[Index]
MICROSOFT
Overview
Automate provides support for Microsoft Defender for Endpoint, which addresses user devices (laptops, phones, tablets, PCs) and network devices (access points, routers, firewalls).
Note
Microsoft Defender for Endpoint dashboards
The admin GUI provides dashboards for viewing and managing Microsoft Defender for Endpoint data:
Security Management - Defender for Endpoint Overview Security Management - Defender for Endpoint Actions
The Microsoft Defender for Endpoint dashboards display default counters for data totals, and quick actions for viewing and managing this data:
Defender for Endpoint Overview dashboard
Displays counters, charts, and tables showing total count details for alerts and devices visible from the admin's hierarchy. For example, the total number of alerts under investigation, active alerts, high severity alerts, devices, unhealthy devices, and high risk devices. This dashboard also displays data showing percentage secure score trends, daily alerts trend, alert severity metrics, a count of devices per platform, a count of devices by device group, and alerts and devices.
Defender for Endpoint Actions dashboard displays:
Quick actions on this dashboard allow you to:
Customizing Microsoft Defender for Endpoint dashboards
The system allows you to customize dashboards:
Incident and Alert Actions
This panel provides access to quick actions for Microsoft Defender incidents and alerts.
Go to Defender for Endpoint Actions.
Click View Incidents.
View the summary list of incidents, providing the following details for each incident:
Click on an incident in the list view for further details, including, for example, the Incident Web URL at security.microsoft.com.
Details example in JSON:
{
"id": "5",
"tenantId": "f372af60-59d5-4e03-a849-9e46a432aac0",
"status": "redirected",
"incidentWebUrl": "https://security.microsoft.com/incident2/5/overview?tid=...",
"redirectIncidentId": "1",
"displayName": "[Test Alert] Suspicious Powershell commandline",
"createdDateTime": "2025-05-07T13:12:59.9233333Z",
"lastUpdateDateTime": "2025-05-07T13:13:12.24Z",
"classification": "unknown",
"determination": "unknown",
"severity": "informational",
"customTags": [],
"systemTags": [],
"lastModifiedBy": "Microsoft 365 Defender-AlertCorrelation",
"comments": []
}
Go to Defender for Endpoint Actions.
Click View Alerts.
View the summary list of alerts, providing the following details for each incident:
Click on an alert to view and manage the alert instance. The following alert properties can be managed:
Details example (JSON):
"category": "Execution",
"status": "resolved",
"severity": "informational",
"classification": "falsePositive",
"determination": "malware",
"serviceSource": "microsoftDefenderForEndpoint",
"detectionSource": "microsoftDefenderForEndpoint",
"createdDateTime": "2025-05-06T14:13:19.0633333Z",
"lastUpdateDateTime": "2025-08-21T02:47:29.24Z",
"resolvedDateTime": "2025-08-21T02:47:29.17Z",
"firstActivityDateTime": "2025-05-06T14:06:51.7300174Z",
"lastActivityDateTime": "2025-05-06T21:45:13.6345713Z",
"deviceEvidence": {
...
},
"userEvidence": {
...
},
"productName": "Microsoft Defender for Endpoint",
"deviceDnsName": "windows-endpoint",
"deviceTags": [
...
],
"userAccountName": "defender-admin",
"userSid": "..."
Device Actions
This panel provides access to quick actions for Microsoft Defender devices.
The Microsoft Defender View Devices list view displays device details, including the device's Last IP Address, Health Status, Exposure Level, and the device located at hierarchy.
The relation/MachineAction model is available to allow for the execution of Cancel action. (This action sends a request to device/mssecurity/MachineActionCancel.)
Automate provides several interfaces to perform bulk actions on one or more devices:
Initiate scan on devices
Manage isolation of devices
Offboard devices
Manage code execution on devices
Collect investigation from devices
Stop and quarantine file on devices
Related topics
| Title | Description | Details | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Machine ID | machine identity |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Computer DNS Name | machine fully qualified name |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| First Seen | First date and time where the machine was observed by Microsoft Defender for Endpoint |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Last Seen | Time and date of the last received full device report. A device typically sends a full report every 24 hours |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| OS Platform | Operating system platform |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| OS Version | Operating system Version |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| OS Build | Operating system build number |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Last IP Address | Last IP on local NIC on the machine |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Last External IP Address | Last IP through which the machine accessed the internet |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Health Status | machine health status |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| RBAC Group Name | Machine group Name |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| RBAC Group ID | Machine group ID |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Risk Score | Risk score as evaluated by Microsoft Defender for Endpoint |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| AAD Device ID | Microsoft Entra Device ID (when machine is Microsoft Entra joined) |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Machine Tags | Set of machine tags |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Exposure Level | Exposure level as evaluated by Microsoft Defender for Endpoint |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Device Value | The value of the device |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Onboarding Status | Status of machine onboarding |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| OS Architecture | Operating system architecture |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Managed By |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| IP Addresses | Set of IpAddress objects |
|
|||||||||||||||||||||||||||||||||||||||||||||||
| IP Address |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| MAC Address |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Type |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Operational Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| VM Metadata |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| VM ID |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Cloud Provider |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Resource ID |
|
||||||||||||||||||||||||||||||||||||||||||||||||
| Subscription ID |
|
||||||||||||||||||||||||||||||||||||||||||||||||