Get MdeMachineInvestigationPackage - Visorian/PSMDE GitHub Wiki


external help file: PSMDE-help.xml Module Name: PSMDE online version: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/collect-investigation-package?view=o365-worldwide schema: 2.0.0

Get-MdeMachineInvestigationPackage

SYNOPSIS

Collect investigation package from a device.

SYNTAX

Get-MdeMachineInvestigationPackage [-id] <String> [-comment] <String> [<CommonParameters>]

DESCRIPTION

Collect investigation package from a device.

EXAMPLES

EXAMPLE 1

$result = Get-MdeMachineInvestigationPackage

EXAMPLE 2

Get-MdeMachineInvestigationPackage -id "MACHINE_ID"

PARAMETERS

-id

Specifies the id of the target machine for the investigation package.

Type: String
Parameter Sets: (All)
Aliases:

Required: True
Position: 1
Default value: None
Accept pipeline input: True (ByPropertyName, ByValue)
Accept wildcard characters: False

-comment

Comment to associate with the action.

Type: String
Parameter Sets: (All)
Aliases:

Required: True
Position: 2
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

NOTES

Author: Jan-Henrik Damaschke

RELATED LINKS

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/collect-investigation-package?view=o365-worldwide

⚠️ **GitHub.com Fallback** ⚠️