[Index]

Model: device/mssecurity/Machine

Incidents

Full HTML Help

MICROSOFT

Overview

Automate provides support for Microsoft Defender for Endpoint, which addresses user devices (laptops, phones, tablets, PCs) and network devices (access points, routers, firewalls).

Note

Microsoft Defender for Endpoint dashboards

The admin GUI provides dashboards for viewing and managing Microsoft Defender for Endpoint data:

Security Management - Defender for Endpoint Overview Security Management - Defender for Endpoint Actions

The Microsoft Defender for Endpoint dashboards display default counters for data totals, and quick actions for viewing and managing this data:

Customizing Microsoft Defender for Endpoint dashboards

The system allows you to customize dashboards:

Incident and Alert Actions

This panel provides access to quick actions for Microsoft Defender incidents and alerts.

View incidents

  1. Go to Defender for Endpoint Actions.

  2. Click View Incidents.

  3. View the summary list of incidents, providing the following details for each incident:

    • Display name
    • Status
    • Severity
    • Created date time
    • Last update date time
    • Located at (hierarchy)
  4. Click on an incident in the list view for further details, including, for example, the Incident Web URL at security.microsoft.com.

    Details example in JSON:

    {
        "id": "5",
        "tenantId": "f372af60-59d5-4e03-a849-9e46a432aac0",
        "status": "redirected",
        "incidentWebUrl": "https://security.microsoft.com/incident2/5/overview?tid=...",
        "redirectIncidentId": "1",
        "displayName": "[Test Alert] Suspicious Powershell commandline",
        "createdDateTime": "2025-05-07T13:12:59.9233333Z",
        "lastUpdateDateTime": "2025-05-07T13:13:12.24Z",
        "classification": "unknown",
        "determination": "unknown",
        "severity": "informational",
        "customTags": [],
        "systemTags": [],
        "lastModifiedBy": "Microsoft 365 Defender-AlertCorrelation",
        "comments": []
    }
    

View alerts

  1. Go to Defender for Endpoint Actions.

  2. Click View Alerts.

  3. View the summary list of alerts, providing the following details for each incident:

    • Title
    • Device tags
    • Severity
    • Status
    • Category
    • Detection source
    • Created date time
    • Last update date time
    • Classification
    • Determination
    • Assigned to
    • Description
    • Located at (hierarchy)
  4. Click on an alert to view and manage the alert instance. The following alert properties can be managed:

    • Status
    • Classification
    • Determination
    • Assigned to

    Details example (JSON):

    "category": "Execution",
    "status": "resolved",
    "severity": "informational",
    "classification": "falsePositive",
    "determination": "malware",
    "serviceSource": "microsoftDefenderForEndpoint",
    "detectionSource": "microsoftDefenderForEndpoint",
    "createdDateTime": "2025-05-06T14:13:19.0633333Z",
    "lastUpdateDateTime": "2025-08-21T02:47:29.24Z",
    "resolvedDateTime": "2025-08-21T02:47:29.17Z",
    "firstActivityDateTime": "2025-05-06T14:06:51.7300174Z",
    "lastActivityDateTime": "2025-05-06T21:45:13.6345713Z",
    "deviceEvidence": {
    ...
    },
    "userEvidence": {
    ...
    },
    "productName": "Microsoft Defender for Endpoint",
    "deviceDnsName": "windows-endpoint",
    "deviceTags": [
    ...
    ],
    "userAccountName": "defender-admin",
    "userSid": "..."
    

Device Actions

This panel provides access to quick actions for Microsoft Defender devices.

View devices

The Microsoft Defender View Devices list view displays device details, including the device's Last IP Address, Health Status, Exposure Level, and the device located at hierarchy.

View and manage machine actions

The relation/MachineAction model is available to allow for the execution of Cancel action. (This action sends a request to device/mssecurity/MachineActionCancel.)

Bulk device actions

Automate provides several interfaces to perform bulk actions on one or more devices:

  1. Go to Defender for Endpoint Actions.
  2. Choose the relevant site.
  3. Choose a bulk action, either of the following:
    • Bulk Actions
    • Initiate scan on devices
    • Manage isolation of devices
    • Offboard devices
    • Manage code execution on devices
    • Collect investigation from devices
    • Stop and quarantine file on devices
  4. (Optional). Select a device filter (by operating system), either all, Windows, macOS, Linux, Android, or iOS.
  5. (Mandatory). Select an operation, either of the following: Scan, Isolate, Un-isolate, Offboard, Restrict code execution, Unrestrict code execution
  6. (Optional). Provide a comment to explain the action.
  7. (Optional). Select type, either Full or Quick.
  8. At Target Defender Devices transfer boxes, select relevant devices (one or more) from the Available field then click the single or double arrow to move these devices to the Selected field.
  9. Click Save.

Initiate scan on devices

Manage isolation of devices

Offboard devices

Manage code execution on devices

Collect investigation from devices

Stop and quarantine file on devices

Related topics

Model Details: device/mssecurity/Machine

Title Description Details
Machine ID machine identity
  • Field Name: id
  • Type: String
  • MaxLength: 1024
Computer DNS Name machine fully qualified name
  • Field Name: computerDnsName
  • Type: String
  • MaxLength: 1024
First Seen First date and time where the machine was observed by Microsoft Defender for Endpoint
  • Field Name: firstSeen
  • Type: String
  • MaxLength: 1024
  • Format: date-time
Last Seen Time and date of the last received full device report. A device typically sends a full report every 24 hours
  • Field Name: lastSeen
  • Type: String
  • MaxLength: 1024
  • Format: date-time
OS Platform Operating system platform
  • Field Name: osPlatform
  • Type: String
  • MaxLength: 1024
OS Version Operating system Version
  • Field Name: version
  • Type: String
  • MaxLength: 1024
OS Build Operating system build number
  • Field Name: osBuild
  • Type: ["Integer", "Null"]
Last IP Address Last IP on local NIC on the machine
  • Field Name: lastIpAddress
  • Type: String
  • MaxLength: 1024
Last External IP Address Last IP through which the machine accessed the internet
  • Field Name: lastExternalIpAddress
  • Type: String
  • MaxLength: 1024
Health Status machine health status
  • Field Name: healthStatus
  • Type: String
  • MaxLength: 1024
RBAC Group Name Machine group Name
  • Field Name: rbacGroupName
  • Type: String
  • MaxLength: 1024
RBAC Group ID Machine group ID
  • Field Name: rbacGroupId
  • Type: String
  • MaxLength: 1024
Risk Score Risk score as evaluated by Microsoft Defender for Endpoint
  • Field Name: riskScore
  • Type: ["String", "Null"]
AAD Device ID Microsoft Entra Device ID (when machine is Microsoft Entra joined)
  • Field Name: aadDeviceId
  • Type: ["String", "Null"]
Machine Tags Set of machine tags
  • Field Name: machineTags.[n]
  • Type: Array
Exposure Level Exposure level as evaluated by Microsoft Defender for Endpoint
  • Field Name: exposureLevel
  • Type: ["String", "Null"]
Device Value The value of the device
  • Field Name: deviceValue
  • Type: ["String", "Null"]
Onboarding Status Status of machine onboarding
  • Field Name: onboardingStatus
  • Type: String
  • MaxLength: 1024
OS Architecture Operating system architecture
  • Field Name: osArchitecture
  • Type: String
  • MaxLength: 1024
Managed By
  • Field Name: managedBy
  • Type: String
  • MaxLength: 1024
IP Addresses Set of IpAddress objects
  • Field Name: ipAddresses.[n]
  • Type: Array
IP Address
  • Field Name: ipAddresses.[n].ipAddress
  • Type: String
  • MaxLength: 1024
MAC Address
  • Field Name: ipAddresses.[n].macAddress
  • Type: ["String", "Null"]
Type
  • Field Name: ipAddresses.[n].type
  • Type: String
  • MaxLength: 1024
Operational Status
  • Field Name: ipAddresses.[n].operationalStatus
  • Type: String
  • MaxLength: 1024
VM Metadata
  • Field Name: vmMetadata
  • Type: Object
VM ID
  • Field Name: vmMetadata.vmId
  • Type: String
  • MaxLength: 1024
Cloud Provider
  • Field Name: vmMetadata.cloudProvider
  • Type: String
  • MaxLength: 1024
Resource ID
  • Field Name: vmMetadata.resourceId
  • Type: String
  • MaxLength: 1024
Subscription ID
  • Field Name: vmMetadata.subscriptionId
  • Type: String
  • MaxLength: 1024