Configure automatic attack disruption capabilities in Microsoft Defender XDR
Note
Want to experience Microsoft Defender XDR? Learn more about how you can evaluate and pilot Microsoft Defender XDR.
Microsoft Defender XDR includes powerful automated attack disruption capabilities that can protect your environment from sophisticated, high-impact attacks.
This article describes how to configure automatic attack disruption capabilities in Microsoft Defender XDR with these steps:
- Review the prerequisites.
- Review or change the automation level for device groups.
- Review or change the automated response exclusions for users.
Then, after you're all set up, you can view and manage containment actions in Incidents and the Action center. And, if necessary, you can make changes to settings.
Prerequisites for automatic attack disruption in Microsoft Defender XDR
Requirement | Details |
---|---|
Subscription requirements | One of these subscriptions:
|
Deployment requirements |
|
Permissions | To configure automatic attack disruption capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (https://portal.azure.com) or in the Microsoft 365 admin center (https://admin.microsoft.com):
|
Review or change the automation level for device groups
Whether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings, like your organization's device group policies. Review the configured automation level for your device group policies. You must be a global administrator or security administrator to perform the following procedure:
Go to the Microsoft Defender portal (https://security.microsoft.com) and sign in.
Go to Settings > Endpoints > Device groups under Permissions.
Review your device group policies. Look at the Automation level column. We recommend using Full - remediate threats automatically. You might need to create or edit your device groups to get the level of automation you want. To exclude a device group from automated containment, set its automation level to no automated response. Note that this is not highly recommended and should only be done for a limited number of devices.
Review or change automated response exclusions for users
Automatic attack disruption enables the exclusion of specific user accounts from automated containment actions. Excluded users won't be affected by automated actions triggered by attack disruption. You must be a global administrator or security administrator to perform the following procedure:
Go to the Microsoft Defender portal (https://security.microsoft.com) and sign in.
Go to Settings > Identities > Automated response exclusions. Check the user list to exclude accounts.
Excluding user accounts is not recommended, and accounts added to this list won't be suspended in all supported attack types like business email compromise (BEC) and human-operated ransomware.
Next steps
See also
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.
Feedback
Submit and view feedback for