An integrated threat protection solution designed to detect, investigate, and respond to cyber threats across Microsoft 365 services.
Hi,
I'm Ajibola, an Independent Consultant here and a Microsoft user like you. I don't work for Microsoft and cannot access any of your data on their system.
Yes, with Microsoft Defender for Endpoint and Intune, you can view the details of actions that were blocked on an endpoint in the Microsoft Defender Security Center (formerly known as the Defender Admin portal). Here's how you can access this information:
- Sign in to the Microsoft Defender Security Center (https://securitycenter.windows.com) using your Microsoft 365 admin credentials.
- In the left-hand navigation pane, click on "Incidents."
- In the "Incidents" page, you will see a list of security incidents. Look for incidents with "Blocked" actions. Click on the incident you want to investigate further.
- In the incident details page, you can see a timeline of events related to the blocked action. This timeline will show you the sequence of events leading up to the block, including the actions that were blocked.
- Click on the specific blocked action to get more details. You will see information such as the threat name, threat severity, threat ID, and the process or file that was blocked.
- To get even more details about the blocked action, click on the "Investigate" button at the top right corner of the page. This will take you to the Microsoft Defender for Endpoint portal, where you can access more advanced investigation and response capabilities.
Keep in mind that the level of detail available in the Microsoft Defender Security Center may vary depending on your organization's security settings and the specific features and capabilities enabled for your Defender for Endpoint and Intune deployments.
By investigating these blocked actions, you can identify potential threats and take appropriate actions to ensure the security of your endpoints and data. If you need further assistance, Microsoft support can provide more in-depth guidance based on your specific environment and configuration.
Kind regards Ajibola