Skip to content

Commit eafd9c5

Browse files
committed
Update run-analyzer-windows.md
1 parent 575d296 commit eafd9c5

File tree

1 file changed

+21
-60
lines changed

1 file changed

+21
-60
lines changed

defender-endpoint/run-analyzer-windows.md

Lines changed: 21 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.subservice: ngp
1919
search.appverid: met150
20-
ms.date: 05/05/2024
20+
ms.date: 03/12/2025
2121
---
2222

2323
# Run the client analyzer on Windows
@@ -32,15 +32,14 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
3232

3333
## Option 2: Run MDE Client Analyzer locally
3434

35-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
35+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [MDE Client Analyzer tool (preview)](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate. The file is saved to your Downloads folder by default.
3636

37-
The file is saved to your Downloads folder by default.
38-
39-
2. Extract the contents of MDEClientAnalyzer.zip to an available folder.
37+
2. Extract the contents of `MDEClientAnalyzer.zip` to an available folder.
4038

4139
3. Open a command line with administrator permissions:
4240

4341
1. Go to **Start** and type **cmd**.
42+
4443
1. Right-click **Command prompt** and select **Run as administrator**.
4544

4645
4. Type the following command and then press **Enter**:
@@ -86,61 +85,23 @@ Example contents after MDEClientAnalyzer.ps1 is modified:
8685
> - The start state of the EDR sensor (Sense is stopped if machine is not yet onboarded).
8786
> - If an advanced troubleshooting parameter was used with the analyzer command.
8887
89-
By default, the unpacked MDEClientAnalyzerResult.zip file contains the following items.
90-
91-
- MDEClientAnalyzer.htm
92-
93-
This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce.
94-
95-
- SystemInfoLogs [Folder]
96-
97-
- AddRemovePrograms.csv
98-
99-
Description: List of x64 installed software on x64 OS collected from registry.
100-
101-
- AddRemoveProgramsWOW64.csv
102-
103-
Description: List of x86 installed software on x64 OS collected from registry.
104-
105-
- CertValidate.log
106-
107-
Description: Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil).
108-
109-
- dsregcmd.txt
110-
111-
Description: Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine.
112-
113-
- IFEO.txt
114-
115-
Description: Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine
116-
117-
- MDEClientAnalyzer.txt
118-
119-
Description: This is verbose text file showing with details of the analyzer script execution.
120-
121-
- MDEClientAnalyzer.xml
122-
123-
Description: XML format containing the analyzer script findings.
124-
125-
- RegOnboardedInfoCurrent.Json
126-
127-
Description: The onboarded machine information gathered in JSON format from the registry.
128-
129-
- RegOnboardingInfoPolicy.Json
130-
131-
Description: The onboarding policy configuration gathered in JSON format from the registry.
132-
133-
- SCHANNEL.txt
134-
135-
Description: Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry.
136-
137-
- SessionManager.txt
138-
139-
Description: Session Manager specific settings gather from registry.
140-
141-
- SSL_00010002.txt
142-
143-
Description: Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry.
88+
By default, the unpacked `MDEClientAnalyzerResult.zip` file contains the items listed in the following table:
89+
90+
| Folder | Item | Description |
91+
|--|--|--|
92+
| | `MDEClientAnalyzer.htm` | This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce. |
93+
| `SystemInfoLogs` | `AddRemovePrograms.csv` | List of x64 installed software on x64 OS collected from registry |
94+
| | `AddRemoveProgramsWOW64.csv` | List of x86 installed software on x64 OS collected from registry |
95+
| | `CertValidate.log` | Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil) |
96+
| | `dsregcmd.txt` | Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine. |
97+
| | `IFEO.txt` | Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine |
98+
| | `MDEClientAnalyzer.txt` | This is verbose text file showing with details of the analyzer script execution. |
99+
| | `MDEClientAnalyzer.xml` | XML format containing the analyzer script findings |
100+
| | `RegOnboardedInfoCurrent.Json` | The onboarded machine information gathered in JSON format from the registry |
101+
| | `RegOnboardingInfoPolicy.Json` | The onboarding policy configuration gathered in JSON format from the registry |
102+
| | `SCHANNEL.txt` | Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry |
103+
| | `SessionManager.txt` | Session Manager specific settings gather from registry |
104+
| | `SSL_00010002.txt` | Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry |
144105

145106
- EventLogs [Folder]
146107

0 commit comments

Comments
 (0)