Skip to content

Commit 3515c39

Browse files
committed
Update advanced-hunting-take-action.md
1 parent 27a7308 commit 3515c39

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-xdr/advanced-hunting-take-action.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ To learn more about how these response actions are performed through Microsoft D
5959

6060
### Quarantine files
6161

62-
You can deploy the *quarantine* action on files so that they are automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine:
62+
You can deploy the *quarantine* action on files so that they're automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine:
6363

64-
- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.
64+
- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that's affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.
6565
- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.
6666
- `SHA256`: This column is the SHA-256 equivalent of the file identified by the `SHA1` column.
6767
- `InitiatingProcessSHA256`: This column is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column.
@@ -71,19 +71,19 @@ To learn more about how quarantine actions are taken and how files can be restor
7171
> [!NOTE]
7272
> To locate files and quarantine them, the query results should also include `DeviceId` values as device identifiers.
7373
74-
To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard will guide you through the process of selecting and then submitting your preferred actions.
74+
To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard guides you through the process of selecting and then submitting your preferred actions.
7575

7676
:::image type="content" source="media/take-action-multiple.png" alt-text="Screenshot of the take actions option in the Microsoft Defender portal." lightbox="media/take-action-multiple.png":::
7777

7878
## Take various actions on emails
7979

8080
Apart from device-focused remediation steps, you can also take some actions on emails from your query results. Select the records you want to take action on, select **Take actions**, then under **Choose actions**, select your choice from the following:
8181

82-
- `Move to mailbox folder` - select this to move the email messages to Junk, Inbox, or Deleted items folder
82+
- `Move to mailbox folder` - select this action to move the email messages to Junk, Inbox, or Deleted items folder
8383

8484
:::image type="content" source="media/advanced-hunting-take-actions-email.png" alt-text="Screenshot of the option Take actions in the Microsoft Defender portal." lightbox="media/advanced-hunting-take-actions-email.png":::
8585

86-
- `Delete email` - select this to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)
86+
- `Delete email` - select this action to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)
8787

8888
Selecting **Soft delete** also automatically soft deletes the messages from the sender's Sent Items folder if the sender is in the organization.
8989

@@ -99,7 +99,6 @@ Apart from device-focused remediation steps, you can also take some actions on e
9999
| project NetworkMessageId,RecipientEmailAddress, EmailDirection, SenderFromAddress, LatestDeliveryAction,LatestDeliveryLocation
100100
```
101101

102-
103102
You can also provide a remediation name and a short description of the action taken to easily track it in the action center history. You can also use the Approval ID to filter for these actions in the action center. This ID is provided at the end of the wizard:
104103

105104
:::image type="content" source="media/choose-email-actions-entities.png" alt-text="take actions wizard showing choose actions for entities" lightbox="media/choose-email-actions-entities.png":::
@@ -113,11 +112,12 @@ Each action is individually recorded in the [action center](m365d-action-center.
113112
> [!NOTE]
114113
> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
115114
116-
## Related topics
115+
## Related articles
117116

118117
- [Advanced hunting overview](advanced-hunting-overview.md)
119118
- [Learn the query language](advanced-hunting-query-language.md)
120119
- [Work with query results](advanced-hunting-query-results.md)
121120
- [Understand the schema](advanced-hunting-schema-tables.md)
122121
- [Action center overview](m365d-action-center.md)
122+
123123
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)