[Index]
MICROSOFT
Overview
Automate provides support for Microsoft Defender for Endpoint, that addresses user devices (laptops, phones, tablets, PCs) and network devices (access points, routers, firewalls).
Note
Dashboards
The administrator interface provides dashboards for the view and management of data:
To customize your dashboards:
See: Automate Dashboards.
Resources have been added and are available to widgets on a dashboard where Data Source is Automate Analyzed.
For example:
Incident and Alert Actions
Related device model: device/msgraphsecurity/Incident
Automate provides an Incidents list view showing such headings as the incident Status and Severity at a hierarchy (Located At), and allows for the examination of the Details of an incident, including for example the Incident Web URL at security.microsoft.com.
Details example in JSON:
{
"id": "5",
"tenantId": "f372af60-59d5-4e03-a849-9e46a432aac0",
"status": "redirected",
"incidentWebUrl": "https://security.microsoft.com/incident2/5/overview?tid=...",
"redirectIncidentId": "1",
"displayName": "[Test Alert] Suspicious Powershell commandline",
"createdDateTime": "2025-05-07T13:12:59.9233333Z",
"lastUpdateDateTime": "2025-05-07T13:13:12.24Z",
"classification": "unknown",
"determination": "unknown",
"severity": "informational",
"customTags": [],
"systemTags": [],
"lastModifiedBy": "Microsoft 365 Defender-AlertCorrelation",
"comments": []
}
Related device model: device/msgraphsecurity/Alerts
Automate provides an Alerts list view showing such headings as the incident Title, Status, Severity, Description and Device at a hierarchy (Located At), and allows for the Details of an instance to be viewed and managed.
Managing an alert
Administrators can manage the following alert properties:
Status
Classification
Determination
Assigned To
Details snippet in JSON:
"category": "Execution",
"status": "resolved",
"severity": "informational",
"classification": "falsePositive",
"determination": "malware",
"serviceSource": "microsoftDefenderForEndpoint",
"detectionSource": "microsoftDefenderForEndpoint",
"createdDateTime": "2025-05-06T14:13:19.0633333Z",
"lastUpdateDateTime": "2025-08-21T02:47:29.24Z",
"resolvedDateTime": "2025-08-21T02:47:29.17Z",
"firstActivityDateTime": "2025-05-06T14:06:51.7300174Z",
"lastActivityDateTime": "2025-05-06T21:45:13.6345713Z",
"deviceEvidence": {
...
},
"userEvidence": {
...
},
"productName": "Microsoft Defender for Endpoint",
"deviceDnsName": "windows-endpoint",
"deviceTags": [
...
],
"userAccountName": "defender-admin",
"userSid": "..."
Device Actions
Related device model: device/mssecurity/Machine
Automate provides an View Devices list view showing such headings as the Last IP Address, Health Status, Exposure Level and Device at a hierarchy (Located At), and allows for the examination of the Details of a device.
Automate provides an interface to carry out bulk actions on devices. For Target Defender Devices, the Available and Selected transfer boxes are available to select devices accessible from a hierarchy to carry out operations in bulk:
The relation/MachineAction model is available to allow for the execution of Cancel action. (This action sends a request to device/mssecurity/MachineActionCancel.)
Related Topics
A view to make changes to different kinds of models within Defender for Endpoint
| Title | Description | Details | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Device Filter | Select the type of Defender for Endpoint device to list below for selection to bulk update. Default: All |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Operation * | Default: Scan |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Comment | A comment to be added for this device action. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Machine SHA1 | SHA1 hash of the file to be quarantined. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Type | Select the type of scan to perform. Default: Full |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Isolation Type | Select the type of isolation to perform. Default: Full |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Target Defender Devices | List of Defender for Endpoint devices that will be updated. |
|
|||||||||||||||||||||||||||||||||||||||||||||||