Skip to content

Latest commit

 

History

History
63 lines (44 loc) · 2.91 KB

mdb-review-remediation-actions.md

File metadata and controls

63 lines (44 loc) · 2.91 KB
title description search.appverid author ms.author manager audience ms.topic ms.service ms.localizationpriority ms.date ms.reviewer f1.keywords ms.collection
Review remediation actions in Microsoft Defender for Business
View remediations that were taken on detected threats or suspected attacks with Defender for Business.
MET150
siosulli
siosulli
deniseb
Admin
how-to
defender-business
medium
12/02/2022
efratka
NOCSH
SMB
m365-security
m365-initiative-defender-business
tier1

Review remediation actions in the Action center

As threats are detected, remediation actions come into play. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval. Examples of remediation actions include stopping a process from running or removing a scheduled task.

All remediation actions are tracked in the Action center.

:::image type="content" source="/defender/media/defender-business/mdb-actioncenter.png" alt-text="Screenshot of the Action center":::

This article describes:

How to use the Action center

  1. Go to the Microsoft Defender portal (https://security.microsoft.com) and sign in.

  2. In the navigation pane, choose Action center.

  3. Select the Pending tab to view and approve (or reject) any pending actions. Actions can arise from antivirus/antimalware protection, automated investigations, manual response activities, or live response sessions.

  4. Select the History tab to view a list of completed actions.

Remediation actions

Defender for Business includes several remediation actions. These actions include manual response actions, actions following automated investigation, and live response actions.

The following table lists remediation actions that are available.

Source Actions
Automatic attack disruption - Contain a device
- Contain a user
- Disable a user account
Automated investigations - Quarantine a file
- Remove a registry key
- Kill a process
- Stop a service
- Disable a driver
- Remove a scheduled task
Manual response actions - Run antivirus scan
- Isolate a device
- Add an indicator to block or allow a file
Live response - Collect forensic data
- Analyze a file
- Run a script
- Send a suspicious entity to Microsoft for analysis
- Remediate a file
- Proactively hunt for threats

Next steps