@@ -14,7 +14,7 @@ ms.collection:
1414ms.topic : troubleshooting
1515ms.subservice : edr
1616search.appverid : met150
17- ms.date : 06/27 /2025
17+ ms.date : 07/04 /2025
1818---
1919
2020# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -57,7 +57,7 @@ This article provides instructions on how to run the tool via Live Response on W
5757
58581 . While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5959
60- ``` console
60+ ``` console
6161 Putfile MDEClientAnalyzerPreview.zip
6262 Run MDELiveAnalyzer.ps1
6363 GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
@@ -114,7 +114,7 @@ The following script performs the first six steps of the [Running the Binary ver
114114
115115 echo " Getting XMDEClientAnalyzerBinary"
116116 wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/? linkid=2297517
117- echo ' c65a4e4c6851d130942bfacd147a9d18b8a92b4f50facf519477fd1c41a1c323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
117+ echo ' C65A4E4C6851D130942BFACD147A9D18B8A92B4F50FACF519477FD1C41A1C323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118118
119119 echo " Unzipping XMDEClientAnalyzerBinary.zip"
120120 unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
@@ -140,7 +140,7 @@ The following script performs the first six steps of the [Running the Python ver
140140
141141 echo " Getting XMDEClientAnalyzer.zip"
142142 wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
143- echo ' 36C2B13AE657456119F3DC2A898FD9D354499A33F65015670CE2CD8A937F3C66 XMDEClientAnalyzer.zip' | sha256sum -c
143+ echo ' 07E6A7B89E28A78309D5B6F1E25E4CDFBA9CA141450E422D76441C03AD3477E7 XMDEClientAnalyzer.zip' | sha256sum -c
144144
145145 echo " Unzipping XMDEClientAnalyzer.zip"
146146 unzip -q XMDEClientAnalyzer.zip -d /tmp/XMDEClientAnalyzer
0 commit comments