Microsoft Defender Investigation
Microsoft Defender Investigation playbook uses Microsoft Defender for Endpoint API to investigate a threat and returns the investigation details.
Trigger: It retrieves the IP Address and sys_id from the parent playbook to continue the investigation.
Script: It uses a Python script to calculate the present time and the time that is one month behind the present time.
API: It uses Microsoft Defender API to get the access token.
API: It uses Microsoft Defender API to get the Machine ID from the IP Address.
Script: It uses a Python script to extract values from the API's response.
Parameters: It sets the global parameter OS_Type.
If Then: It checks if the value of OS_Type is found. If found, it will continue the investigation. If not, it will get the global parameter.
If Then: It checks if the OS_Type is Mac OS. If it is, it will call API that fetches the alerts. If not, it will call API that starts an investigation.
Parameters: It sets the global parameter Status to Machine Not Found.
API: It uses Microsoft Defender API to start the threat investigation.
API: It uses Microsoft Defender API to extract all the machine alerts.
If Then: It checks if the alerts are found. If found, it filters the data. If not, It prepares investigation details.
Filter: It filters the machine alerts to remove some of the unrelated alerts.
Script: It runs a Python script to prepare an investigation detail.
Format: It formats the investigation details into a specific format.
API: It uses ServiceNow API to update machine information.
API: It uses ServiceNow API to update machine alerts.
API: It uses ServiceNow API to update AIR.
End: It ends the playbook, and returns OS_Type and Status.
Last updated
Was this helpful?