Skip to content

Commit a049ca0

Browse files
authored
Merge pull request #3335 from MicrosoftDocs/main
Published main to live, Tuesday 5:00 PM IST, 04/01
2 parents d507723 + 53839c9 commit a049ca0

11 files changed

+96
-48
lines changed

ATPDocs/identity-inventory.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, Sid and Object ID.
39+
- Search for an identity by name or full UPN, SID and Object ID.
4040

4141
- Export the list to a CSV file.
4242

4343
- Copy list link with the included filters configured.
4444

45-
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
45+
> [!NOTE]
46+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47+
48+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
4649

4750
### Identity details
4851

@@ -120,7 +123,7 @@ You can use this information to help you prioritize devices for security posture
120123

121124
### Navigate to the Identity inventory page
122125

123-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
124127

125128
### Related Articles
126129

defender-endpoint/data-collection-analyzer.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,19 +17,20 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 03/26/2025
20+
ms.date: 04/01/2025
2121
---
2222

2323
# Data collection for advanced troubleshooting on Windows
2424

2525
**Applies to:**
2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28-
2928
- Microsoft Defender for Business
30-
3129
- Microsoft Defender Antivirus
3230

31+
> [!TIP]
32+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
33+
3334
When collaborating with Microsoft support professionals, you might be asked to use the client analyzer to collect data for troubleshooting of more complex scenarios. The analyzer script supports other parameters for that purpose and can collect a specific log set based on the observed symptoms that need to be investigated.
3435

3536
Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their description:
@@ -48,7 +49,7 @@ Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their
4849
|`-v`|Uses antivirus [MpCmdRun.exe command line argument](/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus) with most verbose -trace flags. |Anytime an advanced troubleshooting is needed. Such as when troubleshooting Cloud Protection (MAPS) reporting failures, Platform Update failures, Engine update failures, Security Intelligence Update failures, False negatives, etc. Can also be used with `-b`, `-c`, `-h`, or `-l`.|`MsMpEng.exe` |
4950
|`-t` |Starts verbose trace of all client-side components relevant to Endpoint DLP, which is useful for scenarios where [DLP actions](/microsoft-365/compliance/endpoint-dlp-learn-about#endpoint-activities-you-can-monitor-and-take-action-on) aren't happening as expected for files. |When running into issues where the Microsoft Endpoint Data Loss Prevention (DLP) actions expected aren't occurring.|`MpDlpService.exe` |
5051
|`-q`|Calls into DLPDiagnose.ps1 script from the analyzer `Tools` directory that validates the basic configuration and requirements for Endpoint DLP. |Checks the basic configuration and requirements for Microsoft Endpoint DLP|`MpDlpService.exe`|
51-
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2 or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52+
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
5253
|`-z` |Configures registry keys on the machine to prepare it for full machine memory dump collection via [CrashOnCtrlScroll](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard). This would be useful for analysis of computer freeze issues. \* Hold down the rightmost CTRL key, then press the SCROLL LOCK key twice. |Machine hanging or being unresponsive or slow. High memory usage (Memory leak): a) User mode: Private bytes b) Kernel mode: paged pool or nonpaged pool memory, handle leaks.|`MSSense.exe` or `MsMpEng.exe` |
5354
|`-k` |Uses [NotMyFault](/sysinternals/downloads/notmyfault) tool to force the system to crash and generate a machine memory dump. This would be useful for analysis of various OS stability issues. |Same as above.|`MSSense.exe` or `MsMpEng.exe` |
5455

@@ -65,14 +66,14 @@ The analyzer, and all of the scenario flags listed in this article, can be initi
6566

6667
When you use `RemoteMDEClientAnalyzer.cmd`, it calls into `psexec` to download the tool from the configured file share and then run it locally via `PsExec.exe`.
6768

68-
The CMD script uses the `-r` flag to specify that it is running remotely within SYSTEM context, and so no prompt is presented to the user.
69+
The CMD script uses the `-r` flag to specify that it's running remotely within SYSTEM context, and so no prompt is presented to the user.
6970

7071
That same flag can be used with `MDEClientAnalyzer.cmd` to avoid a prompt to the user to specify the number of minutes for data collection. For example, consider `MDEClientAnalyzer.cmd -r -i -m 5`.
7172

7273
- `-r` indicates that tool is being run from remote (or non-interactive context).
7374
- `-i` is the scenario flag for collection of network trace along with other related logs.
7475
- `-m #` denotes the number of minutes to run (we used 5 minutes in our example).
7576

76-
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you will get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77+
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you'll get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
7778

7879
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 03/04/2025
19+
ms.date: 04/01/2025
2020
---
2121

2222
# Detect and block potentially unwanted applications
@@ -106,6 +106,12 @@ You can enable PUA protection with Microsoft Defender for Endpoint Security Sett
106106

107107
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
108108

109+
| Operating systems |Potentially Unwanted Protection (PUA) by default is set to:|
110+
| -------- | -------- |
111+
|Windows 11, Windows 10, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016|Audit mode (2)|
112+
|Windows 11, Windows 10 + Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Endpoint for Business|Block mode (1)|
113+
|Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 with the unified Microsoft Defender for Endpoint client + Microsoft Defender for Servers Plan 1 or Microsoft Defender for Servers Plan 2 or Microsoft Defender for Endpoint for servers|Block mode (1) |
114+
109115
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
110116

111117
See the following articles:
@@ -156,7 +162,7 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
156162
Set-MpPreference -PUAProtection Enabled
157163
```
158164

159-
Setting the value for this cmdlet to `Enabled` turns on the feature if it is disabled.
165+
Setting the value for this cmdlet to `Enabled` turns on the feature if it's disabled.
160166

161167
#### To set PUA protection to audit mode
162168

@@ -186,8 +192,8 @@ get-mpPreference | ft PUAProtection
186192
|Value | Description|
187193
| -------- | -------- |
188194
| `0` | PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
189-
| `1` | PUA Protection on. Detected items are blocked. They will show in history along with other threats.|
190-
| `2` | Audit mode. Microsoft Defender Antivirus will detect potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
195+
| `1` | PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196+
| `2` | Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
191197

192198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
193199

defender-endpoint/overview-client-analyzer.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 03/12/2025
20+
ms.date: 04/01/2025
2121
---
2222

2323
# Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
@@ -26,7 +26,7 @@ ms.date: 03/12/2025
2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828

29-
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you may want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
29+
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you might want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
3030

3131
Besides obvious sensor health issues, MDECA can collect other traces, logs, and diagnostic information for troubleshooting complex scenarios such as:
3232

@@ -39,15 +39,18 @@ Besides obvious sensor health issues, MDECA can collect other traces, logs, and
3939
- [Run the client analyzer on Linux](run-analyzer-linux.md)
4040
- [Run the client analyzer on macOS](run-analyzer-macos.md)
4141

42+
> [!TIP]
43+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
44+
4245
## Privacy notice
4346

44-
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint.
47+
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you might be experiencing with Microsoft Defender for Endpoint.
4548

46-
- The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
49+
- The collected data might contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
4750

4851
- Once data collection is complete, the tool saves the data locally on the machine within a subfolder and compressed zip file.
4952

50-
- No data is automatically sent to Microsoft. If you are using the tool during collaboration on a support issue, you may be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
53+
- No data is automatically sent to Microsoft. If you're using the tool during collaboration on a support issue, you might be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
5154

5255
For more information about Secure File Exchange, see [How to use Secure File Exchange to exchange files with Microsoft Support](/troubleshoot/azure/general/secure-file-exchange-transfer-files)
5356

@@ -59,9 +62,9 @@ For more information about our privacy statement, see [Microsoft Privacy Stateme
5962

6063
- The analyzer can run on supported editions of [Windows](minimum-requirements.md#supported-windows-versions), [Linux](/defender-endpoint/mde-linux-prerequisites), or [macOS](microsoft-defender-endpoint-mac.md#system-requirements) either before of after onboarding to Microsoft Defender for Endpoint.
6164

62-
- For Windows devices, if you are running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
65+
- For Windows devices, if you're running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
6366

6467
> [!NOTE]
65-
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allows the analyzer to run connectivity checks to cloud without being blocked.
68+
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allow the analyzer to run connectivity checks to cloud without being blocked.
6669
6770
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/run-analyzer-linux.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 03/12/2025
12+
ms.date: 04/01/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -31,6 +31,8 @@ f1.keywords: NOCSH
3131
3232
If you have issues with Microsoft Defender for Endpoint on Linux and need support, you might be asked to provide the output from the Client Analyzer tool. This article explains how to use the tool on your device or with live response. You can use either a Python-based solution or a binary version that doesn't need Python.
3333

34+
> [!TIP]
35+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
3436
3537
## Running the binary version of the client analyzer
3638

@@ -126,6 +128,9 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
126128
sudo ./mde_support_tool.sh -d
127129
```
128130
131+
> [!TIP]
132+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
133+
129134
## Command line options
130135
Below are the command line options provided by client analyzer
131136
@@ -370,15 +375,15 @@ A single report `installation_report.json` is generated. The keys in the file ar
370375
371376
| Key | Remarks |
372377
| ------------- | ------------- |
373-
| agent_version | Version of Defender for Endpoint installed |
378+
| agent_version | Version of Defender for Endpoint installed. |
374379
| onboarding_status | The onboarding and ring info |
375-
| support_status | MDE is supported with the current system configurations |
376-
| distro | The distro on which the agent is installed in supported or not |
377-
| connectivitytest | The connectivity test stratus|
378-
| min_requirement | The minimum requirements for CPU and Memory are met|
379-
| external_depedency | The external dependencies are satisfied or not |
380+
| support_status | MDE is supported with the current system configurations. |
381+
| distro | The distro on which the agent is installed in supported or not. |
382+
| connectivitytest | The connectivity tests status.|
383+
| min_requirement | The minimum requirements for CPU and Memory are met.|
384+
| external_depedency | The external dependencies are satisfied or not. |
380385
| mde_health | Health status of MDE Agent|
381-
| folder_perm | The required folder permissions are met or not |
386+
| folder_perm | The required folder permissions are met or not. |
382387
383388
#### Exclude mode
384389
@@ -525,7 +530,8 @@ The following script performs the first six steps of the [Running the Python ver
525530
./mde_support_tool.sh
526531
527532
```
528-
533+
> [!TIP]
534+
> Watch this video to learn more about endpoint settings: [Defender for Endpoint client analyzer endpoint settings](https://www.youtube.com/watch?v=Frw2xFjzphE)
529535
#### Run the client analyzer install scripts
530536
531537
1. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you want to investigate.

0 commit comments

Comments
 (0)