Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint
Want to experience Defender for Endpoint? Sign up for a free trial.
If your organization is using Microsoft Defender for Endpoint (Defender for Endpoint), automated investigation and remediation capabilities can save your security operations team time and effort. As outlined in this blog post, these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. Learn more about automated investigation and remediation.
To configure automated investigation and remediation,
Turn on automated investigation and remediation
- As a global administrator or security administrator, go to the Microsoft Defender Security Center (https://securitycenter.windows.com) and sign in.
- In the navigation pane, choose Settings.
- In the General section, select Advanced features.
- Turn on both Automated Investigation and Automatically resolve alerts.
Set up device groups
- In the Microsoft Defender Security Center (https://securitycenter.windows.com), on the Settings page, under Permissions, select Device groups.
- Select + Add device group.
- Create at least one device group, as follows:
- Specify a name and description for the device group.
- In the Automation level list, select a level, such as Full – remediate threats automatically. The automation level determines whether remediation actions are taken automatically, or only upon approval. To learn more, see Automation levels in automated investigation and remediation.
- In the Members section, use one or more conditions to identify and include devices.
- On the User access tab, select the Azure Active Directory groups who should have access to the device group you're creating.
- Select Done when you're finished setting up your device group.
- Visit the Action Center to view pending and completed remediation actions
- Review and approve pending actions