Configure automated investigation and response capabilities in Microsoft 365 Defender
Note
Want to experience Microsoft 365 Defender? Learn more about how you can evaluate and pilot Microsoft 365 Defender.
Microsoft 365 Defender includes powerful automated investigation and response capabilities that can save your security operations team much time and effort. With self-healing, these capabilities mimic the steps a security analyst would take to investigate and respond to threats, only faster, and with more ability to scale.
This article describes how to configure automated investigation and response in Microsoft 365 Defender with these steps:
- Review the prerequisites.
- Review or change the automation level for device groups.
- Review your security and alert policies in Office 365.
Then, after you're all set up, you can view and manage remediation actions in the Action center. And, if necessary, you can make changes to automated investigation settings.
Prerequisites for automated investigation and response in Microsoft 365 Defender
Requirement | Details |
---|---|
Subscription requirements | One of these subscriptions:
|
Network requirements | |
Windows device requirements |
|
Protection for email content and Office files |
|
Permissions | To configure automated investigation and response capabilities, you must have one of the following roles assigned in either Azure Active Directory (https://portal.azure.com) or in the Microsoft 365 admin center (https://admin.microsoft.com):
|
Review or change the automation level for device groups
Whether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings, such as your organization's device group policies. Review the configured automation level for your device group policies. You must be a global administrator or security administrator to perform the following procedure:
Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
Go to Settings > Endpoints > Device groups under Permissions.
Review your device group policies. In particular, look at the Automation level column. We recommend using Full - remediate threats automatically. You might need to create or edit your device groups to get the level of automation you want. To get help with this task, see the following articles:
Review your security and alert policies in Office 365
Microsoft provides built-in alert policies that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger automated investigation and response in Office 365. Make sure your Defender for Office 365 features are configured correctly.
Although certain alerts and security policies can trigger automated investigations, no remediation actions are taken automatically for email and content. Instead, all remediation actions for email and email content await approval by your security operations team in the Action center.
Security settings in Office 365 help protect email and content. To view or change these settings, follow the guidance in Protect against threats.
In the Microsoft 365 Defender portal, go to Policies & Rules > Threat policies.
Make sure all of the following policies are configured. To get help and recommendations, see Protect against threats.
Make sure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is turned on.
Make sure Zero-hour auto purge (ZAP) in Exchange Online is in effect.
(This step is optional.) Review your Office 365 alert policies in the Microsoft Purview compliance portal (https://compliance.microsoft.com/compliancepolicies). Several default alert policies are in the Threat management category. Some of these alerts can trigger automated investigation and response. To learn more, see Default alert policies.
Need to make changes to automated investigation settings?
You can choose from several options to change settings for your automated investigation and response capabilities. Some options are listed in the following table:
To do this | Follow these steps |
---|---|
Specify automation levels for groups of devices |
|
Next steps
Feedback
Submit and view feedback for