Perform device investigations in Microsoft Defender for Endpoint
Introduction
Microsoft Defender for Endpoint provides detailed device information, including forensics information.
You are a Security Operations Analyst working at a company that has implemented Microsoft Defender for Endpoint, and your primary job is to remediate incidents. You are assigned an incident with alerts related to a suspicious PowerShell command line. You start by reviewing the incident and understand all the related alerts, devices, and evidence. You open the alert page to review the Alert Story and decide to perform further analysis on the device.
You open the Device page to provide more context to the incident. The overview tab on the Device page immediately provides concerning information such as the Risk level and Exposure level. You select the Alerts tab to see a history of alerts for the device. Next, you choose the Timeline tab to see a list of events from the device. You see many suspicious events.
Use the device inventory list
Risk level
Exposure level
- The device stopped reporting for more than 30 days – in that case, it is considered inactive, and the exposure isn't computed
- The device OS is not supported - see minimum requirements for Microsoft Defender for Endpoint
- The device has a stale agent (unlikely)
Health state
- Active – Devices that are actively reporting sensor data to the service.
- Inactive – Devices that have stopped sending signals for more than seven days.
- Misconfigured – Devices that have impaired communications with service or are unable to send sensor data.
Antivirus status
- Disabled - Virus & threat protection is turned off.
- Not reporting - Virus & threat protection is not reporting.
- Not updated - Virus & threat protection is not up to date.
Komentar
Posting Komentar