You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-windows.md
+21-60Lines changed: 21 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.collection:
17
17
ms.topic: conceptual
18
18
ms.subservice: ngp
19
19
search.appverid: met150
20
-
ms.date: 05/05/2024
20
+
ms.date: 03/12/2025
21
21
---
22
22
23
23
# Run the client analyzer on Windows
@@ -32,15 +32,14 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
32
32
33
33
## Option 2: Run MDE Client Analyzer locally
34
34
35
-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
35
+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [MDE Client Analyzer tool (preview)](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate. The file is saved to your Downloads folder by default.
36
36
37
-
The file is saved to your Downloads folder by default.
38
-
39
-
2. Extract the contents of MDEClientAnalyzer.zip to an available folder.
37
+
2. Extract the contents of `MDEClientAnalyzer.zip` to an available folder.
40
38
41
39
3. Open a command line with administrator permissions:
42
40
43
41
1. Go to **Start** and type **cmd**.
42
+
44
43
1. Right-click **Command prompt** and select **Run as administrator**.
45
44
46
45
4. Type the following command and then press **Enter**:
@@ -86,61 +85,23 @@ Example contents after MDEClientAnalyzer.ps1 is modified:
86
85
> - The start state of the EDR sensor (Sense is stopped if machine is not yet onboarded).
87
86
> - If an advanced troubleshooting parameter was used with the analyzer command.
88
87
89
-
By default, the unpacked MDEClientAnalyzerResult.zip file contains the following items.
90
-
91
-
- MDEClientAnalyzer.htm
92
-
93
-
This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce.
94
-
95
-
- SystemInfoLogs [Folder]
96
-
97
-
- AddRemovePrograms.csv
98
-
99
-
Description: List of x64 installed software on x64 OS collected from registry.
100
-
101
-
- AddRemoveProgramsWOW64.csv
102
-
103
-
Description: List of x86 installed software on x64 OS collected from registry.
104
-
105
-
- CertValidate.log
106
-
107
-
Description: Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil).
108
-
109
-
- dsregcmd.txt
110
-
111
-
Description: Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine.
112
-
113
-
- IFEO.txt
114
-
115
-
Description: Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine
116
-
117
-
- MDEClientAnalyzer.txt
118
-
119
-
Description: This is verbose text file showing with details of the analyzer script execution.
120
-
121
-
- MDEClientAnalyzer.xml
122
-
123
-
Description: XML format containing the analyzer script findings.
124
-
125
-
- RegOnboardedInfoCurrent.Json
126
-
127
-
Description: The onboarded machine information gathered in JSON format from the registry.
128
-
129
-
- RegOnboardingInfoPolicy.Json
130
-
131
-
Description: The onboarding policy configuration gathered in JSON format from the registry.
132
-
133
-
- SCHANNEL.txt
134
-
135
-
Description: Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry.
136
-
137
-
- SessionManager.txt
138
-
139
-
Description: Session Manager specific settings gather from registry.
140
-
141
-
- SSL_00010002.txt
142
-
143
-
Description: Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry.
88
+
By default, the unpacked `MDEClientAnalyzerResult.zip` file contains the items listed in the following table:
89
+
90
+
| Folder | Item | Description |
91
+
|--|--|--|
92
+
||`MDEClientAnalyzer.htm`| This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce. |
93
+
|`SystemInfoLogs`|`AddRemovePrograms.csv`| List of x64 installed software on x64 OS collected from registry |
94
+
||`AddRemoveProgramsWOW64.csv`| List of x86 installed software on x64 OS collected from registry |
95
+
||`CertValidate.log`| Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil)|
96
+
||`dsregcmd.txt`| Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine. |
97
+
||`IFEO.txt`| Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine |
98
+
||`MDEClientAnalyzer.txt`| This is verbose text file showing with details of the analyzer script execution. |
99
+
||`MDEClientAnalyzer.xml`| XML format containing the analyzer script findings |
100
+
||`RegOnboardedInfoCurrent.Json`| The onboarded machine information gathered in JSON format from the registry |
101
+
||`RegOnboardingInfoPolicy.Json`| The onboarding policy configuration gathered in JSON format from the registry |
102
+
||`SCHANNEL.txt`| Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry |
103
+
||`SessionManager.txt`| Session Manager specific settings gather from registry |
104
+
||`SSL_00010002.txt`| Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry |
0 commit comments