Configure & Manage Automation

 




Configure Advanced Features

The Advanced features area in the General Settings area provides an on/off switch for features within the product. The following are the settings that are automation focused:

Feature

Description

Automated Investigation

Enables the automation capabilities for investigation and response.

Enable EDR in block mode

When turned on, Microsoft Defender for Endpoint uses behavioral blocking and containment capabilities by blocking malicious artifacts or behaviors observed through post-breach Endpoint Detection and Response (EDR) capabilities.

Automatically resolve alerts

Resolves an alert if Automated investigation finds no threats or has successfully remediated all the malicious artifacts.

Allow or block file

Make sure that Windows Defender Antivirus is turned on and the cloud-based protection feature is enabled in your organization to use the allow or block file features.

 

Manage Automation Uploads

It enables the File Content Analysis capability so that certain files as well as email attachments can automatically be uploaded to the cloud for additional inspection in an Automated investigation while also helping in identifying the files and email attachments by specifying the file extension names as well as email attachment extension names. 

It can enable the Memory Content Analysis capability and the Microsoft Defender for Endpoint can automatically investigate the memory content of processes. When enabled, the memory content might be uploaded to the Microsoft Defender for Endpoint during an Automated investigation.

Manage automation folder exclusions

It let you to specify folders that the Automated investigation will skip as well as control the following attributes about the folder that you'd like to be skipped:

  • Folders- You can specify a folder and its sub-folders to be skipped.
  • Extensions- You can specify the extensions to exclude in a specific directory. The extensions are a way to prevent an attacker from using an excluded folder to hide an exploit and they explicitly defines which files to be ignored.
  • File names- You can specify the file names that you want to be excluded in a specific directory. The names are a way to prevent an attacker from using an excluded folder to hide an exploit and they explicitly defines which files to be ignored.

Block at Risk Devices

It is considered a threat if you do not let risky devices access your corporate resources through Conditional Access for which you will need a Microsoft Intune environment, with Intune managed and Azure AD joined Windows 10 devices. The required roles to access these portals and implement Conditional Access are:
  • Microsoft Defender Security Center- You will need to sign in to the portal with a global administrator role to turn on the integration. 
  • Intune- You will need to sign in to the portal with security administrator rights along with the management permissions. 
  • Azure AD portal- You will need to sign in as a global administrator, security administrator, or Conditional Access Administrator.











Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements