Skip to content

Commit d1ae806

Browse files
authored
Merge pull request #3600 from MicrosoftDocs/diannegali-aprilxdrfresh
xdr updates
2 parents d0cef31 + 2e6966f commit d1ae806

12 files changed

+44
-48
lines changed

defender-xdr/m365d-action-center.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 5/9/2024
11+
ms.date: 4/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
@@ -40,11 +40,6 @@ The unified Action center ([https://security.microsoft.com/action-center](https:
4040

4141
:::image type="content" source="/defender/media/m3d-action-center-unified.png" alt-text="The unified Action center in the Microsoft Defender portal." lightbox="/defender/media/m3d-action-center-unified.png":::
4242

43-
For example:
44-
45-
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
46-
- If you were already using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47-
4843
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
4944

5045
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
@@ -59,20 +54,20 @@ You can use the unified Action center if you have appropriate permissions and on
5954
You can navigate to the list of actions pending approval in two different ways:
6055

6156
- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or
62-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.
57+
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage, in the Automated investigation & response card, select **View pending actions**.
6358

6459
## Using the Action center
6560

6661
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
6762

68-
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
63+
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card in the homepage, select **View pending actions**.
6964

7065
3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
7166

7267
|Tab|Description|
7368
|---|---|
74-
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
75-
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
69+
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (like Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
70+
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
7671

7772
4. You can customize, sort, filter, and export data in the Action center.
7873

defender-xdr/m365d-autoir-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: View and manage actions in the Action center
3-
description: Use the Action center to view and manage remediation actions
3+
description: Use the Action center in the Microsoft Defender portal to view and manage remediation actions for affected assets.
44
search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 11/25/2024
11+
ms.date: 04/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:

defender-xdr/m365d-autoir-results.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 08/11/2022
11+
ms.date: 04/28/2025
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:
@@ -21,6 +21,7 @@ ms.custom:
2121
ms.reviewer: evaldm, isco
2222
appliesto:
2323
- Microsoft Defender XDR
24+
#customer intent: As a SOC analyst, I want to understand the results and key findings of automated investigation in Microsoft Defender XDR
2425
---
2526

2627
# Details and results of an automated investigation
@@ -29,9 +30,9 @@ appliesto:
2930

3031
With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
3132

32-
## (NEW) Unified investigation page
33+
## Unified investigation page
3334

34-
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35+
The investigation page includes information across your devices, email, and collaboration content. The unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
3536

3637
- Any investigation page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview portal</a>
3738
- Any investigation page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))
@@ -42,11 +43,11 @@ The investigation page has recently been updated to include information across y
4243
You can open the investigation details view by using one of the following methods:
4344

4445
- [Select an item in the Action center](#select-an-item-in-the-action-center)
45-
- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)
46+
- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-page)
4647

4748
### Select an item in the Action center
4849

49-
The improved [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50+
The [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
5051

5152
> [!TIP]
5253
> You must have [certain permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve, reject, or undo actions.
@@ -63,9 +64,9 @@ The improved [Action center](m365d-action-center.md) ([https://security.microsof
6364
- Select **Reject** to prevent a pending action from being taken.
6465
- Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
6566

66-
### Open an investigation from an incident details page
67+
### Open an investigation from an incident page
6768

68-
Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69+
Use the incident page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
6970

7071
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
7172

@@ -77,17 +78,13 @@ Use an incident details page to view detailed information about an incident, inc
7778

7879
5. Select **Open investigation page**.
7980

80-
Here's an example.
81-
82-
:::image type="content" source="/defender/media/mtp-incidentdetails-tabs.png" alt-text="The investigation page in the Microsoft Defender portal" lightbox="/defender/media/mtp-incidentdetails-tabs.png":::
83-
8481
## Investigation details
8582

8683
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. Here's an example.
8784

8885
:::image type="content" source="/defender/media/mtp-air-investdetails.png" alt-text="The investigation details page in the Microsoft Defender portal" lightbox="/defender/media/mtp-air-investdetails.png":::
8986

90-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
87+
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Mailboxes**, **Devices**, **Users**, **Evidence**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
9188

9289
> [!NOTE]
9390
> The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
@@ -104,7 +101,6 @@ In the Investigation details view, you can see information on the **Investigatio
104101
|**Log** | Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
105102
| **Pending actions history** | Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. |
106103

107-
108104
## Investigation states
109105

110106
The following table lists investigation states and what they indicate.

defender-xdr/m365d-autoir.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 04/10/2023
11+
ms.date: 04/28/2025
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:
@@ -91,11 +91,11 @@ To view investigations, go to the **Incidents** page. Select an incident, and th
9191

9292
## Automated investigation & response card
9393

94-
The new Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This new card visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
94+
The Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage. This card provides visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
9595

9696
:::image type="content" source="/defender/media/automated-investigation-response-card.png" alt-text="Screenshot that shows the automated investigation & response card.":::
9797

98-
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
98+
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **View pending actions** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
9999

100100
## Next steps
101101

defender-xdr/m365d-configure-auto-investigation-response.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 07/08/2024
12+
ms.date: 04/28/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -18,6 +18,7 @@ ms.custom:
1818
- admindeeplinkDEFENDER
1919
ms.reviewer: evaldm, isco
2020
f1.keywords: CSH
21+
#customer intent: As a SOC analyst, I want to configure automated investigation and response capabilities in Microsoft Defender XDR
2122
---
2223

2324
# Configure automated investigation and response capabilities in Microsoft Defender XDR
@@ -55,16 +56,16 @@ Whether automated investigations run, and whether remediation actions are taken
5556

5657
1. Go to the Microsoft Defender portal at <https://security.microsoft.com> and sign in.
5758

58-
2. Go to **Settings** \> **Endpoints** \> **Device groups** under **Permissions**.
59+
2. Go to **System** \> **Settings** \> **Endpoints** \> **Device groups** under **Permissions**.
5960

6061
3. Review your device group policies. In particular, look at the **Remediation level** column. We recommend using **Full - remediate threats automatically**. You might need to create or edit your device groups to get the level of automation you want. To get help with this task, see the following articles:
6162

62-
- [How threats are remediated](/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated)
63-
- [Create and manage device groups](/windows/security/threat-protection/microsoft-defender-atp/machine-groups)
63+
- [How threats are remediated](/defender-endpoint/automated-investigations#how-threats-are-remediated)
64+
- [Create and manage device groups](/defender-endpoint/machine-groups)
6465

6566
## Review your security and alert policies in Office 365
6667

67-
Microsoft provides built-in [alert policies](/defender-office-365/alert-policies-defender-portal) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365](/defender-office-365/mdo-about) features are configured correctly.
68+
Microsoft provides built-in [alert policies](alert-policies.md) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365](/defender-office-365/mdo-about) features are configured correctly.
6869

6970
Although certain alerts and security policies can trigger automated investigations, *no remediation actions are taken automatically for email and content*. Instead, all remediation actions for email and email content await approval by your security operations team in the [Action center](m365d-action-center.md).
7071

defender-xdr/m365d-remediation-actions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,16 +16,17 @@ ms.collection:
1616
ms.topic: concept-article
1717
ms.custom: autoir
1818
ms.reviewer: evaldm, isco
19-
ms.date: 08/06/2024
19+
ms.date: 04/28/2025
2020
appliesto:
2121
- Microsoft Defender XDR
22+
#customer intent: As a SOC analyst, I want to understand the remediation actions that follow automated investigations in Microsoft Defender XDR
2223
---
2324

2425
# Get notified about remediation actions
2526

2627
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2728

28-
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
29+
During and after an automated investigation, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
2930

3031
> [!IMPORTANT]
3132
> Whether remediation actions are taken automatically or only upon approval depends on certain settings, such as automation levels. To learn more, see the following articles:

0 commit comments

Comments
 (0)