Skip to content

Commit 7c26338

Browse files
authored
Merge branch 'main' into poliveria-entraid-10072025
2 parents 4364af5 + 935c00c commit 7c26338

File tree

9 files changed

+70
-9
lines changed

9 files changed

+70
-9
lines changed

defender-endpoint/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
- name: Microsoft Defender for Endpoint
1+
- name: Microsoft Defender for Endpoint
22
href: index.yml
33
expanded: true
44
items:
@@ -512,6 +512,8 @@
512512
href: run-analyzer-linux.md
513513
- name: Run the client analyzer on macOS
514514
href: run-analyzer-macos.md
515+
- name: Diagnose issues with Client Analyzer
516+
href: use-client-analyzer.md
515517
- name: Data collection for advanced troubleshooting on Windows
516518
href: data-collection-analyzer.md
517519
- name: Understand the analyzer HTML report

defender-endpoint/linux-install-manually.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -490,7 +490,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
490490

491491
1. Look at the alert details, machine timeline, and perform your typical investigation steps.
492492

493-
## Defender for Endpoint package external package dependencies
493+
## External package dependencies
494494

495495
For information, see [Prerequisites for Microsoft Defender for Endpoint on Linux: External package dependency](./mde-linux-prerequisites.md#external-package-dependency).
496496

defender-endpoint/respond-file-alerts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -310,14 +310,14 @@ You can also submit a sample through the [Microsoft Defender portal](https://www
310310
- **Devices list** - select the file links from the **Description** or **Details** in the **Device in organization** section
311311
- **Search box** - select **File** from the drop-down menu and enter the file name
312312

313-
2. In the **Deep analysis** tab of the file view, select **Submit**.
313+
1. In the **Deep analysis** tab of the file view, select **Submit**.
314314

315-
:::image type="content" source="media/submit-file.png" alt-text="The submit PE files button" lightbox="media/submit-file.png":::
315+
:::image type="content" source="media/submit-file.png" alt-text="The submit PE files button" lightbox="media/submit-file.png":::
316316

317317
> [!NOTE]
318-
> Only PE files are supported, including _.exe_ and _.dll_ files.
319-
320-
A progress bar is displayed and provides information on the different stages of the analysis. You can then view the report when the analysis is done.
318+
> Only PE files are supported, including _.exe_ and _.dll_ files. Additionally, Windows App Store Executables are unsupported.
319+
320+
A progress bar is displayed and provides information on the different stages of the analysis. You can then view the report when the analysis is done.
321321

322322
> [!NOTE]
323323
> Depending on device availability, sample collection time can vary. There is a 3-hour timeout for sample collection. The collection will fail and the operation will abort if there is no online Windows 10 device (or Windows 11 or Windows Server 2012 R2+) reporting at that time. You can re-submit files for deep analysis to get fresh data on the file.
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Diagnose Defender for Endpoint issues with Client Analyzer
3+
ms.topic: conceptual
4+
description: Understand how to Diagnose Defender for Endpoint issues with Client Analyzer so that you can send the right data to Microsoft support for troubleshooting.
5+
ms.service: defender-endpoint
6+
author: KesemSharabi
7+
ms.author: kesharab
8+
audience: ITPro
9+
ms.collection:
10+
- m365-security
11+
- tier1
12+
- mde-ngp
13+
ms.subservice: ngp
14+
search.appverid: met150
15+
ms.date: 10/28/2025
16+
---
17+
18+
# Diagnose issues with Client Analyzer
19+
20+
When you troubleshoot Microsoft Defender for Endpoint, collecting diagnostic data is crucial for problem resolution. Different issues such as performance, connectivity and detection-related concerns, require different telemetry. As a security expert investigating these issues, you can use the [Client Analyzer](overview-client-analyzer.md) tool to gather data about your organization's Defender for Endpoint issues. With this data, you can troubleshoot your organization's Defender for Endpoint issues, and if needed [work with Microsoft support](contact-support.md) to resolve them
21+
22+
This article lists different types of issues and how to collect data for them using the Client Analyzer tool. The tool's flags are listed in [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md).
23+
24+
## Categorize your issue
25+
26+
Use the categories listed in the table to identify the type of issue you're experiencing. [Run the Client Analyzer tool](#run-the-client-analyzer-tool) with the appropriate flags when collecting data.
27+
28+
|Issue |Description and examples |Flags |
29+
|---------|---------|---------|
30+
|Issues that can't be reproduced |Issues that occur sporadically or are triggered by automated processes and can't be reproduced. This includes problems related to scheduled tasks such as automatic updates and scans, and Attack Surface Reduction (ASR) rules triggered unpredictably. | Run without flags |
31+
|Performance issues that can be reproduced |Includes high CPU usage, memory consumption problems, and slow response times. |`-a` and `-v` |
32+
|General |On-demand scans, manual updates, sense portal and alert issues, Attack Surface Reduction (ASR) issues that can be triggered on command, and app compatibility problems. |`-e` and `-v` |
33+
|Hanging systems |Unresponsive systems and freezes. Require advanced debugging techniques including memory dumps and crash analysis. |`-z` |
34+
|Compatibility |Issues with third-party applications, other security solutions, system software, performance problems, and functional issues. |`-c`, `-e` and `-v` |
35+
|Controlled Folder Access (CFA) |Include blocked applications, unexpected access permissions, and issues related to protected folders configuration. |Reproducible: `-cfa`, `-e` and `-v`</br>Nonreproducible: `-cfa` |
36+
|Data Loss Prevention (DLP) |Include policy enforcement problems, content detection false positives and negatives, and DLP client health and connectivity issues. |Reproducible: `-e`, `-t` and `-v`</br>Nonreproducible: `-t` |
37+
|Indicator |Include problems with URLs, domains, IP addresses, files, and certificates that aren't enforced as expected. |URL, IP, domain in first-party browser: `-a`, `-i` and `-v`</br>File indicator: `-v` |
38+
|Web Content Filtering (WCF) |Unenforced WCF policy when accessing web content using first and third party browsers. |`-a`, `-i` and `-v` |
39+
|Network protection |Network protection doesn't trigger configured policies when URLs, domains, and IPs are accessed through third-party browsers. |`-i` and `-v` |
40+
41+
## Run the Client Analyzer tool
42+
43+
Follow the steps in this section to collect data for the issues you've identified. Use the appropriate flags when needed. If you have scenarios that involve both working and nonworking conditions, collect separate log packages for each scenario and clearly label each collection. The comparison helps identify the differences that cause the performance issue.
44+
45+
1. Start log collection running:
46+
47+
```powershell
48+
49+
MDEClientAnalyzer.cmd
50+
51+
```
52+
53+
If you used a flag that includes a timespan, such as `-a`, `-e`, or `-v`, you're asked to specify the duration of the log collection.
54+
55+
2. Once the log collection starts, reproduce the issue so that the issue's data is captured while the logs are being collected.
56+
57+
3. To stop the log collection press Press `q`.

defender-xdr/create-custom-rbac-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ To access and manage roles and permissions, without being a Global Administrator
145145

146146
## Configure scoped roles for Microsoft Defender for Identity
147147

148-
Scoped access for Microsoft Defender for Identity (MDI) is currently in **Public preview**. You can configure scoped access using Microsoft Defender XDR’s Unified RBAC (URBAC) model. This allows you to restrict access and visibility to specific Active Directory domains, helping align with team responsibilities and reduce unnecessary data exposure.
148+
You can configure scoped access using Microsoft Defender XDR’s Unified RBAC (URBAC) model for identities managed by Microsoft Defender for Identity (MDI). This allows you to restrict access and visibility to specific Active Directory domains or Organizational units, helping align with team responsibilities and reduce unnecessary data exposure.
149149

150150
For more information, see: [Configure scoped access for Microsoft Defender for Identity](/defender-for-identity/configure-scoped-access).
151151

defender-xdr/threat-analytics.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,9 +109,11 @@ Categories are presented at the top of the threat analytics page. Counters show
109109

110110
To add report filter types in your dashboard, select **Filters**, choose from the list, and select **Add**.
111111

112+
:::image type="content" source="/defender/media/threat-analytics/ta-taglist-mtp.png" alt-text="Screenshot of the threat analytics Add filters option." lightbox="/defender/media/threat-analytics/ta-taglist-mtp.png":::
113+
112114
To set the types of reports you want in the list based on the available filters, select a filter type (for example, **Threat tags**), choose from the list, and select **Apply**.
113115

114-
:::image type="content" source="/defender/media/threat-analytics/ta-threattag-filters-mtp.png" alt-text="Screenshot of the Filters list." lightbox="/defender/media/threat-analytics/ta-threattag-filters-mtp.png":::
116+
:::image type="content" source="/defender/media/threat-analytics/ta-threattag-filters-mtp.png" alt-text="Screenshot of the Filters list in Threat tags." lightbox="/defender/media/threat-analytics/ta-threattag-filters-mtp.png":::
115117

116118
## View a threat analytics report
117119

-19.5 KB
Loading
-4.49 KB
Loading
126 KB
Loading

0 commit comments

Comments
 (0)