Skip to content

Commit d46cb43

Browse files
authored
Merge pull request #3116 from MicrosoftDocs/MDEClientAnalyzerPreview
Mde client analyzer preview
2 parents e1db61e + 0875500 commit d46cb43

File tree

5 files changed

+40
-104
lines changed

5 files changed

+40
-104
lines changed

defender-endpoint/configure-device-connectivity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 02/04/2025
17+
ms.date: 03/12/2025
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -170,11 +170,11 @@ The following preonboarding checks can be run on both Windows and Xplat MDE Clie
170170

171171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
172172

173-
- Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within MDEClientAnalyzer folder. The command uses parameters from onboarding package to test connectivity.
173+
- Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within the MDEClientAnalyzer folder. The command uses parameters from onboarding package to test connectivity.
174174

175175
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
176176

177-
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/MDEClientAnalyzerPreview
177+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: [MDEClientAnalyzerPreview.zip]{https://aka.ms/MDEClientAnalyzerPreview}.
178178

179179

180180
> [!NOTE]

defender-endpoint/download-client-analyzer.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.topic: conceptual
1717
ms.subservice: ngp
1818
search.appverid: met150
19-
ms.date: 02/21/2024
19+
ms.date: 03/12/2025
2020
---
2121

2222
# Download the Microsoft Defender for Endpoint client analyzer
@@ -29,13 +29,12 @@ Learn how to download the Microsoft Defender for Endpoint client analyzer on sup
2929

3030
## Download client analyzer for Windows OS
3131

32-
1. The latest stable edition is available for download from following URL: <https://aka.ms/MDEAnalyzer>
33-
2. The latest preview edition is available for download from following URL: <https://aka.ms/MDEClientAnalyzerPreview>
32+
- The latest *stable* edition is available for download at [https://aka.ms/MDEAnalyzer](https://aka.ms/MDEAnalyzer).
33+
- The latest *preview* edition is available for download at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
3434

3535
## Download client analyzer for macOS or Linux
3636

37-
1. The latest stable edition will be integrated into the Microsoft Defender for Endpoint agent. Ensure that you are running the latest edition for either [macOS](mac-whatsnew.md) or [Linux](linux-whatsnew.md).
38-
39-
2. The latest preview edition is available for direct download from following URL: <https://aka.ms/XMDEClientAnalyzer>
37+
- The latest stable edition is integrated into the Microsoft Defender for Endpoint agent. Ensure that you are running the latest edition for either [macOS](mac-whatsnew.md) or [Linux](linux-whatsnew.md).
38+
- The latest *preview* edition is available for download at [https://aka.ms/XMDEClientAnalyzer](https://aka.ms/XMDEClientAnalyzer).
4039

4140
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/run-analyzer-windows.md

Lines changed: 28 additions & 92 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 05/05/2024
20+
ms.date: 03/12/2025
2121
---
2222

2323
# Run the client analyzer on Windows
@@ -32,15 +32,14 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
3232

3333
## Option 2: Run MDE Client Analyzer locally
3434

35-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
35+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [MDE Client Analyzer tool (preview)](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate. The file is saved to your Downloads folder by default.
3636

37-
The file is saved to your Downloads folder by default.
38-
39-
2. Extract the contents of MDEClientAnalyzer.zip to an available folder.
37+
2. Extract the contents of `MDEClientAnalyzer.zip` to an available folder.
4038

4139
3. Open a command line with administrator permissions:
4240

4341
1. Go to **Start** and type **cmd**.
42+
4443
1. Right-click **Command prompt** and select **Run as administrator**.
4544

4645
4. Type the following command and then press **Enter**:
@@ -86,93 +85,30 @@ Example contents after MDEClientAnalyzer.ps1 is modified:
8685
> - The start state of the EDR sensor (Sense is stopped if machine is not yet onboarded).
8786
> - If an advanced troubleshooting parameter was used with the analyzer command.
8887
89-
By default, the unpacked MDEClientAnalyzerResult.zip file contains the following items.
90-
91-
- MDEClientAnalyzer.htm
92-
93-
This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce.
94-
95-
- SystemInfoLogs [Folder]
96-
97-
- AddRemovePrograms.csv
98-
99-
Description: List of x64 installed software on x64 OS collected from registry.
100-
101-
- AddRemoveProgramsWOW64.csv
102-
103-
Description: List of x86 installed software on x64 OS collected from registry.
104-
105-
- CertValidate.log
106-
107-
Description: Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil).
108-
109-
- dsregcmd.txt
110-
111-
Description: Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine.
112-
113-
- IFEO.txt
114-
115-
Description: Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine
116-
117-
- MDEClientAnalyzer.txt
118-
119-
Description: This is verbose text file showing with details of the analyzer script execution.
120-
121-
- MDEClientAnalyzer.xml
122-
123-
Description: XML format containing the analyzer script findings.
124-
125-
- RegOnboardedInfoCurrent.Json
126-
127-
Description: The onboarded machine information gathered in JSON format from the registry.
128-
129-
- RegOnboardingInfoPolicy.Json
130-
131-
Description: The onboarding policy configuration gathered in JSON format from the registry.
132-
133-
- SCHANNEL.txt
134-
135-
Description: Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry.
136-
137-
- SessionManager.txt
138-
139-
Description: Session Manager specific settings gather from registry.
140-
141-
- SSL_00010002.txt
142-
143-
Description: Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry.
144-
145-
- EventLogs [Folder]
146-
147-
- utc.evtx
148-
149-
Description: Export of DiagTrack event log
150-
151-
- senseIR.evtx
152-
153-
Description: Export of the Automated Investigation event log
154-
155-
- sense.evtx
156-
157-
Description: Export of the Sensor main event log
158-
159-
- OperationsManager.evtx
160-
161-
Description: Export of the Microsoft Monitoring Agent event log
162-
163-
- MdeConfigMgrLogs [Folder]
164-
165-
- SecurityManagementConfiguration.json
166-
167-
Description: Configurations sent from MEM (Microsoft Endpoint Manager) for enforcement.
168-
169-
- policies.json
170-
171-
Description: Policies settings to be enforced on the device.
172-
173-
- report_xxx.json
174-
175-
Description: Corresponding enforcement results.
88+
By default, the unpacked `MDEClientAnalyzerResult.zip` file contains the items listed in the following table:
89+
90+
| Folder | Item | Description |
91+
|--|--|--|
92+
| | `MDEClientAnalyzer.htm` | This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce. |
93+
| `SystemInfoLogs` | `AddRemovePrograms.csv` | List of x64 installed software on x64 OS collected from registry |
94+
| `SystemInfoLogs` | `AddRemoveProgramsWOW64.csv` | List of x86 installed software on x64 OS collected from registry |
95+
| `SystemInfoLogs` | `CertValidate.log` | Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil) |
96+
| `SystemInfoLogs` | `dsregcmd.txt` | Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine. |
97+
| `SystemInfoLogs` | `IFEO.txt` | Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine |
98+
| `SystemInfoLogs` | `MDEClientAnalyzer.txt` | This is verbose text file showing with details of the analyzer script execution. |
99+
| `SystemInfoLogs` | `MDEClientAnalyzer.xml` | XML format containing the analyzer script findings |
100+
| `SystemInfoLogs` | `RegOnboardedInfoCurrent.Json` | The onboarded machine information gathered in JSON format from the registry |
101+
| `SystemInfoLogs` | `RegOnboardingInfoPolicy.Json` | The onboarding policy configuration gathered in JSON format from the registry |
102+
| `SystemInfoLogs` | `SCHANNEL.txt` | Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry |
103+
| `SystemInfoLogs` | `SessionManager.txt` | Session Manager specific settings gather from registry |
104+
| `SystemInfoLogs` | `SSL_00010002.txt` | Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry |
105+
| `EventLogs` | `utc.evtx` | Export of DiagTrack event log |
106+
| `EventLogs` | `senseIR.evtx` | Export of the Automated Investigation event log |
107+
| `EventLogs` | `sense.evtx` | Export of the Sensor main event log |
108+
| `EventLogs` | `OperationsManager.evtx` | Export of the Microsoft Monitoring Agent event log |
109+
| `MdeConfigMgrLogs` | `SecurityManagementConfiguration.json` | Configurations sent from MEM (Microsoft Endpoint Manager) for enforcement |
110+
| `MdeConfigMgrLogs` | `policies.json` | Policies settings to be enforced on the device |
111+
| `MdeConfigMgrLogs` | `report_xxx.json` | Corresponding enforcement results |
176112

177113

178114
## See also

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,9 +65,10 @@ This article provides instructions on how to run the tool via Live Response on W
6565

6666
[![Image of commands.](media/analyzer-commands.png)](media/analyzer-commands.png#lightbox)
6767

68+
6869
### Additional information
6970

70-
- The latest preview version of MDEClientAnalyzer can be downloaded here: <https://aka.ms/MDEClientAnalyzerPreview>.
71+
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
7172

7273
- For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or doesn't appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).
7374

defender-endpoint/troubleshoot-security-config-mgt.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The following table lists errors and directions on what to try/check in order to
6060

6161
|Error Code|Enrollment Status|Administrator Actions|
6262
|---|---|---|
63-
|`5-7`, `9`, `11-12`, `26-33`|General error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. This could be due to the device not meeting [prerequisites for Microsoft Defender for Endpoint management channel](/mem/intune/protect/mde-security-integration). Running the [Client Analyzer](https://aka.ms/MDEClientAnalyzerPreview) on the device can help identify the root cause of the issue. If this doesn't help, contact support.|
63+
|`5-7`, `9`, `11-12`, `26-33`|General error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. This could be due to the device not meeting [prerequisites for Microsoft Defender for Endpoint management channel](/mem/intune/protect/mde-security-integration). Running the [MDE Client Analyzer (preview)](https://aka.ms/MDEClientAnalyzerPreview) on the device can help identify the root cause of the issue. If this doesn't help, contact support.|
6464
| `8`, `44` | Microsoft Intune Configuration issue | The device was successfully onboarded to Microsoft Defender for Endpoint. However, Microsoft Intune hasn't been configured through the Admin Center to allow Microsoft Defender for Endpoint Security Configuration. Make sure the [Microsoft Intune tenant is configured and the feature is turned on](/mem/intune/protect/mde-security-integration#configure-your-tenant-to-support-microsoft-defender-for-endpoint-security-configuration-management).|
6565
|`13-14`,`20`,`24`,`25`|Connectivity issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow, which could be due to a connectivity issue. Verify that the [Microsoft Entra ID and Microsoft Intune endpoints](/mem/intune/protect/mde-security-integration#connectivity-requirements) are opened in your firewall.|
6666
|`10`,`42`|General Hybrid join failure|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow and the OS failed to perform hybrid join. Use [Troubleshoot Microsoft Entra hybrid joined devices](/azure/active-directory/devices/troubleshoot-hybrid-join-windows-current) for troubleshooting OS-level hybrid join failures.|
@@ -72,7 +72,7 @@ The following table lists errors and directions on what to try/check in order to
7272
|`40`|Clock sync issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. Verify that the clock is set correctly and is synced on the device where the error occurs.|
7373
|`43`|MDE and ConfigMgr|The device is managed using Configuration Manager and Microsoft Defender for Endpoint. Controlling policies through both channels may cause conflicts and undesired results. To avoid this, endpoint security policies should be isolated to a single control plane. |
7474
|`2`|Device is not enrolled and has never been enrolled|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is not enrolled to be managed by Defender for Endpoint. For more information, see [Configure Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration?pivots=mdssc-preview). |
75-
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn of the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [here](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
75+
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn of the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [Defender for Endpoint integration with Configuration Manager](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
7676

7777
## Related topic
7878

0 commit comments

Comments
 (0)