You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-review-remediation-actions.md
+13-15Lines changed: 13 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,28 +19,26 @@ ms.collection:
19
19
- tier1
20
20
---
21
21
22
-
# Review remediation actions in the Action center
22
+
# Review remediation actions in the Action Center
23
23
24
24
As threats are detected, remediation actions come into play. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval. Examples of remediation actions include stopping a process from running or removing a scheduled task.
25
25
26
-
All remediation actions are tracked in the Action center.
26
+
All remediation actions are tracked in the Action Center.
27
27
28
-
:::image type="content" source="/defender/media/defender-business/mdb-actioncenter.png" alt-text="Screenshot of the Action center":::
28
+
:::image type="content" source="media/mdb-actioncenter.png" alt-text="Screenshot of the location of the Action Center in the Microsoft Defender portal." lightbox="media/mdb-actioncenter.png":::
29
29
30
30
**This article describes**:
31
31
32
-
-[How to use the Action center](#how-to-use-the-action-center)
32
+
-[How to use the Action Center](#how-to-use-the-action-center)
33
33
-[Remediation actions](#remediation-actions)
34
34
35
-
## How to use the Action center
35
+
## How to use the Action Center
36
36
37
-
1.Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
37
+
1.In the Defender portal at <https://security.microsoft.com>, go to **Actions & submissions**\>**Action Center**. Or, to go directly to the **Action Center** page, use <https://security.microsoft.com/action-center>.
38
38
39
-
2. In the navigation pane, choose **Action center**.
40
-
41
-
3. Select the **Pending** tab to view and approve (or reject) any pending actions. Actions can arise from antivirus/antimalware protection, automated investigations, manual response activities, or live response sessions.
42
-
43
-
4. Select the **History** tab to view a list of completed actions.
39
+
2. On the **Action Center** page, use the available tabs:
40
+
-**Pending**: View and approve (or reject) any pending actions. Actions on the **Pending** tab can arise from anti-virus protection, anti-malware protection, automated investigations, manual response activities, or live response sessions.
41
+
-**History**: View completed actions.
44
42
45
43
## Remediation actions
46
44
@@ -50,10 +48,10 @@ The following table lists remediation actions that are available.
50
48
51
49
|Source|Actions|
52
50
|---|---|
53
-
|[Automatic attack disruption](mdb-attack-disruption.md)|- Contain a device <br/>- Contain a user <br/>- Disable a user account|
54
-
|[Automated investigations](/defender-endpoint/automated-investigations)|- Quarantine a file<br/> - Remove a registry key<br/> - Kill a process<br/> - Stop a service<br/> - Disable a driver<br/> - Remove a scheduled task|
55
-
|[Manual response actions](/defender-endpoint/respond-machine-alerts)|- Run antivirus scan<br/> - Isolate a device<br/> - Add an indicator to block or allow a file|
56
-
|[Live response](/defender-endpoint/live-response)|- Collect forensic data<br/> - Analyze a file<br/> - Run a script<br/> - Send a suspicious entity to Microsoft for analysis<br/> - Remediate a file <br/> - Proactively hunt for threats|
51
+
|[Automatic attack disruption](mdb-attack-disruption.md)|<ul></li>Contain a device</li><li>Contain a user account on a device</li><li>Disable a user account</ul></li>|
52
+
|[Automated investigations](/defender-endpoint/automated-investigations)|<ul></li>Quarantine a file</li><li>Remove a registry key</li><li>Kill a process</li><li>Stop a service</li><li>Disable a driver</li><li>Remove a scheduled task</ul></li>|
53
+
|[Manual response actions](/defender-endpoint/respond-machine-alerts)|<ul></li>Run antivirus scan</li><li>Isolate a device</li><li>Add an indicator to block or allow a file</ul></li>|
54
+
|[Live response](/defender-endpoint/live-response)|<ul></li>Collect forensic data</li><li>Analyze a file</li><li>Run a script</li><li>Send a suspicious entity to Microsoft for analysis</li><li>Remediate a file</li><li>Proactively hunt for threats</ul></li>|
0 commit comments