How automated investigation and response works in Microsoft Defender for Office 365 - Microsoft Defender for Office 365 (2024)

  • Article
  • Applies to:
    Microsoft Defender for Office 365 Plan 2, ✅ Microsoft Defender XDR

Tip

Did you know you can try the features in Microsoft Defender XDR for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft Defender portal trials hub. Learn about who can sign up and trial terms on Try Microsoft Defender for Office 365.

As security alerts are triggered, it's up to your security operations team to look into those alerts and take steps to protect your organization. Sometimes, security operations teams can feel overwhelmed by the volume of alerts that are triggered. Automated investigation and response (AIR) capabilities in Microsoft Defender for Office 365 can help.

AIR enables your security operations team to operate more efficiently and effectively. AIR capabilities include automated investigation processes in response to well-known threats that exist today. Appropriate remediation actions await approval, enabling your security operations team to respond to detected threats.

This article describes how AIR works through several examples. When you're ready to get started using AIR, see Automatically investigate and respond to threats.

  • Example 1: A user-reported phish message launches an investigation playbook
  • Example 2: A security administrator triggers an investigation from Threat Explorer
  • Example 3: A security operations team integrates AIR with their SIEM using the Office 365 Management Activity API

Example: A user-reported phish message launches an investigation playbook

Suppose that a user in your organization receives an email that they think is a phishing attempt. The user, trained to report such messages, uses the Microsoft Report Message or Report Phishing add-ins to send it to Microsoft for analysis. The submission is also sent to your system and is visible in Explorer in the Submissions view (formerly referred to as the User-reported view). In addition, the user-reported message now triggers a system-based informational alert, which automatically launches the investigation playbook.

During the root investigation phase, various aspects of the email are assessed. These aspects include:

  • A determination about what type of threat it might be;
  • Who sent it;
  • Where the email was sent from (sending infrastructure);
  • Whether other instances of the email were delivered or blocked;
  • An assessment from our analysts;
  • Whether the email is associated with any known campaigns;
  • and more.

After the root investigation is complete, the playbook provides a list of recommended actions to take on the original email and the entities associated with it (for example, files, URLs, and recipients).

Next, several threat investigation and hunting steps are executed:

  • Similar email messages are identified via email cluster searches.
  • The signal is shared with other platforms, such as Microsoft Defender for Endpoint.
  • A determination is made on whether any users have clicked through any malicious links in suspicious email messages.
  • A check is done across Exchange Online Protection (EOP) and Microsoft Defender for Office 365 to see if there are any other similar messages reported by users.
  • A check is done to see if a user has been compromised. This check leverages signals across Office 365, Microsoft Defender for Cloud Apps, and Microsoft Entra ID, correlating any related user activity anomalies.

During the hunting phase, risks and threats are assigned to various hunting steps.

Remediation is the final phase of the playbook. During this phase, remediation steps are taken, based on the investigation and hunting phases.

Example: A security administrator triggers an investigation from Threat Explorer

In addition to automated investigations that are triggered by an alert, your organization's security operations team can trigger an automated investigation from a view in Threat Explorer. This investigation also creates an alert, so Microsoft Defender XDR incidents and external SIEM tools can see that this investigation was triggered.

For example, suppose that you are using the Malware view in Explorer. Using the tabs below the chart, you select the Email tab. If you select one or more items in the list, the + Actions button activates.

Using the Actions menu, you can select Trigger investigation.

Similar to playbooks triggered by an alert, automatic investigations that are triggered from a view in Explorer include a root investigation, steps to identify and correlate threats, and recommended actions to mitigate those threats.

Example: A security operations team integrates AIR with their SIEM using the Office 365 Management Activity API

AIR capabilities in Microsoft Defender for Office 365 include that security operations teams can use to monitor and address threats. But you can also integrate AIR capabilities with other solutions. Examples include a security information and event management (SIEM) system, a case management system, or a custom reporting solution. These kinds of integrations can be done by using the Office 365 Management Activity API.

For example, recently, an organization set up a way for their security operations team to view user-reported phish alerts that were already processed by AIR. Their solution integrates relevant alerts with the organization's SIEM server and their case-management system. The solution greatly reduces the number of false positives so that their security operations team can focus their time and effort on real threats. To learn more about this custom solution, see Tech Community blog: Improve the Effectiveness of your SOC with Microsoft Defender for Office 365 and the O365 Management API.

Next steps

  • Get started using AIR
  • View pending or completed remediation actions
How automated investigation and response works in Microsoft Defender for Office 365 - Microsoft Defender for Office 365 (2024)
Top Articles
Testing for Specific Versions of TLS Protocols Using curl
Audit reporting: The 4 types of audit opinions & reports
Spectrum Gdvr-2007
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Truist Bank Near Here
Winston Salem Nc Craigslist
South Park Season 26 Kisscartoon
Apex Rank Leaderboard
Computer Repair Tryon North Carolina
Lichtsignale | Spur H0 | Sortiment | Viessmann Modelltechnik GmbH
Ogeechee Tech Blackboard
A.e.a.o.n.m.s
12 Best Craigslist Apps for Android and iOS (2024)
Caroline Cps.powerschool.com
Synq3 Reviews
Indiana Immediate Care.webpay.md
Nutrislice Menus
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
Lonesome Valley Barber
Gentle Dental Northpointe
north jersey garage & moving sales - craigslist
Craigslist Maryland Trucks - By Owner
How to Make Ghee - How We Flourish
Sherburne Refuge Bulldogs
Powerschool Mcvsd
Gilchrist Verband - Lumedis - Ihre Schulterspezialisten
Page 2383 – Christianity Today
Watson 853 White Oval
Netspend Ssi Deposit Dates For 2022 November
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Evil Dead Rise Ending Explained
Tomb Of The Mask Unblocked Games World
My Dog Ate A 5Mg Flexeril
Ucm Black Board
Opsahl Kostel Funeral Home & Crematory Yankton
What Is Xfinity and How Is It Different from Comcast?
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Reli Stocktwits
Msnl Seeds
Bones And All Showtimes Near Johnstown Movieplex
Cranston Sewer Tax
Tableaux, mobilier et objets d'art
FedEx Authorized ShipCenter - Edouard Pack And Ship at Cape Coral, FL - 2301 Del Prado Blvd Ste 690 33990
Ucla Basketball Bruinzone
Tlc Africa Deaths 2021
Identogo Manahawkin
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Who Is Nina Yankovic? Daughter of Musician Weird Al Yankovic
Superecchll
What Is The Gcf Of 44J5K4 And 121J2K6
Vrca File Converter
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5732

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.