Skip to content

Commit fd93bb2

Browse files
authored
Merge pull request #3926 from MicrosoftDocs/chrisda
Removed Preview for automated remediation
2 parents 6a253f2 + edfa4a0 commit fd93bb2

File tree

2 files changed

+1
-7
lines changed

2 files changed

+1
-7
lines changed

defender-office-365/air-auto-remediation.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,17 +26,11 @@ appliesto:
2626

2727
# Automated remediation in Automated investigation and response (AIR)
2828

29-
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
30-
31-
> [!TIP]
32-
> The features described in this article are currently in Private Preview, aren't available in all organization, and are subject to change.
33-
3429
By default, remediation actions identified by automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2 require approval by security operations (SecOps) teams. For more information about AIR, see [Automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2](air-about.md)
3530

3631
Now, admins can also designate certain actions to automatically remediate. Automatically remediating messages identified as malicious in AIR investigations has the following benefits:
3732

3833
- Increases customer protection by expediting remediation of more threats.
39-
4034
- Saves time for SecOps teams by reducing the need for approval.
4135

4236
The rest of this article describes how to configure automated remediation in AIR and how to identify messages that were automatically remediated.

defender-office-365/remediate-malicious-email-delivered-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Once emails are selected through Explorer, you can start remediation by taking d
5959
- Direct approval: When actions like *move to inbox*, *move to junk*, *move to deleted items*, *soft delete*, or *hard delete* are selected by security personnel who have appropriate permissions, and the next steps in remediation are followed, the remediation process begins to execute the selected action.
6060

6161
> [!NOTE]
62-
> As the remediation gets kicked-off, it generates an alert and an investigation in parallel. Alert shows up in the alerts queue with the name "Administrative action submitted by an Administrator" suggesting that security personnel took the action of remediating an entity. It presents details like name of the person who performed the action, supporting investigation link, time, etc. It works really well to know every time a harsh action like remediation is performed on entities. All these actions can be tracked under the **Actions & Submissions** \> **Action center** \> **History tab** (public preview).
62+
> As the remediation gets kicked-off, it generates an alert and an investigation in parallel. Alert shows up in the alerts queue with the name "Administrative action submitted by an Administrator" suggesting that security personnel took the action of remediating an entity. It presents details like name of the person who performed the action, supporting investigation link, time, etc. It works really well to know every time a harsh action like remediation is performed on entities. All these actions can be tracked under the **Actions & Submissions** \> **Action center** \> **History tab**.
6363
6464
- Two-step approval: An "add to remediation" action can be taken by admins who don't have appropriate permissions or who need to wait to execute the action. In this case, the targeted emails are added to a remediation container. Approval is needed before the remediation is executed.
6565

0 commit comments

Comments
 (0)