You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/identity-inventory.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
36
36
37
37
- Apply filters.
38
38
39
-
- Search for an identity by name or full UPN, Sid and Object ID.
39
+
- Search for an identity by name or full UPN, SID and Object ID.
40
40
41
41
- Export the list to a CSV file.
42
42
43
43
- Copy list link with the included filters configured.
44
44
45
-
## 
45
+
> [!NOTE]
46
+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47
+
48
+
## 
46
49
47
50
### Identity details
48
51
@@ -120,7 +123,7 @@ You can use this information to help you prioritize devices for security posture
120
123
121
124
### Navigate to the Identity inventory page
122
125
123
-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126
+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
Copy file name to clipboardExpand all lines: defender-endpoint/data-collection-analyzer.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,19 +17,20 @@ ms.collection:
17
17
ms.topic: conceptual
18
18
ms.subservice: ngp
19
19
search.appverid: met150
20
-
ms.date: 03/26/2025
20
+
ms.date: 04/01/2025
21
21
---
22
22
23
23
# Data collection for advanced troubleshooting on Windows
24
24
25
25
**Applies to:**
26
26
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
-
29
28
- Microsoft Defender for Business
30
-
31
29
- Microsoft Defender Antivirus
32
30
31
+
> [!TIP]
32
+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
33
+
33
34
When collaborating with Microsoft support professionals, you might be asked to use the client analyzer to collect data for troubleshooting of more complex scenarios. The analyzer script supports other parameters for that purpose and can collect a specific log set based on the observed symptoms that need to be investigated.
34
35
35
36
Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their description:
@@ -48,7 +49,7 @@ Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their
48
49
|`-v`|Uses antivirus [MpCmdRun.exe command line argument](/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus) with most verbose -trace flags. |Anytime an advanced troubleshooting is needed. Such as when troubleshooting Cloud Protection (MAPS) reporting failures, Platform Update failures, Engine update failures, Security Intelligence Update failures, False negatives, etc. Can also be used with `-b`, `-c`, `-h`, or `-l`.|`MsMpEng.exe`|
49
50
|`-t`|Starts verbose trace of all client-side components relevant to Endpoint DLP, which is useful for scenarios where [DLP actions](/microsoft-365/compliance/endpoint-dlp-learn-about#endpoint-activities-you-can-monitor-and-take-action-on) aren't happening as expected for files. |When running into issues where the Microsoft Endpoint Data Loss Prevention (DLP) actions expected aren't occurring.|`MpDlpService.exe`|
50
51
|`-q`|Calls into DLPDiagnose.ps1 script from the analyzer `Tools` directory that validates the basic configuration and requirements for Endpoint DLP. |Checks the basic configuration and requirements for Microsoft Endpoint DLP|`MpDlpService.exe`|
51
-
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2 or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52
+
|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
52
53
|`-z`|Configures registry keys on the machine to prepare it for full machine memory dump collection via [CrashOnCtrlScroll](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard). This would be useful for analysis of computer freeze issues. \* Hold down the rightmost CTRL key, then press the SCROLL LOCK key twice. |Machine hanging or being unresponsive or slow. High memory usage (Memory leak): a) User mode: Private bytes b) Kernel mode: paged pool or nonpaged pool memory, handle leaks.|`MSSense.exe` or `MsMpEng.exe`|
53
54
|`-k`|Uses [NotMyFault](/sysinternals/downloads/notmyfault) tool to force the system to crash and generate a machine memory dump. This would be useful for analysis of various OS stability issues. |Same as above.|`MSSense.exe` or `MsMpEng.exe`|
54
55
@@ -65,14 +66,14 @@ The analyzer, and all of the scenario flags listed in this article, can be initi
65
66
66
67
When you use `RemoteMDEClientAnalyzer.cmd`, it calls into `psexec` to download the tool from the configured file share and then run it locally via `PsExec.exe`.
67
68
68
-
The CMD script uses the `-r` flag to specify that it is running remotely within SYSTEM context, and so no prompt is presented to the user.
69
+
The CMD script uses the `-r` flag to specify that it's running remotely within SYSTEM context, and so no prompt is presented to the user.
69
70
70
71
That same flag can be used with `MDEClientAnalyzer.cmd` to avoid a prompt to the user to specify the number of minutes for data collection. For example, consider `MDEClientAnalyzer.cmd -r -i -m 5`.
71
72
72
73
-`-r` indicates that tool is being run from remote (or non-interactive context).
73
74
-`-i` is the scenario flag for collection of network trace along with other related logs.
74
75
-`-m #` denotes the number of minutes to run (we used 5 minutes in our example).
75
76
76
-
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you will get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77
+
When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you'll get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
77
78
78
79
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-ngp
18
18
search.appverid: met150
19
-
ms.date: 03/04/2025
19
+
ms.date: 04/01/2025
20
20
---
21
21
22
22
# Detect and block potentially unwanted applications
@@ -106,6 +106,12 @@ You can enable PUA protection with Microsoft Defender for Endpoint Security Sett
106
106
107
107
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
108
108
109
+
| Operating systems |Potentially Unwanted Protection (PUA) by default is set to:|
110
+
| -------- | -------- |
111
+
|Windows 11, Windows 10, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016|Audit mode (2)|
112
+
|Windows 11, Windows 10 + Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Endpoint for Business|Block mode (1)|
113
+
|Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 with the unified Microsoft Defender for Endpoint client + Microsoft Defender for Servers Plan 1 or Microsoft Defender for Servers Plan 2 or Microsoft Defender for Endpoint for servers|Block mode (1) |
114
+
109
115
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
110
116
111
117
See the following articles:
@@ -156,7 +162,7 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
156
162
Set-MpPreference -PUAProtection Enabled
157
163
```
158
164
159
-
Setting the value for this cmdlet to `Enabled` turns on the feature if it is disabled.
165
+
Setting the value for this cmdlet to `Enabled` turns on the feature if it's disabled.
160
166
161
167
#### To set PUA protection to audit mode
162
168
@@ -186,8 +192,8 @@ get-mpPreference | ft PUAProtection
186
192
|Value | Description|
187
193
| -------- | -------- |
188
194
|`0`| PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
189
-
|`1`| PUA Protection on. Detected items are blocked. They will show in history along with other threats.|
190
-
|`2`| Audit mode. Microsoft Defender Antivirus will detect potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
195
+
|`1`| PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196
+
|`2`| Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
191
197
192
198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
Copy file name to clipboardExpand all lines: defender-endpoint/overview-client-analyzer.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.collection:
17
17
ms.topic: conceptual
18
18
ms.subservice: ngp
19
19
search.appverid: met150
20
-
ms.date: 03/12/2025
20
+
ms.date: 04/01/2025
21
21
---
22
22
23
23
# Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
@@ -26,7 +26,7 @@ ms.date: 03/12/2025
26
26
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
28
29
-
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you may want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
29
+
The [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/MDEClientAnalyzer) (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](onboard-configure.md) running either Windows, Linux, or macOS. For example, you might want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](fix-unhealthy-sensors.md) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
30
30
31
31
Besides obvious sensor health issues, MDECA can collect other traces, logs, and diagnostic information for troubleshooting complex scenarios such as:
32
32
@@ -39,15 +39,18 @@ Besides obvious sensor health issues, MDECA can collect other traces, logs, and
39
39
-[Run the client analyzer on Linux](run-analyzer-linux.md)
40
40
-[Run the client analyzer on macOS](run-analyzer-macos.md)
41
41
42
+
> [!TIP]
43
+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
44
+
42
45
## Privacy notice
43
46
44
-
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint.
47
+
- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you might be experiencing with Microsoft Defender for Endpoint.
45
48
46
-
- The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
49
+
- The collected data might contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
47
50
48
51
- Once data collection is complete, the tool saves the data locally on the machine within a subfolder and compressed zip file.
49
52
50
-
- No data is automatically sent to Microsoft. If you are using the tool during collaboration on a support issue, you may be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
53
+
- No data is automatically sent to Microsoft. If you're using the tool during collaboration on a support issue, you might be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.
51
54
52
55
For more information about Secure File Exchange, see [How to use Secure File Exchange to exchange files with Microsoft Support](/troubleshoot/azure/general/secure-file-exchange-transfer-files)
53
56
@@ -59,9 +62,9 @@ For more information about our privacy statement, see [Microsoft Privacy Stateme
59
62
60
63
- The analyzer can run on supported editions of [Windows](minimum-requirements.md#supported-windows-versions), [Linux](/defender-endpoint/mde-linux-prerequisites), or [macOS](microsoft-defender-endpoint-mac.md#system-requirements) either before of after onboarding to Microsoft Defender for Endpoint.
61
64
62
-
- For Windows devices, if you are running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
65
+
- For Windows devices, if you're running the analyzer directly on specific machines and not remotely via [Live Response](troubleshoot-collect-support-log.md), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.
63
66
64
67
> [!NOTE]
65
-
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allows the analyzer to run connectivity checks to cloud without being blocked.
68
+
> On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allow the analyzer to run connectivity checks to cloud without being blocked.
66
69
67
70
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-linux.md
+15-9Lines changed: 15 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
9
9
ms.subservice: linux
10
10
ms.localizationpriority: medium
11
11
ms.topic: troubleshooting-general
12
-
ms.date: 03/12/2025
12
+
ms.date: 04/01/2025
13
13
ms.custom: partner-contribution
14
14
ms.collection:
15
15
- m365-security
@@ -31,6 +31,8 @@ f1.keywords: NOCSH
31
31
32
32
If you have issues with Microsoft Defender for Endpoint on Linux and need support, you might be asked to provide the output from the Client Analyzer tool. This article explains how to use the tool on your device or with live response. You can use either a Python-based solution or a binary version that doesn't need Python.
33
33
34
+
> [!TIP]
35
+
> Watch this video to get an overview of the client analyzer: [Defender for Endpoint client analyzer overview](https://www.youtube.com/watch?v=GnqDsvYYL6w)
34
36
35
37
## Running the binary version of the client analyzer
36
38
@@ -126,6 +128,9 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
126
128
sudo ./mde_support_tool.sh -d
127
129
```
128
130
131
+
> [!TIP]
132
+
> Watch this video to learn more about onboarding issues: [Defender for Endpoint client analyzer onboarding issues](https://www.youtube.com/watch?v=HdhePgMBqs8)
133
+
129
134
## Command line options
130
135
Below are the command line options provided by client analyzer
131
136
@@ -370,15 +375,15 @@ A single report `installation_report.json` is generated. The keys in the file ar
370
375
371
376
| Key | Remarks |
372
377
| ------------- | ------------- |
373
-
| agent_version | Version of Defender for Endpoint installed |
378
+
| agent_version | Version of Defender for Endpoint installed. |
374
379
| onboarding_status | The onboarding and ring info |
375
-
| support_status | MDE is supported with the current system configurations |
376
-
| distro | The distro on which the agent is installed in supported or not |
377
-
| connectivitytest | The connectivity test stratus|
378
-
| min_requirement | The minimum requirements for CPU and Memory are met|
379
-
| external_depedency | The external dependencies are satisfied or not |
380
+
| support_status | MDE is supported with the current system configurations. |
381
+
| distro | The distro on which the agent is installed in supported or not. |
382
+
| connectivitytest | The connectivity tests status.|
383
+
| min_requirement | The minimum requirements for CPU and Memory are met.|
384
+
| external_depedency | The external dependencies are satisfied or not. |
380
385
| mde_health | Health status of MDE Agent|
381
-
| folder_perm | The required folder permissions are met or not |
386
+
| folder_perm | The required folder permissions are met or not. |
382
387
383
388
#### Exclude mode
384
389
@@ -525,7 +530,8 @@ The following script performs the first six steps of the [Running the Python ver
525
530
./mde_support_tool.sh
526
531
527
532
```
528
-
533
+
> [!TIP]
534
+
> Watch this video to learn more about endpoint settings: [Defender for Endpoint client analyzer endpoint settings](https://www.youtube.com/watch?v=Frw2xFjzphE)
529
535
#### Run the client analyzer install scripts
530
536
531
537
1. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you want to investigate.
0 commit comments