You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When an automatic attack disruption triggers in Microsoft Defender XDR, the details about the risk and the containment status of compromised assets are available during and after the process. You can view the details on the incident page, which provides the full details of the attack and the up-to-date status of associated assets.
30
+
When an automatic attack disruption triggers in Microsoft Defender XDR, you can view the details about the risk and the containment status of compromised assets during and after the process. You can view the details on the incident page, which provides the full details of the attack and the up-to-date status of associated assets.
31
31
32
32
## Review the incident graph
33
33
34
34
Microsoft Defender XDR automatic attack disruption is built-in in the incident view. Review the incident graph to get the entire attack story and assess the attack disruption impact and status.
35
35
36
36
The incident page includes the following information:
37
37
38
-
- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
38
+
- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (for example, ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
39
39
- A highlighted notification below the incident title indicating that the incident was disrupted.
40
40
- Suspended users and contained devices appear with a label indicating their status.
41
41
42
-
To release a user account or a device from containment, click on the contained asset and click**release from containment** for a device or **enable user** for a user account.
42
+
To release a user account or a device from containment, select the contained asset and select**release from containment** for a device or **enable user** for a user account.
43
43
44
44
## Track the actions in the Action center
45
45
@@ -52,18 +52,18 @@ You can release the contained assets, for example, enable a blocked user account
52
52
53
53
You can use specific queries in [advanced hunting](advanced-hunting-overview.md) to track contain device or user, and disable user account actions.
54
54
55
-
### Hunt for contain actions
55
+
### Containment-related events in advanced hunting
56
56
57
-
Contain actions triggered by attack disruption are found in the [DeviceEvents table](advanced-hunting-deviceevents-table.md)in advanced hunting. Use the following queries to hunt for these specific contain actions:
57
+
Containment in Microsoft Defender for Endpoint prevents further threat actor activity by blocking communication from contained entities. In advanced hunting, the [DeviceEvents table](advanced-hunting-deviceevents-table.md)logs **block actions that result from containment**, not the initial containment action itself:
58
58
59
-
- Device contain actions:
59
+
-**Device-derived block actions** - These events indicate activity (such as network communication) that was *blocked because the device was contained*:
60
60
61
61
```Kusto
62
62
DeviceEvents
63
63
| where ActionType contains "ContainedDevice"
64
64
```
65
65
66
-
- User contain actions:
66
+
-**User-derived block actions** - These events indicate activity (such as sign-in or resource access attempts) that was *blocked because the user was contained*:
67
67
68
68
```Kusto
69
69
DeviceEvents
@@ -72,7 +72,7 @@ Contain actions triggered by attack disruption are found in the [DeviceEvents ta
72
72
73
73
### Hunt for disable user account actions
74
74
75
-
Attack disruption uses the remediation action capability of Microsoft Defender for Identity to disable accounts. Defender for Identity uses the LocalSystem account of the domain controller by default for all remediation actions.
75
+
Attack disruption uses the remediation action capability of Microsoft Defender for Identity to disable accounts. By default, Microsoft Defender for Identity uses the LocalSystem account of the domain controller for all remediation actions.
76
76
77
77
The following query looks for events where a domain controller disabled user accounts. This query also returns user accounts disabled by automatic attack disruption by triggering account disable in Microsoft Defender XDR manually:
The above query was adapted from a [Microsoft Defender for Identity - Attack Disruption query](https://github.com/alexverboon/Hunting-Queries-Detection-Rules/blob/main/Defender%20For%20Identity/MDI-AttackDisruption.md#microsoft-365-defender).
97
+
The preceding query was adapted from a [Microsoft Defender for Identity - Attack Disruption query](https://github.com/alexverboon/Hunting-Queries-Detection-Rules/blob/main/Defender%20For%20Identity/MDI-AttackDisruption.md#microsoft-365-defender).
0 commit comments