[Index]

Model: view/DefenderBulkActions

Incidents

Full HTML Help

MICROSOFT

Overview

Automate provides support for Microsoft Defender for Endpoint, that addresses user devices (laptops, phones, tablets, PCs) and network devices (access points, routers, firewalls).

Note

Dashboards

The administrator interface provides dashboards for the view and management of data:

Dashboards:
Security Management - Defender for Endpoint Overview Security Management - Defender for Endpoint Actions
Dashboards:

To customize your dashboards:

Incident and Alert Actions

Incidents

Related device model: device/msgraphsecurity/Incident

Automate provides an Incidents list view showing such headings as the incident Status and Severity at a hierarchy (Located At), and allows for the examination of the Details of an incident, including for example the Incident Web URL at security.microsoft.com.

Alerts

Related device model: device/msgraphsecurity/Alerts

Automate provides an Alerts list view showing such headings as the incident Title, Status, Severity, Description and Device at a hierarchy (Located At), and allows for the Details of an instance to be viewed and managed.

Managing an alert

Administrators can manage the following alert properties:

Device Actions

View Devices

Related device model: device/mssecurity/Machine

Automate provides an View Devices list view showing such headings as the Last IP Address, Health Status, Exposure Level and Device at a hierarchy (Located At), and allows for the examination of the Details of a device.

Bulk Actions

Automate provides an interface to carry out bulk actions on devices. For Target Defender Devices, the Available and Selected transfer boxes are available to select devices accessible from a hierarchy to carry out operations in bulk:

Machine Action

The relation/MachineAction model is available to allow for the execution of Cancel action. (This action sends a request to device/mssecurity/MachineActionCancel.)

Related Topics

A view to make changes to different kinds of models within Defender for Endpoint

Model Details: view/DefenderBulkActions

Title Description Details
Device Filter Select the type of Defender for Endpoint device to list below for selection to bulk update. Default: All
  • Field Name: filter
  • Type: String
  • Default: All
  • Choices: ["All", "Windows", "macOS", "Linux", "Android", "iOS"]
Operation * Default: Scan
  • Field Name: operation
  • Type: String
  • Default: Scan
  • Choices: ["Scan", "Isolate", "Unisolate", "Offboard", "Restrict Code Execution", "Unrestrict Code Execution", "Collect Investigation Package", "Stop and Quarantine File"]
Comment A comment to be added for this device action.
  • Field Name: comments
  • Type: String
Machine SHA1 SHA1 hash of the file to be quarantined.
  • Field Name: sha1
  • Type: String
Type Select the type of scan to perform. Default: Full
  • Field Name: scanType
  • Type: String
  • Default: Full
  • Choices: ["Full", "Quick"]
Isolation Type Select the type of isolation to perform. Default: Full
  • Field Name: isolationType
  • Type: String
  • Default: Full
  • Choices: ["Full", "Selective", "UnManaged Device"]
Target Defender Devices List of Defender for Endpoint devices that will be updated.
  • Field Name: targetDevices.[n]
  • Type: Array