Review remediation actions following an automated investigation (Microsoft) 0 (0)

Remediation actions When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be Malicious, Suspicious, or No threats found. Depending on the type of threat, the resulting verdict, and how your organization’s device groups are configured, remediation actions can occur automatically or only upon approval by your organization’s security operations team. Here are a few […]

Read More

Take response actions on a device (Microsoft) 0 (0)

Quickly respond to detected attacks by isolating devices or collecting an investigation package. After taking action on devices, you can check activity details on the Action center. Response actions run along the top of a specific device page and include: Manage tags Initiate Automated Investigation Initiate Live Response Session Collect investigation package Run antivirus scan […]

Read More

Create and manage device tags (Microsoft) 0 (0)

Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in Devices list view, or to group devices. For more information on […]

Read More

Microsoft Defender for Endpoint device timeline event flags 0 (0)

Event flags in the Defender for Endpoint device timeline help you filter and organize specific events when you’re investigate potential attacks. The Defender for Endpoint device timeline provides a chronological view of the events and associated alerts observed on a device. This list of events provides full visibility into any events, files, and IP addresses observed on […]

Read More

View and organize the Microsoft Defender for Endpoint Devices list 0 (0)

The Devices list shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days. At a glance you’ll see information such as domain, risk level, OS platform, and other details for easy identification of devices most at risk. There are several options you […]

Read More

Investigate a user account in Microsoft Defender for Endpoint 0 (0)

Investigate user account entities Identify user accounts with the most active alerts (displayed on dashboard as “Users at risk”) and investigate cases of potential compromised credentials, or pivot on the associated user account when investigating an alert or device to identify possible lateral movement between devices with that user account. You can find user account […]

Read More

Investigate an IP address associated with a Microsoft Defender for Endpoint alert 0 (0)

Examine possible communication between your devices and external internet protocol (IP) addresses. Identifying all devices in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected devices. You can find information from the following sections […]

Read More