You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.reviewer: pahuijbr
15
15
search.appverid: MET150
16
16
audience: ITPro
17
-
ms.date: 02/04/2025
17
+
ms.date: 03/12/2025
18
18
---
19
19
20
20
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -170,11 +170,11 @@ The following preonboarding checks can be run on both Windows and Xplat MDE Clie
170
170
171
171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
172
172
173
-
- Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within MDEClientAnalyzer folder. The command uses parameters from onboarding package to test connectivity.
173
+
- Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within the MDEClientAnalyzer folder. The command uses parameters from onboarding package to test connectivity.
174
174
175
175
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
176
176
177
-
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/MDEClientAnalyzerPreview
177
+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: [MDEClientAnalyzerPreview.zip]{https://aka.ms/MDEClientAnalyzerPreview}.
Copy file name to clipboardExpand all lines: defender-endpoint/download-client-analyzer.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
ms.topic: conceptual
17
17
ms.subservice: ngp
18
18
search.appverid: met150
19
-
ms.date: 02/21/2024
19
+
ms.date: 03/12/2025
20
20
---
21
21
22
22
# Download the Microsoft Defender for Endpoint client analyzer
@@ -29,13 +29,12 @@ Learn how to download the Microsoft Defender for Endpoint client analyzer on sup
29
29
30
30
## Download client analyzer for Windows OS
31
31
32
-
1. The latest stable edition is available for download from following URL: <https://aka.ms/MDEAnalyzer>
33
-
2. The latest preview edition is available for download from following URL: <https://aka.ms/MDEClientAnalyzerPreview>
32
+
- The latest *stable* edition is available for download at [https://aka.ms/MDEAnalyzer](https://aka.ms/MDEAnalyzer).
33
+
- The latest *preview* edition is available for download at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
34
34
35
35
## Download client analyzer for macOS or Linux
36
36
37
-
1. The latest stable edition will be integrated into the Microsoft Defender for Endpoint agent. Ensure that you are running the latest edition for either [macOS](mac-whatsnew.md) or [Linux](linux-whatsnew.md).
38
-
39
-
2. The latest preview edition is available for direct download from following URL: <https://aka.ms/XMDEClientAnalyzer>
37
+
- The latest stable edition is integrated into the Microsoft Defender for Endpoint agent. Ensure that you are running the latest edition for either [macOS](mac-whatsnew.md) or [Linux](linux-whatsnew.md).
38
+
- The latest *preview* edition is available for download at [https://aka.ms/XMDEClientAnalyzer](https://aka.ms/XMDEClientAnalyzer).
40
39
41
40
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-windows.md
+28-92Lines changed: 28 additions & 92 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.collection:
17
17
ms.topic: conceptual
18
18
ms.subservice: ngp
19
19
search.appverid: met150
20
-
ms.date: 05/05/2024
20
+
ms.date: 03/12/2025
21
21
---
22
22
23
23
# Run the client analyzer on Windows
@@ -32,15 +32,14 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
32
32
33
33
## Option 2: Run MDE Client Analyzer locally
34
34
35
-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
35
+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [MDE Client Analyzer tool (preview)](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate. The file is saved to your Downloads folder by default.
36
36
37
-
The file is saved to your Downloads folder by default.
38
-
39
-
2. Extract the contents of MDEClientAnalyzer.zip to an available folder.
37
+
2. Extract the contents of `MDEClientAnalyzer.zip` to an available folder.
40
38
41
39
3. Open a command line with administrator permissions:
42
40
43
41
1. Go to **Start** and type **cmd**.
42
+
44
43
1. Right-click **Command prompt** and select **Run as administrator**.
45
44
46
45
4. Type the following command and then press **Enter**:
@@ -86,93 +85,30 @@ Example contents after MDEClientAnalyzer.ps1 is modified:
86
85
> - The start state of the EDR sensor (Sense is stopped if machine is not yet onboarded).
87
86
> - If an advanced troubleshooting parameter was used with the analyzer command.
88
87
89
-
By default, the unpacked MDEClientAnalyzerResult.zip file contains the following items.
90
-
91
-
- MDEClientAnalyzer.htm
92
-
93
-
This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce.
94
-
95
-
- SystemInfoLogs [Folder]
96
-
97
-
- AddRemovePrograms.csv
98
-
99
-
Description: List of x64 installed software on x64 OS collected from registry.
100
-
101
-
- AddRemoveProgramsWOW64.csv
102
-
103
-
Description: List of x86 installed software on x64 OS collected from registry.
104
-
105
-
- CertValidate.log
106
-
107
-
Description: Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil).
108
-
109
-
- dsregcmd.txt
110
-
111
-
Description: Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine.
112
-
113
-
- IFEO.txt
114
-
115
-
Description: Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine
116
-
117
-
- MDEClientAnalyzer.txt
118
-
119
-
Description: This is verbose text file showing with details of the analyzer script execution.
120
-
121
-
- MDEClientAnalyzer.xml
122
-
123
-
Description: XML format containing the analyzer script findings.
124
-
125
-
- RegOnboardedInfoCurrent.Json
126
-
127
-
Description: The onboarded machine information gathered in JSON format from the registry.
128
-
129
-
- RegOnboardingInfoPolicy.Json
130
-
131
-
Description: The onboarding policy configuration gathered in JSON format from the registry.
132
-
133
-
- SCHANNEL.txt
134
-
135
-
Description: Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry.
136
-
137
-
- SessionManager.txt
138
-
139
-
Description: Session Manager specific settings gather from registry.
140
-
141
-
- SSL_00010002.txt
142
-
143
-
Description: Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry.
144
-
145
-
- EventLogs [Folder]
146
-
147
-
- utc.evtx
148
-
149
-
Description: Export of DiagTrack event log
150
-
151
-
- senseIR.evtx
152
-
153
-
Description: Export of the Automated Investigation event log
154
-
155
-
- sense.evtx
156
-
157
-
Description: Export of the Sensor main event log
158
-
159
-
- OperationsManager.evtx
160
-
161
-
Description: Export of the Microsoft Monitoring Agent event log
162
-
163
-
- MdeConfigMgrLogs [Folder]
164
-
165
-
- SecurityManagementConfiguration.json
166
-
167
-
Description: Configurations sent from MEM (Microsoft Endpoint Manager) for enforcement.
168
-
169
-
- policies.json
170
-
171
-
Description: Policies settings to be enforced on the device.
172
-
173
-
- report_xxx.json
174
-
175
-
Description: Corresponding enforcement results.
88
+
By default, the unpacked `MDEClientAnalyzerResult.zip` file contains the items listed in the following table:
89
+
90
+
| Folder | Item | Description |
91
+
|--|--|--|
92
+
||`MDEClientAnalyzer.htm`| This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce. |
93
+
|`SystemInfoLogs`|`AddRemovePrograms.csv`| List of x64 installed software on x64 OS collected from registry |
94
+
|`SystemInfoLogs`|`AddRemoveProgramsWOW64.csv`| List of x86 installed software on x64 OS collected from registry |
95
+
|`SystemInfoLogs`|`CertValidate.log`| Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil)|
96
+
|`SystemInfoLogs`|`dsregcmd.txt`| Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine. |
97
+
|`SystemInfoLogs`|`IFEO.txt`| Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine |
98
+
|`SystemInfoLogs`|`MDEClientAnalyzer.txt`| This is verbose text file showing with details of the analyzer script execution. |
99
+
|`SystemInfoLogs`|`MDEClientAnalyzer.xml`| XML format containing the analyzer script findings |
100
+
|`SystemInfoLogs`|`RegOnboardedInfoCurrent.Json`| The onboarded machine information gathered in JSON format from the registry |
101
+
|`SystemInfoLogs`|`RegOnboardingInfoPolicy.Json`| The onboarding policy configuration gathered in JSON format from the registry |
102
+
|`SystemInfoLogs`|`SCHANNEL.txt`| Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry |
103
+
|`SystemInfoLogs`|`SessionManager.txt`| Session Manager specific settings gather from registry |
104
+
|`SystemInfoLogs`|`SSL_00010002.txt`| Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry |
105
+
|`EventLogs`|`utc.evtx`| Export of DiagTrack event log |
106
+
|`EventLogs`|`senseIR.evtx`| Export of the Automated Investigation event log |
107
+
|`EventLogs`|`sense.evtx`| Export of the Sensor main event log |
108
+
|`EventLogs`|`OperationsManager.evtx`| Export of the Microsoft Monitoring Agent event log |
109
+
|`MdeConfigMgrLogs`|`SecurityManagementConfiguration.json`| Configurations sent from MEM (Microsoft Endpoint Manager) for enforcement |
110
+
|`MdeConfigMgrLogs`|`policies.json`| Policies settings to be enforced on the device |
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-collect-support-log.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,9 +65,10 @@ This article provides instructions on how to run the tool via Live Response on W
65
65
66
66
[](media/analyzer-commands.png#lightbox)
67
67
68
+
68
69
### Additional information
69
70
70
-
- The latest preview version of MDEClientAnalyzer can be downloaded here: <https://aka.ms/MDEClientAnalyzerPreview>.
71
+
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
71
72
72
73
- For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or doesn't appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).
|`5-7`, `9`, `11-12`, `26-33`|General error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. This could be due to the device not meeting [prerequisites for Microsoft Defender for Endpoint management channel](/mem/intune/protect/mde-security-integration). Running the [Client Analyzer](https://aka.ms/MDEClientAnalyzerPreview) on the device can help identify the root cause of the issue. If this doesn't help, contact support.|
63
+
|`5-7`, `9`, `11-12`, `26-33`|General error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. This could be due to the device not meeting [prerequisites for Microsoft Defender for Endpoint management channel](/mem/intune/protect/mde-security-integration). Running the [MDE Client Analyzer (preview)](https://aka.ms/MDEClientAnalyzerPreview) on the device can help identify the root cause of the issue. If this doesn't help, contact support.|
64
64
|`8`, `44`| Microsoft Intune Configuration issue | The device was successfully onboarded to Microsoft Defender for Endpoint. However, Microsoft Intune hasn't been configured through the Admin Center to allow Microsoft Defender for Endpoint Security Configuration. Make sure the [Microsoft Intune tenant is configured and the feature is turned on](/mem/intune/protect/mde-security-integration#configure-your-tenant-to-support-microsoft-defender-for-endpoint-security-configuration-management).|
65
65
|`13-14`,`20`,`24`,`25`|Connectivity issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow, which could be due to a connectivity issue. Verify that the [Microsoft Entra ID and Microsoft Intune endpoints](/mem/intune/protect/mde-security-integration#connectivity-requirements) are opened in your firewall.|
66
66
|`10`,`42`|General Hybrid join failure|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow and the OS failed to perform hybrid join. Use [Troubleshoot Microsoft Entra hybrid joined devices](/azure/active-directory/devices/troubleshoot-hybrid-join-windows-current) for troubleshooting OS-level hybrid join failures.|
@@ -72,7 +72,7 @@ The following table lists errors and directions on what to try/check in order to
72
72
|`40`|Clock sync issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. Verify that the clock is set correctly and is synced on the device where the error occurs.|
73
73
|`43`|MDE and ConfigMgr|The device is managed using Configuration Manager and Microsoft Defender for Endpoint. Controlling policies through both channels may cause conflicts and undesired results. To avoid this, endpoint security policies should be isolated to a single control plane. |
74
74
|`2`|Device is not enrolled and has never been enrolled|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is not enrolled to be managed by Defender for Endpoint. For more information, see [Configure Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration?pivots=mdssc-preview). |
75
-
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn of the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [here](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
75
+
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn of the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [Defender for Endpoint integration with Configuration Manager](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
0 commit comments