Defender Toolbox uses PowerShell functions to help you with Defender Antivirus or MDE log parsing automatically. It is also a replacement of some official Python tools for Xplatform.
Invoke-RestMethod "https://raw.githubusercontent.com/typicaldao/Defender-Toolbox/main/Update-DefenderToolbox.ps1" | Invoke-Expression
irm "https://raw.githubusercontent.com/typicaldao/Defender-Toolbox/main/Update-DefenderToolbox.ps1" | iex
After you have successfully installed the module, run Update-DefenderToolbox
to update the module, as a replacement of above commands. (Starting from version 0.2)
Download and import the separated functions to use them.
Or you can use the combined PowerShell profile Microsoft.Powershell_profile.ps1
so that the functions are automatically loaded when PowerShell is launched.
August 8th: Update module version to 0.2. Following functions are included the the module:
Convert-MpRegistrytxtToJson
Update-DefenderToolbox
- PowerShell 7.x is recommended, but PowerShell 5.1 should work as well. However, it could encounter into some encoding issues (like
ConvertTo-Json
- resolved on August 7th). Same function could have different parameters and results, so let me know when you encounter such issue. - Load the module automatically in your PowerShell profile. (The update module will check and help you with it.) When you need to parse log, right click in file explorer and run the functions directly. Usually, no additional parameter is needed as the default log name is used.
Format MpOperationalEvents.txt into PowerShell objects, and export the output as CSV so that you can use Excel or other tools to view and filter.
Default input: Convert MpOperationalEvents.txt (from MpSupportFiles.cab) in the current location. Optional: Use -Path to specify your log file, and use -OutFile to save the output.
Convert Endpoint DLP policy from macOS (dlp_policy.bin, dlp_sensitive_info.bin and other policy-related .bin files).
Default: Convert dlp_policy.bin in the current location.
Convert Xplatform scan history file wdavhistory
from JSON to a readable list.
Default input: file wdavhistory Note: wdavhistory can be extracted from mde_diagnostic.zip <- (XMDE client analyzer result).zip, or via "mdatp diagnostic create".
Convert Xplatform (macOS/Linux) real-time protection diagnostic log from JSON to a readable list. Reference official documentation: https://learn.microsoft.com/en-us/defender-endpoint/linux-support-perf?view=o365-worldwide Python version of the parser provided by Microsoft/mdatp-xplat: https://github.com/microsoft/mdatp-xplat/blob/master/linux/diagnostic/high_cpu_parser.py
Convert Defender log: MpRegistry.txt into a JSON format. Please be aware that if you are using Windows default PowerShell 5.1, the output of JSON output via function ConvertTo-Json is not that pretty. You might need to use your text editor to prettier JSON for you. PowerShell 7.x works just fine.
- List help information of the tool.