[Index]
MICROSOFT
Overview
Automate provides support for Microsoft Defender for Endpoint, which addresses user devices (laptops, phones, tablets, PCs) and network devices (access points, routers, firewalls).
Note
Microsoft Defender for Endpoint dashboards
The admin GUI provides dashboards for viewing and managing Microsoft Defender for Endpoint data:
Security Management - Defender for Endpoint Overview Security Management - Defender for Endpoint Actions
The Microsoft Defender for Endpoint dashboards display default counters for data totals, and quick actions for viewing and managing this data:
Defender for Endpoint Overview dashboard
Displays counters, charts, and tables showing total count details for alerts and devices visible from the admin's hierarchy. For example, the total number of alerts under investigation, active alerts, high severity alerts, devices, unhealthy devices, and high risk devices. This dashboard also displays data showing percentage secure score trends, daily alerts trend, alert severity metrics, a count of devices per platform, a count of devices by device group, and alerts and devices.
Defender for Endpoint Actions dashboard displays:
Quick actions on this dashboard allow you to:
Customizing Microsoft Defender for Endpoint dashboards
The system allows you to customize dashboards:
Incident and Alert Actions
This panel provides access to quick actions for Microsoft Defender incidents and alerts.
Go to Defender for Endpoint Actions.
Click View Incidents.
View the summary list of incidents, providing the following details for each incident:
Click on an incident in the list view for further details, including, for example, the Incident Web URL at security.microsoft.com.
Details example in JSON:
{
"id": "5",
"tenantId": "f372af60-59d5-4e03-a849-9e46a432aac0",
"status": "redirected",
"incidentWebUrl": "https://security.microsoft.com/incident2/5/overview?tid=...",
"redirectIncidentId": "1",
"displayName": "[Test Alert] Suspicious Powershell commandline",
"createdDateTime": "2025-05-07T13:12:59.9233333Z",
"lastUpdateDateTime": "2025-05-07T13:13:12.24Z",
"classification": "unknown",
"determination": "unknown",
"severity": "informational",
"customTags": [],
"systemTags": [],
"lastModifiedBy": "Microsoft 365 Defender-AlertCorrelation",
"comments": []
}
Go to Defender for Endpoint Actions.
Click View Alerts.
View the summary list of alerts, providing the following details for each incident:
Click on an alert to view and manage the alert instance. The following alert properties can be managed:
Details example (JSON):
"category": "Execution",
"status": "resolved",
"severity": "informational",
"classification": "falsePositive",
"determination": "malware",
"serviceSource": "microsoftDefenderForEndpoint",
"detectionSource": "microsoftDefenderForEndpoint",
"createdDateTime": "2025-05-06T14:13:19.0633333Z",
"lastUpdateDateTime": "2025-08-21T02:47:29.24Z",
"resolvedDateTime": "2025-08-21T02:47:29.17Z",
"firstActivityDateTime": "2025-05-06T14:06:51.7300174Z",
"lastActivityDateTime": "2025-05-06T21:45:13.6345713Z",
"deviceEvidence": {
...
},
"userEvidence": {
...
},
"productName": "Microsoft Defender for Endpoint",
"deviceDnsName": "windows-endpoint",
"deviceTags": [
...
],
"userAccountName": "defender-admin",
"userSid": "..."
Device Actions
This panel provides access to quick actions for Microsoft Defender devices.
The Microsoft Defender View Devices list view displays device details, including the device's Last IP Address, Health Status, Exposure Level, and the device located at hierarchy.
The relation/MachineAction model is available to allow for the execution of Cancel action. (This action sends a request to device/mssecurity/MachineActionCancel.)
Automate provides several interfaces to perform bulk actions on one or more devices:
Initiate scan on devices
Manage isolation of devices
Offboard devices
Manage code execution on devices
Collect investigation from devices
Stop and quarantine file on devices
Related topics
| Title | Description | Details | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Id |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Tenant ID |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Incident Web URL |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Redirect Incident ID |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Display Name |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Created DateTime |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Last Update DateTime |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned To |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Classification |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Determination |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Severity |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Custom Tags |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| System Tags |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Description |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Last Modified By |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Resolving Comment |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Summary |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Comments |
|
||||||||||||||||||||||||||||||||||||||||||||||||