Skip to content

Commit 9226f06

Browse files
authored
Merge pull request #4353 from Nuno23PT/docs-editor/troubleshoot-collect-support-l-1751036252
Update troubleshoot-collect-support-log.md
2 parents ca73fcf + 094c958 commit 9226f06

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 03/04/2025
17+
ms.date: 06/27/2025
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -55,17 +55,17 @@ This article provides instructions on how to run the tool via Live Response on W
5555

5656
Repeat this step for the `MDEClientAnalyzerPreview.zip` file.
5757

58-
6. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
58+
1. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5959

60-
```console
60+
```console
6161
Putfile MDEClientAnalyzerPreview.zip
6262
Run MDELiveAnalyzer.ps1
6363
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
6464
```
6565

6666
[![Image of commands.](media/analyzer-commands.png)](media/analyzer-commands.png#lightbox)
6767

68-
68+
6969
### Additional information
7070

7171
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
@@ -108,24 +108,24 @@ The following script performs the first six steps of the [Running the Binary ver
108108

109109
```bash
110110
#! /usr/bin/bash
111-
111+
112112
echo "Starting Client Analyzer Script. Running As:"
113113
whoami
114-
114+
115115
echo "Getting XMDEClientAnalyzerBinary"
116116
wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/?linkid=2297517
117-
echo '9D0552DBBD1693D2E2ED55F36147019CFECFDC009E76BAC4186CF03CD691B469 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118-
117+
echo 'c65a4e4c6851d130942bfacd147a9d18b8a92b4f50facf519477fd1c41a1c323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118+
119119
echo "Unzipping XMDEClientAnalyzerBinary.zip"
120120
unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
121-
121+
122122
echo "Unzipping SupportToolLinuxBinary.zip"
123-
unzip -q /tmp/XMDEClientAnalyzerBinary/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
124-
123+
unzip -q /tmp/XMDEClientAnalyzerBinary/XMDEClientAnalyzer/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
124+
125125
echo "MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
126-
126+
127127
```
128-
128+
129129
#### Python Client Analyzer Install Script
130130

131131
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](/defender-endpoint/overview-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.

0 commit comments

Comments
 (0)