Threat protection features in Microsoft Defender XDR can result in certain remediation actions. Here are some examples:
Automated investigations can result in remediation actions that are taken automatically or await your approval.
Antivirus, antimalware, and other threat protection features can result in remediation actions, such as blocking a file, URL, or process, or sending an artifact to quarantine.
Your security operations team can take remediation actions manually, such as during advanced hunting or while investigating alerts or incidents.
In the Microsoft Defender portal (https://security.microsoft.com), in the Automated investigation & response card, select Approve in Action Center.
Review pending actions in the Action center
It's important to approve (or reject) pending actions as soon as possible so that your automated investigations can proceed and complete in a timely manner.
You now have more options to review and approve/reject a remediation action. In addition to using the Action center, you can also approve or reject a remediation action while reviewing an incident. For more information, see Approve or reject remediation actions.
Undo completed actions
If you've determined that a device or a file is not a threat, you can undo remediation actions that were taken, whether those actions were taken automatically or manually. In the Action center, on the History tab, you can undo any of the following actions:
- Isolate device - Contain device - Contain user - Restrict code execution - Quarantine a file - Remove a registry key - Stop a service - Disable a driver - Remove a scheduled task