0
(0)

The Microsoft Defender for Endpoint Client Analyzer (MDECA) can be useful when diagnosing sensor health or reliability issues on onboarded devices running either Windows, Linux, or macOS. For example, you may want to run the analyzer on a machine that appears to be unhealthy according to the displayed sensor health status (Inactive, No Sensor Data or Impaired Communications) in the security portal.

Besides obvious sensor health issues, MDECA can collect other traces, logs, and diagnostic information for troubleshooting complex scenarios such as:

Privacy notice

  • The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint.
  • The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.
  • Once data collection is complete, the tool saves the data locally on the machine within a subfolder and compressed zip file.
  • No data is automatically sent to Microsoft. If you are using the tool during collaboration on a support issue, you may be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.

For more information about Secure File Exchange, see How to use Secure File Exchange to exchange files with Microsoft Support

For more information about our privacy statement, see Microsoft Privacy Statement.

Requirements

  • Before running the analyzer, we recommend ensuring your proxy or firewall configuration allows access to Microsoft Defender for Endpoint service URLs.
  • The analyzer can run on supported editions of WindowsLinux, or macOS either before of after onboarding to Microsoft Defender for Endpoint.
  • For Windows devices, if you are running the analyzer directly on specific machines and not remotely via Live Response, then SysInternals PsExec.exe should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.

     Note

    On Windows devices, if you use Attack Surface Reduction (ASR) rule Block process creations originating from PSExec and WMI commands, then may want to temporarily disable the rule or configure an exclusion to the ASR rule to allow the analyzer to run connectivity checks to cloud as expected.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 8 times, 1 visits today)