With Microsoft Defender for Endpoint, when an automated investigation runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
(NEW!) Unified investigation page
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across Microsoft Defender for Endpoint and Microsoft Defender for Office 365.
The improved Action center brings together remediation actions across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
Open an investigation from an incident details page
Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
In the navigation pane, choose Incidents & alerts > Incidents.
Select an item in the list, and then choose Open incident page.
Select the Investigations tab, and then select an investigation in the list. Its flyout pane opens.
Select Open investigation page.
Investigation details
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
In the Investigation details view, you can see information on the Investigation graph, Alerts, Devices, Identities, Key findings, Entities, Log, and Pending actions tabs, described in the following table.
Note
The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a Mailboxes tab.
Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
Tab
Description
Investigation graph
Provides a visual representation of the investigation. Depicts entities and lists threats found, along with alerts and whether any actions are awaiting approval.
You can select an item on the graph to view more details. For example, selecting the Evidence icon takes you to the Evidence tab, where you can see detected entities and their verdicts.
Alerts
Lists alerts associated with the investigation. Alerts can come from threat protection features on a user's device, in Office apps, Defender for Cloud Apps, and other Microsoft Defender XDR features.
Devices
Lists devices included in the investigation along with their remediation level. (Remediation levels correspond to the automation level for device groups.)
Mailboxes
Lists mailboxes that are impacted by detected threats.
Users
Lists user accounts that are impacted by detected threats.
Evidence
Lists pieces of evidence raised by alerts/investigations. Includes verdicts (Malicious, Suspicious, or No threats found) and remediation status.
Entities
Provides details about each analyzed entity, including a verdict for each entity type (Malicious, Suspicious, or No threats found).
Log
Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.
The following table lists investigation states and what they indicate.
Investigation state
Definition
Benign
Artifacts were investigated and a determination was made that no threats were found.
PendingResource
An automated investigation is paused because either a remediation action is pending approval, or the device on which an artifact was found is temporarily unavailable.
UnsupportedAlertType
An automated investigation is not available for this type of alert. Further investigation can be done manually, by using advanced hunting.
Failed
At least one investigation analyzer ran into a problem where it couldn't complete the investigation. If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded.
Successfully remediated
An automated investigation completed, and all remediation actions were completed or approved.
To provide more context about how investigation states show up, the following table lists alerts and their corresponding automated investigation state. This table is included as an example of what a security operations team might see in the Microsoft Defender portal.
Alert name
Severity
Investigation state
Status
Category
Malware was detected in a wim disk image file
Informational
Benign
Resolved
Malware
Malware was detected in a rar archive file
Informational
PendingResource
New
Malware
Malware was detected in a rar archive file
Informational
UnsupportedAlertType
New
Malware
Malware was detected in a rar archive file
Informational
UnsupportedAlertType
New
Malware
Malware was detected in a rar archive file
Informational
UnsupportedAlertType
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Wpakill hacktool was prevented
Low
Failed
New
Malware
GendowsBatch hacktool was prevented
Low
Failed
New
Malware
Keygen hacktool was prevented
Low
Failed
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Malware was detected in a rar archive file
Informational
PendingResource
New
Malware
Malware was detected in a rar archive file
Informational
PendingResource
New
Malware
Malware was detected in a zip archive file
Informational
PendingResource
New
Malware
Malware was detected in a rar archive file
Informational
PendingResource
New
Malware
Malware was detected in a rar archive file
Informational
PendingResource
New
Malware
Malware was detected in an iso disc image file
Informational
PendingResource
New
Malware
Malware was detected in an iso disc image file
Informational
PendingResource
New
Malware
Malware was detected in a pst outlook data file
Informational
UnsupportedAlertType
New
Malware
Malware was detected in a pst outlook data file
Informational
UnsupportedAlertType
New
Malware
MediaGet detected
Medium
PartiallyInvestigated
New
Malware
TrojanEmailFile
Medium
SuccessfullyRemediated
Resolved
Malware
CustomEnterpriseBlock malware was prevented
Informational
SuccessfullyRemediated
Resolved
Malware
An active CustomEnterpriseBlock malware was blocked
Low
SuccessfullyRemediated
Resolved
Malware
An active CustomEnterpriseBlock malware was blocked
Low
SuccessfullyRemediated
Resolved
Malware
An active CustomEnterpriseBlock malware was blocked
Low
SuccessfullyRemediated
Resolved
Malware
TrojanEmailFile
Medium
Benign
Resolved
Malware
CustomEnterpriseBlock malware was prevented
Informational
UnsupportedAlertType
New
Malware
CustomEnterpriseBlock malware was prevented
Informational
SuccessfullyRemediated
Resolved
Malware
TrojanEmailFile
Medium
SuccessfullyRemediated
Resolved
Malware
TrojanEmailFile
Medium
Benign
Resolved
Malware
An active CustomEnterpriseBlock malware was blocked