If you have ever used an automated tool to diagnose problems with Outlook, Office or Windows, you are likely to know - or have heard of - the Support and Recovery Assistant. As of March 10, Microsoft has announced that the command line version of that utility has been marked as obsolete and deleted from Windows versions that still receive support. This movement forces managers and support teams to rethink their workflows and to migrate to the official alternative recommended by the company.
Support and Recovery Assistant (SaRA) was for years a practical tool to run automated diagnoses on Windows customers and detect the root cause of common problems with Microsoft 365, Outlook and other components applications. Its strength was to be able to run in lots or to be integrated into scripts to review large deployments without manual intervention. Microsoft maintained a download page with the latest version of the utility and related documentation, which still remains a reference point for those who need to review histories: SaRA download page.

The reason Microsoft fades to remove the command line binary is no less: security. The company explains in its launch state center that the infrastructure that supports the new alternative offers a higher level of hardening and security controls, and therefore recommend replacing SaRA with the new online command diagnostic tool known as Get Help. You can check the official ad and the technical details in the message within the Windows health center: Windows release health - Microsoft message.
Get Help comes as the suggested option for those who need similar capabilities: it is an autonomous tool designed for business environments that allows to diagnose specific problems in Windows customers that affect applications such as Teams or other Microsoft 365 apps. Like SaRA, it can be invoked from the command line and automated with PowerShell to run remotely in multiple endpoints, but under an infrastructure that Microsoft considers safer.
For administrators, the transition involves more than changing the executable name in a script. The scenarios that were previously resolved with SaRA will have to be reviewed, the fact that GetHelpCmd.exe covers the same checks or equivalent alternatives will have to be validated, and the outputs and records used in ticketing or telemetry will be adapted. It is also important to test the behavior in controlled environments before deploying it to production to detect differences in results or in the automatic actions that each tool can perform.
What practical steps are being taken? First, identify the scripts and support solutions that are currently invoked by SaRA and document exactly which scenarios cover. Second, download and get familiar with Get Help, run tests on laboratory machines and compare the detection and possible corrections it offers. Third, update internal documentation and runbooks, and notify support teams about the new running routes and location of the binary recommended by Microsoft.
In terms of security, Microsoft's removal of the executable reflects a clear trend: to reduce the attack surface that involves utilities with the ability to run remotely and to modify settings in customers. Replacing components by alternatives housed on more controlled infrastructure or with better guarantees of automatic updates and validation, is a measure that seeks to mitigate risks in corporate networks increasingly attacked by sophisticated threats.
It's not an isolated case. Microsoft has been announcing in recent years the removal or removal of various features and applications, from autofill features in authentication to specific apps that were part of larger suites. This pattern requires organizations to maintain constant monitoring of the useful life of critical tools and to plan migration well in advance to avoid interruptions.

If your organization is dependent on SaRA, it is appropriate to act calmly but with decision: take advantage of the post-notification period to map units, run functional compatibility tests and update the operating processes. It is also recommended to review the permits and the context in which these utilities are executed, to ensure that no unnecessary privileges are granted to automated scripts.
For those who need to deepen Microsoft's official communication on this deactivation and replacement recommendations, the entry in the Windows health center offers the starting point with official information and complementary links: Microsoft message on Windows release health. And for those who want to review the history and downloadable version of the old utility, the SaRA download page is still available as a reference: Support and Recovery Assistant download page.
The final council It's simple: don't leave the transition for the last minute. It plans, tests and documents; it makes migration an opportunity to review permissions, telemetry and the automatic remediation processes you have in production. In this way you will avoid surprises and improve the security position of your organization in the face of daily support problems.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...