Review remediation actions in the Action center
As threats are detected, remediation actions come into play. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval. Examples of remediation actions include sending a file to quarantine, stopping a process from running, and removing a scheduled task. All remediation actions are tracked in the Action center.
This article describes:
How to use the Action center
Go to the Microsoft 365 Defender portal (https://security.microsoft.com), and sign in.
In the navigation pane, choose Action center.
Select the Pending tab to view and approve (or reject) any pending actions. Such actions can arise from antivirus/antimalware protection, automated investigations, manual response activities, or live response sessions.
Select the History tab to view a list of completed actions.
Microsoft Defender for Business includes several remediation actions. These actions include manual response actions, actions following automated investigation, and live response actions.
The following table lists remediation actions that are available:
|Automated investigations||- Quarantine a file
- Remove a registry key
- Kill a process
- Stop a service
- Disable a driver
- Remove a scheduled task
|Manual response actions||- Run antivirus scan
- Isolate device
- Stop and quarantine
- Add an indicator to block or allow a file
|Live response||- Collect forensic data
- Analyze a file
- Run a script
- Send a suspicious entity to Microsoft for analysis
- Remediate a file
- Proactively hunt for threats
Submit and view feedback for