620<br/> >=19041.1620<br/> >=19043.1620|[KB5011543: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011543) |
88-
| Windows Server 2022 or later|>=20348.617|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558) |
89-
| Windows Server 2019 (RS5)|>=17763.2746|[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551) |
77+
- Windows 10 (version 19044.1618 or later), Windows 11, Windows Server 2019, Windows Server 2022, or Windows Server 2025.
9078

91-
- Troubleshooting mode is also available for machines running the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. Before you use troubleshooting mode, make sure all of the following components are up to date:
79+
|Semester/Redstone|OS version|Release|
80+
|:---|:---|:---|
81+
| 21H2/SV1|`22000.593` or later|[KB5011563: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5019275) |
82+
| 20H1/20H2/21H1|`19042.1620` or later<br/> `19041.1620` or later<br/> `19043.1620` or later|[KB5011543: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011543) |
83+
| Windows Server 2022 or later|`20348.617` or later|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558) |
84+
| Windows Server 2019 (RS5)|`17763.2746` or later |[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551) |
9285

93-
- Sense version `10.8049.22439.1084` or later ([KB5005292: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292))
94-
- Microsoft Defender Antivirus - Platform: `4.18.2207.7` or later ([KB4052623: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623))
95-
- Microsoft Defender Antivirus - Engine: `1.1.19500.2` or later ([KB2267602: Microsoft Update Catalog](https://www.microsoft.com/en-us/wdsi/defenderupdates))
86+
- Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), with all of the following components up to date:
9687

97-
- For troubleshooting mode to be applied, Microsoft Defender for Endpoint must be tenant-enrolled and active on the device.
88+
| Component | Version | Release |
89+
|--|--|--|
90+
| Sense version | `10.8049.22439.1084` or later | [KB5005292: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292) |
91+
| Microsoft Defender Antivirus | Platform: `4.18.2207.7` or later | [KB4052623: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623) |
92+
| Microsoft Defender Antivirus | Engine: `1.1.19500.2` or later | [KB2267602: Microsoft Update Catalog](https://www.microsoft.com/en-us/wdsi/defenderupdates) |
9893

99-
- The device must be actively running Microsoft Defender Antivirus, version 4.18.2203 or later.
94+
- Defender for Endpoint must be tenant-enrolled and active on the device.
95+
96+
- Devices must be actively running Microsoft Defender Antivirus, version `4.18.2203 or later`.
97+
98+
- For macOS devices, see [Prerequisites for troubleshooting mode on Mac](mac-troubleshoot-mode.md#prerequisites).
10099

101100
## Enable troubleshooting mode
102101

103-
1. Go to the Microsoft Defender portal (<https://security.microsoft.com>), and sign in.
102+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com), and sign in.
104103

105104
2. Navigate to the device page/machine page for the device you would like to turn on troubleshooting mode. Select **Turn on troubleshooting mode**. You must have "Manage security settings in Security Center" [permissions](assign-portal-access.md) for Microsoft Defender for Endpoint.
106105

107106
:::image type="content" source="/defender/media/ts-mode-menu.png" alt-text="Turn on troubleshooting mode" lightbox="/defender/media/ts-mode-menu.png":::
108107

109-
> [!NOTE]
110-
> The **Turn on troubleshooting mode** option is available on all devices, even if the device does not meet the prerequisites for troubleshooting mode.
108+
> [!NOTE]
109+
> The **Turn on troubleshooting mode** option is available on all devices, even if the device doesn't meet the prerequisites for troubleshooting mode.
111110
112111
3. Confirm you want to turn on troubleshooting mode for the device.
113112

@@ -178,24 +177,9 @@ DeviceEvents
178177

179178
## Related articles
180179

181-
> [!TIP]
182-
> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
183-
>
184-
> - Top paths that impact scan time
185-
> - Top files that impact scan time
186-
> - Top processes that impact scan time
187-
> - Top file extensions that impact scan time
188-
> - Combinations – for example:
189-
> - top files per extension
190-
> - top paths per extension
191-
> - top processes per path
192-
> - top scans per file
193-
> - top scans per file per process
194-
>
195-
> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
196-
> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
197-
>
198-
180+
- [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md)
181+
- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
199182
- [Troubleshooting mode scenarios](troubleshooting-mode-scenarios.md)
200183
- [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)
184+
201185
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)