@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic : troubleshooting
15
15
ms.subservice : edr
16
16
search.appverid : met150
17
- ms.date : 06/27 /2025
17
+ ms.date : 07/04 /2025
18
18
---
19
19
20
20
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -57,7 +57,7 @@ This article provides instructions on how to run the tool via Live Response on W
57
57
58
58
1 . While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
59
59
60
- ``` console
60
+ ``` console
61
61
Putfile MDEClientAnalyzerPreview.zip
62
62
Run MDELiveAnalyzer.ps1
63
63
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
@@ -114,7 +114,7 @@ The following script performs the first six steps of the [Running the Binary ver
114
114
115
115
echo " Getting XMDEClientAnalyzerBinary"
116
116
wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/? linkid=2297517
117
- echo ' c65a4e4c6851d130942bfacd147a9d18b8a92b4f50facf519477fd1c41a1c323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
117
+ echo ' C65A4E4C6851D130942BFACD147A9D18B8A92B4F50FACF519477FD1C41A1C323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118
118
119
119
echo " Unzipping XMDEClientAnalyzerBinary.zip"
120
120
unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
@@ -140,7 +140,7 @@ The following script performs the first six steps of the [Running the Python ver
140
140
141
141
echo " Getting XMDEClientAnalyzer.zip"
142
142
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
143
- echo ' 36C2B13AE657456119F3DC2A898FD9D354499A33F65015670CE2CD8A937F3C66 XMDEClientAnalyzer.zip' | sha256sum -c
143
+ echo ' 07E6A7B89E28A78309D5B6F1E25E4CDFBA9CA141450E422D76441C03AD3477E7 XMDEClientAnalyzer.zip' | sha256sum -c
144
144
145
145
echo " Unzipping XMDEClientAnalyzer.zip"
146
146
unzip -q XMDEClientAnalyzer.zip -d /tmp/XMDEClientAnalyzer
0 commit comments