You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/m365d-action-center.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 5/9/2024
11
+
ms.date: 4/28/2025
12
12
manager: deniseb
13
13
audience: ITPro
14
14
ms.collection:
@@ -40,11 +40,6 @@ The unified Action center ([https://security.microsoft.com/action-center](https:
40
40
41
41
:::image type="content" source="/defender/media/m3d-action-center-unified.png" alt-text="The unified Action center in the Microsoft Defender portal." lightbox="/defender/media/m3d-action-center-unified.png":::
42
42
43
-
For example:
44
-
45
-
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
46
-
- If you were already using the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47
-
48
43
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
49
44
50
45
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
@@ -59,20 +54,20 @@ You can use the unified Action center if you have appropriate permissions and on
59
54
You can navigate to the list of actions pending approval in two different ways:
60
55
61
56
- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or
62
-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.
57
+
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage, in the Automated investigation & response card, select **View pending actions**.
63
58
64
59
## Using the Action center
65
60
66
61
1. Go to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> and sign in.
67
62
68
-
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
63
+
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card in the homepage, select **View pending actions**.
69
64
70
65
3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
71
66
72
67
|Tab|Description|
73
68
|---|---|
74
-
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
75
-
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
69
+
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (like Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
70
+
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
76
71
77
72
4. You can customize, sort, filter, and export data in the Action center.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-autoir-results.md
+9-13Lines changed: 9 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 08/11/2022
11
+
ms.date: 04/28/2025
12
12
manager: dansimp
13
13
audience: ITPro
14
14
ms.collection:
@@ -21,6 +21,7 @@ ms.custom:
21
21
ms.reviewer: evaldm, isco
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
+
#customer intent: As a SOC analyst, I want to understand the results and key findings of automated investigation in Microsoft Defender XDR
24
25
---
25
26
26
27
# Details and results of an automated investigation
@@ -29,9 +30,9 @@ appliesto:
29
30
30
31
With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
31
32
32
-
## (NEW) Unified investigation page
33
+
## Unified investigation page
33
34
34
-
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35
+
The investigation page includes information across your devices, email, and collaboration content. The unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35
36
36
37
- Any investigation page in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077149"target="_blank">Microsoft Purview portal</a>
37
38
- Any investigation page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))
@@ -42,11 +43,11 @@ The investigation page has recently been updated to include information across y
42
43
You can open the investigation details view by using one of the following methods:
43
44
44
45
-[Select an item in the Action center](#select-an-item-in-the-action-center)
45
-
-[Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)
46
+
-[Select an investigation from an incident details page](#open-an-investigation-from-an-incident-page)
46
47
47
48
### Select an item in the Action center
48
49
49
-
The improved [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50
+
The [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50
51
51
52
> [!TIP]
52
53
> You must have [certain permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve, reject, or undo actions.
@@ -63,9 +64,9 @@ The improved [Action center](m365d-action-center.md) ([https://security.microsof
63
64
- Select **Reject** to prevent a pending action from being taken.
64
65
- Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
65
66
66
-
### Open an investigation from an incident details page
67
+
### Open an investigation from an incident page
67
68
68
-
Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69
+
Use the incident page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69
70
70
71
1. Go to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> and sign in.
71
72
@@ -77,17 +78,13 @@ Use an incident details page to view detailed information about an incident, inc
77
78
78
79
5. Select **Open investigation page**.
79
80
80
-
Here's an example.
81
-
82
-
:::image type="content" source="/defender/media/mtp-incidentdetails-tabs.png" alt-text="The investigation page in the Microsoft Defender portal" lightbox="/defender/media/mtp-incidentdetails-tabs.png":::
83
-
84
81
## Investigation details
85
82
86
83
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. Here's an example.
87
84
88
85
:::image type="content" source="/defender/media/mtp-air-investdetails.png" alt-text="The investigation details page in the Microsoft Defender portal" lightbox="/defender/media/mtp-air-investdetails.png":::
89
86
90
-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
87
+
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Mailboxes**, **Devices**, **Users**, **Evidence**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
91
88
92
89
> [!NOTE]
93
90
> The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
@@ -104,7 +101,6 @@ In the Investigation details view, you can see information on the **Investigatio
104
101
|**Log**| Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
105
102
|**Pending actions history**| Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. |
106
103
107
-
108
104
## Investigation states
109
105
110
106
The following table lists investigation states and what they indicate.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-autoir.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 04/10/2023
11
+
ms.date: 04/28/2025
12
12
manager: dansimp
13
13
audience: ITPro
14
14
ms.collection:
@@ -91,11 +91,11 @@ To view investigations, go to the **Incidents** page. Select an incident, and th
91
91
92
92
## Automated investigation & response card
93
93
94
-
The new Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This new card visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
94
+
The Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage. This card provides visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
95
95
96
96
:::image type="content" source="/defender/media/automated-investigation-response-card.png" alt-text="Screenshot that shows the automated investigation & response card.":::
97
97
98
-
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
98
+
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **View pending actions** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-configure-auto-investigation-response.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: ITPro
9
9
ms.topic: how-to
10
10
ms.service: defender-xdr
11
11
ms.localizationpriority: medium
12
-
ms.date: 07/08/2024
12
+
ms.date: 04/28/2025
13
13
ms.collection:
14
14
- m365-security
15
15
- tier2
@@ -18,6 +18,7 @@ ms.custom:
18
18
- admindeeplinkDEFENDER
19
19
ms.reviewer: evaldm, isco
20
20
f1.keywords: CSH
21
+
#customer intent: As a SOC analyst, I want to configure automated investigation and response capabilities in Microsoft Defender XDR
21
22
---
22
23
23
24
# Configure automated investigation and response capabilities in Microsoft Defender XDR
@@ -55,16 +56,16 @@ Whether automated investigations run, and whether remediation actions are taken
55
56
56
57
1. Go to the Microsoft Defender portal at <https://security.microsoft.com> and sign in.
57
58
58
-
2. Go to **Settings**\>**Endpoints**\>**Device groups** under **Permissions**.
59
+
2. Go to **System**\>**Settings**\>**Endpoints**\>**Device groups** under **Permissions**.
59
60
60
61
3. Review your device group policies. In particular, look at the **Remediation level** column. We recommend using **Full - remediate threats automatically**. You might need to create or edit your device groups to get the level of automation you want. To get help with this task, see the following articles:
61
62
62
-
-[How threats are remediated](/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated)
63
-
-[Create and manage device groups](/windows/security/threat-protection/microsoft-defender-atp/machine-groups)
63
+
-[How threats are remediated](/defender-endpoint/automated-investigations#how-threats-are-remediated)
64
+
-[Create and manage device groups](/defender-endpoint/machine-groups)
64
65
65
66
## Review your security and alert policies in Office 365
66
67
67
-
Microsoft provides built-in [alert policies](/defender-office-365/alert-policies-defender-portal) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365](/defender-office-365/mdo-about) features are configured correctly.
68
+
Microsoft provides built-in [alert policies](alert-policies.md) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365](/defender-office-365/mdo-about) features are configured correctly.
68
69
69
70
Although certain alerts and security policies can trigger automated investigations, *no remediation actions are taken automatically for email and content*. Instead, all remediation actions for email and email content await approval by your security operations team in the [Action center](m365d-action-center.md).
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
29
+
During and after an automated investigation, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
29
30
30
31
> [!IMPORTANT]
31
32
> Whether remediation actions are taken automatically or only upon approval depends on certain settings, such as automation levels. To learn more, see the following articles:
0 commit comments