Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Pack.#
This Integration is part of the#
OverviewUse the Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) integration for preventative protection, post-breach detection, automated investigation, and response.
#
Microsoft Defender Advanced Threat Protection PlaybookMicrosoft Defender Advanced Threat Protection Get Machine Action Status
#
Use Cases- Fetching incidents.
- Managing machines and performing actions on them.
- Blocking files and applications.
- Uploading and digesting threat indicators for the actions of allow, block, or alert.
#
AuthenticationThere are two different authentication methods for self-deployed configuration:
- Client Credentials flow
- Authorization Code flow For more details about the authentication used in this integration, see Microsoft Integrations - Authentication.
Note: If you previously configured the Windows Defender ATP integration, you need to perform the authentication flow again for this integration and enter the authentication parameters you receive when configuring the integration instance.
Note: When using the Authorization Code Flow, please make sure the user you authenticate with has the required role permissions. See this as an example.
#
Required PermissionsPlease add the following permissions to the app registration. Choose application permissions for the Client Credentials flow, and delegated permissions for the Authorization Code flow.
- WindowsDefenderATP - AdvancedQuery.Read.All - Application / AdvancedQuery.Read - Delegated
- WindowsDefenderATP - Alert.ReadWrite.All - Application / Alert.ReadWrite - Delegated
- WindowsDefenderATP - File.Read.All - Application / Delegated
- WindowsDefenderATP - Ip.Read.All - Application / Delegated
- WindowsDefenderATP - Machine.CollectForensics - Application / Delegated
- WindowsDefenderATP - Machine.Isolate - Application / Delegated
- WindowsDefenderATP - Machine.ReadWrite.All - Application / Machine.ReadWrite - Delegated
- WindowsDefenderATP - Machine.RestrictExecution - Application / Delegated
- WindowsDefenderATP - Machine.Scan - Application / Delegated
- WindowsDefenderATP - Machine.StopAndQuarantine - Application / Delegated
- WindowsDefenderATP - ThreatIndicators.ReadWrite.OwnedBy - Application / Delegated. Please note - this permission is only used for the deprecated indicators command. If you are not using the deprecated indicators command, it is not required.
- WindowsDefenderATP - Url.Read.All - Application / Delegated
- WindowsDefenderATP - User.Read.All - Application / Delegated
- WindowsDefenderATP - Ti.ReadWrite (Read and write IOCs belonging to the app) - Application / Delegated
- WindowsDefenderATP - Vulnerability.Read.All - Application / Vulnerability.Read - Delegated
- WindowsDefenderATP - Software.Read.All - Application / Software.Read - Delegated
- WindowsDefenderATP - Machine.LiveResponse - Application / Delegated
- WindowsDefenderATP - Machine.Read.All - Application / Machine.Read - Delegated
#
Configure Microsoft Defender for Endpoint on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Microsoft Defender for Endpoint.
Click Add instance to create and configure a new integration instance.
Parameter Description Example Name A meaningful name for the integration instance. XXXXX Instance Alpha Endpoint Type The endpoint for accessing Microsoft Defender for Endpoint, see table below. Worldwide Fetches Incidents Whether to fetch the incidents. N/A Incident Type The type of incident to select. Phishing ID The ID used to gain access to the integration. Your Client/Application ID. N/A Token A piece of data that servers use to verify for authenticity. This is your Tenant ID. eea810f5-a6f6 Key Your client secret. Certificate Thumbprint Used for certificate authentication. As appears in the "Certificates & secrets" page of the app. A97BF50B7BB6D909CE8CAAF9FA8109A571134C33 Private Key Used for certificate authentication. The private key of the registered certificate. eea810f5-a6f6 Authentication Type Type of authentication - either Authorization Code (recommended) or Client Credentials. Application redirect URI (for authorization code mode) False Authorization code for user-auth mode - received from the authorization step. see Detailed Instructions section False Azure Managed Identities Client ID The Managed Identities client ID for authentication - relevant only if the integration is running on Azure VM. UUID Status for fetching alerts as incidents The property values are, "New", "InProgress" or "Resolved". Comma-separated lists are supported, e.g., New,Resolved. New,In Progress,Resolved DetecitonSource to filter out alters for fetching as incidents. The property values are, "Antivirus", "CustomDetection", "CustomTI", "EDR" and "MDO". Comma-separated lists are supported, e.g., Antivirus,EDR. CustomDetection,EDR Severity for fetching alerts as incidents The property values are, "Informational", "Low", "Medium" and "High". Comma-separated lists are supported, e.g., Medium,High. Medium,High Maximum number of incidents to fetch The maximum number of incidents to retrieve per fetch. 50 Trust any Certificate (Not Secure) When selected, certificates are not checked. N/A Fetch alert evidence When selected, fetches alerts in Microsoft Defender. N/A Use system proxy settings Runs the integration instance using the proxy server (HTTP or HTTPS) that you defined in the server configuration. https://proxyserver.com Use a self-deployed Azure Application For authorization code flow, mark this as true. N/A First Fetch Timestamp The first timestamp to be fetched in the format \<number> \<time unit>. 12 hours, 7 days Server URL The URL to the Microsoft Defender for Endpoint server, including the scheme, see note below. https://api.securitycenter.windows.com
Endpoint Type options
Endpoint Type Description Worldwide The publicly accessible Microsoft Defender for Endpoint EU Geo Proximity Microsoft Defender for Endpoint Geo proximity end point for the UK customers. UK Geo Proximity Microsoft Defender for Endpoint Geo proximity end point for the UK customers. US Geo Proximity Microsoft Defender for Endpoint Geo proximity end point for the US customers. US GCC Microsoft Defender for Endpoint for the USA Government Cloud Community (GCC) US GCC-High Microsoft Defender for Endpoint for the USA Government Cloud Community High (GCC-High) DoD Microsoft Defender for Endpoint for the USA Department of Defence (DoD) Custom Custom endpoint configuration to the Microsoft Defender for Endpoint, please see note below. - Note: In most cases setting Endpoint type is preferred to setting Server URL, only use it cases where a custom URL is required for accessing a national cloud or for cases of self-deployment.
Click Test to validate the URLs, token, and connection.
#
Fetched Incidents Data- id
- incidentId
- investigationId
- assignedTo
- severity
- status
- classification
- determination
- investigationState
- detectionSource
- category
- threatFamilyName
- title
- description
- alertCreationTime
- firstEventTime
- lastEventTime
- lastUpdateTime
- resolvedTime
- machineId
- computerDnsName
- aadTenantId
- relatedUser
- comments
- evidence
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- microsoft-atp-isolate-machine
- microsoft-atp-unisolate-machine
- microsoft-atp-get-machines
- microsoft-atp-get-file-related-machines
- microsoft-atp-get-machine-details
- microsoft-atp-run-antivirus-scan
- microsoft-atp-list-alerts
- microsoft-atp-update-alert
- microsoft-atp-advanced-hunting
- microsoft-atp-create-alert
- microsoft-atp-get-alert-related-user
- microsoft-atp-get-alert-related-files
- microsoft-atp-get-alert-related-ips
- microsoft-atp-get-alert-related-domains
- microsoft-atp-list-machine-actions-details
- microsoft-atp-collect-investigation-package
- microsoft-atp-get-investigation-package-sas-uri
- microsoft-atp-restrict-app-execution
- microsoft-atp-remove-app-restriction
- microsoft-atp-stop-and-quarantine-file
- microsoft-atp-list-investigations
- microsoft-atp-start-investigation
- microsoft-atp-get-domain-statistics
- microsoft-atp-get-domain-alerts
- microsoft-atp-get-domain-machines
- microsoft-atp-get-file-statistics
- microsoft-atp-get-file-alerts
- microsoft-atp-get-ip-statistics
- microsoft-atp-get-ip-alerts
- microsoft-atp-get-user-alerts
- microsoft-atp-get-user-machines
- microsoft-atp-add-remove-machine-tag
- microsoft-atp-indicator-list (deprecated)
- microsoft-atp-indicator-get-by-id (deprecated)
- microsoft-atp-indicator-create-network (deprecated)
- microsoft-atp-indicator-create-file (deprecated)
- microsoft-atp-indicator-update (deprecated)
- microsoft-atp-indicator-delete (deprecated)
- microsoft-atp-sc-indicator-list
- microsoft-atp-sc-indicator-get-by-id
- microsoft-atp-sc-indicator-create
- microsoft-atp-sc-indicator-update
- microsoft-atp-sc-indicator-delete
- microsoft-atp-list-machines-by-vulnerability
- microsoft-atp-get-file-info
- endpoint
- microsoft-atp-indicator-batch-update
- microsoft-atp-get-alert-by-id
- microsoft-atp-request-and-download-investigation-package
- microsoft-atp-offboard-machine
- microsoft-atp-list-software
- microsoft-atp-list-software-version-distribution
- microsoft-atp-list-machines-by-software
- microsoft-atp-list-vulnerabilities-by-software
- microsoft-atp-list-vulnerabilities-by-machine
- microsoft-atp-list-vulnerabilities
- microsoft-atp-list-missing-kb-by-software
#
1. microsoft-atp-isolate-machineIsolates a machine from accessing external network.
#
Required PermissionsMachine.Isolate
#
Base Commandmicrosoft-atp-isolate-machine
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs to be used for isolation. e.g., 0a3250e0693a109f1affc9217be9459028aa8426,0a3250e0693a109f1affc9217be9459028aa8424. | Required |
comment | A comment to associate with the action. | Required |
isolation_type | Full isolation or selective isolation. (Restrict only limited set of applications from accessing the network). Possible values are: Full, Selective. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Type | String | Type of the machine action. |
MicrosoftATP.MachineAction.Scope | Unknown | Scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | Comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1" ,"SHA256", and "MD5". |
#
Command example!microsoft-atp-isolate-machine comment=isolate_test_3 isolation_type=Full machine_id="12342c13fef,12342c13fef8f06606"
#
Context Example#
Human Readable Output#
The isolation request has been submitted successfully:
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 1f3098e20464 Isolate 2f48b784-5da5-4e61-9957-012d2630f1e4 isolate_test_3 Pending 12342c13fef desktop-s2455r8 6d39a3da0744 Isolate 2f48b784-5da5-4e61-9957-012d2630f1e4 isolate_test_3 Pending 12342c13fef8f06606 desktop-s2455r9
#
2. microsoft-atp-unisolate-machineRemove a machine from isolation.
#
Required PermissionsMachine.Isolate
#
Base Commandmicrosoft-atp-unisolate-machine
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs to be used to stop the isolation. e.g., 0a3250e0693a109f1affc9217be9459028aa8426,0a3250e0693a109f1affc9217be9459028aa8424. | Required |
comment | Comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Type | String | Type of the action. |
MicrosoftATP.MachineAction.Scope | Unknown | Scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The fileIdentifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1" ,"SHA256", and "MD5". |
#
Command example!microsoft-atp-unisolate-machine comment=unisolate_test machine_id="4899036531e3,f70f9fe6b29"
#
Context Example#
Human Readable Output#
The request to stop the isolation has been submitted successfully:
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 488176cc Unisolate 2f48b784-5da5-4e61-9957-012d2630f1e4 unisolate_test Pending 4899036531e3 devicename_2 a6422c40 Unisolate 2f48b784-5da5-4e61-9957-012d2630f1e4 unisolate_test Pending f70f9fe6b29 devicename_1
#
3. microsoft-atp-get-machinesRetrieves a collection of machines that have communicated with WDATP cloud in the last 30 days. Note, only ip or hostname can be a comma-separated list. If both are given as lists, an error will appear.
#
Base Commandmicrosoft-atp-get-machines
#
InputArgument Name | Description | Required |
---|---|---|
hostname | A comma-separated list of computer DNS name. | Optional |
ip | A comma-separated list of the last machine IPs to access the internet. | Optional |
risk_score | The machine risk score. Possible values are: Low, Medium, High. | Optional |
health_status | The machine health status. Possible values are: Active, Inactive. | Optional |
os_platform | The machine's OS platform. Only a single platform can be added. | Optional |
page_size | Number of machines to return in a page - must be lower or equal to 10,000. | Optional |
page_num | The page number to retrieve. Default is 1. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Machine.ID | String | The machine ID. |
MicrosoftATP.Machine.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Machine.FirstSeen | Date | The first date and time the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.LastSeen | Date | The last date and time the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.OSPlatform | String | The operating system platform. |
MicrosoftATP.Machine.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.Machine.LastIPAddress | String | The last IP on the machine. |
MicrosoftATP.Machine.LastExternalIPAddress | String | The last machine IP to access the internet. |
MicrosoftATP.Machine.OSBuild | Number | The operating system build number. |
MicrosoftATP.Machine.HealthStatus | String | The machine health status. |
MicrosoftATP.Machine.RBACGroupID | Number | The machine RBAC group ID. |
MicrosoftATP.Machine.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.Machine.RiskScore | String | The machine risk score. |
MicrosoftATP.Machine.ExposureLevel | String | The machine exposure score. |
MicrosoftATP.Machine.IsAADJoined | Boolean | True if machine is AAD joined, False otherwise. |
MicrosoftATP.Machine.AADDeviceID | String | The AAD Device ID. |
MicrosoftATP.Machine.MachineTags | String | Set of machine tags. |
#
Command example!microsoft-atp-get-machines hostname=desktop-s health_status=Active os_platform=Windows10 ip=1.2.3.4,1.2.3.5
#
Context Example#
Human Readable Output#
Microsoft Defender ATP Machines:
ID ComputerDNSName OSPlatform LastIPAddress LastExternalIPAddress HealthStatus RiskScore ExposureLevel f70f9fe6b29 desktop-s Windows10 1.2.3.4 127.0.0.1 Active Medium Medium
#
4. microsoft-atp-get-file-related-machinesGets a collection of machines related to a given file's SHA1 hash.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-get-file-related-machines
#
InputArgument Name | Description | Required |
---|---|---|
file_hash | A comma-separated list of file SHA1 hash to get the related machines. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.FileMachine.Machines.ID | String | The machine ID. |
MicrosoftATP.FileMachine.Machines.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.FileMachine.Machines.FirstSeen | Date | The first date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.FileMachine.Machines.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.FileMachine.Machines.OSPlatform | String | The operating system platform. |
MicrosoftATP.FileMachine.Machines.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.FileMachine.Machines.OSBuild | Number | Operating system build number. |
MicrosoftATP.FileMachine.Machines.LastIPAddress | String | The last IP on the machine. |
MicrosoftATP.FileMachine.Machines.LastExternalIPAddress | String | The last machine IP to access the internet. |
MicrosoftATP.FileMachine.Machines.HelathStatus | String | The machine health status. |
MicrosoftATP.FileMachine.Machines.RBACGroupID | Number | The machine RBAC group ID. |
MicrosoftATP.FileMachine.Machines.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.FileMachine.Machines.RiskScore | String | The machine risk score. |
MicrosoftATP.FileMachine.Machines.ExposureLevel | String | The machine exposure score. |
MicrosoftATP.FileMachine.Machines.IsAADJoined | Boolean | True if machine is AAD joined, False otherwise. |
MicrosoftATP.FileMachine.Machines.AADDeviceID | string | The AAD Device ID. |
MicrosoftATP.FileMachine.Machines.MachineTags | String | Set of machine tags. |
MicrosoftATP.FileMachine.File | String | The machine related file hash. |
#
Command example!microsoft-atp-get-file-related-machines file_hash=1234567891acvgfdertukthgfdertyjhgfdset54,1234567891acvgfdertukthgfdertyjhgfdset53
#
Context Example#
Human Readable Output#
Microsoft Defender ATP machines related to files ['1234567891acvgfdertukthgfdertyjhgfdset54', '1234567891acvgfdertukthgfdertyjhgfdset53']
ID ComputerDNSName OSPlatform LastIPAddress LastExternalIPAddress HealthStatus RiskScore ExposureLevel f70f9fe6 desktop-s9 Windows10 1.2.3.4 127.0.0.1 Active Medium Medium 48990365 desktop-s8 Windows10 1.2.3.5 127.0.0.1 Active Low Medium
#
5. microsoft-atp-get-machine-detailsGets a machine's details by its identity.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-get-machine-details
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs used to get the machine details, e.g., 0a3250e0693a109f1affc9217be9459028aa8426,0a3250e0693a109f1affc9217be9459028aa8424. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Machine.ID | String | The machine ID. |
MicrosoftATP.Machine.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Machine.FirstSeen | Date | The first date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.OSPlatform | String | The operating system platform. |
MicrosoftATP.Machine.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.Machine.LastIPAddress | String | The last IP on the machine. |
MicrosoftATP.Machine.LastExternalIPAddress | String | The last machine IP to access the internet. |
MicrosoftATP.Machine.OSBuild | Number | The operating system build number. |
MicrosoftATP.Machine.HealthStatus | String | The machine health status. |
MicrosoftATP.Machine.RBACGroupID | Number | The machine RBAC group ID. |
MicrosoftATP.Machine.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.Machine.RiskScore | String | The machine risk score. |
MicrosoftATP.Machine.ExposureLevel | String | The machine exposure level. |
MicrosoftATP.Machine.IsAADJoined | Boolean | True if machine is AAD joined, False otherwise. |
MicrosoftATP.Machine.AADDeviceID | String | The AAD Device ID. |
MicrosoftATP.Machine.MachineTags | String | Set of machine tags. |
MicrosoftATP.Machine.NetworkInterfaces.MACAddress | String | MAC Address for the Network interface. |
MicrosoftATP.Machine.NetworkInterfaces.IPAddresses | String | IP Address(es) for the Network interface. |
MicrosoftATP.Machine.NetworkInterfaces.Type | String | Type of the Network interface (e.g. Ethernet). |
MicrosoftATP.Machine.NetworkInterfaces.Status | String | Status for the Network interface (e.g. Up, Down). |
#
Command example!microsoft-atp-get-machine-details machine_id=f70f9fe6b29,4899036531e
#
Context Example#
Human Readable Output#
Microsoft Defender ATP machines ['f70f9fe6b29','4899036531e'] details:
ID ComputerDNSName OSPlatform LastIPAddress LastExternalIPAddress HealthStatus RiskScore ExposureLevel IPAddresses f70f9fe6 desktop-s9 Windows10 1.2.3.4 127.0.0.1 Active Medium Medium 1. | MAC : 1234645645 | IP Addresses : 1.2.3.4,1234:🔢1234:3177:11dc | Type : Ethernet | Status : Up
2. | MAC : | IP Addresses : 127.0.0.1,::1 | Type : SoftwareLoopback | Status : Up48990365 desktop-s8 Windows10 1.2.3.5 127.0.0.1 Active Low Medium 1. | MAC : 1234645645 | IP Addresses : 1.2.3.5,1234:🔢1234:bc6e:23e1 | Type : Ethernet | Status : Up
2. | MAC : | IP Addresses : 127.0.0.1,::1 | Type : SoftwareLoopback | Status : Up
#
6. microsoft-atp-run-antivirus-scanInitiates Microsoft Defender Antivirus scan on a machine.
#
Required PermissionsMachine.Scan
#
Base Commandmicrosoft-atp-run-antivirus-scan
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs to run the scan on. | Required |
comment | A comment to associate with the action. | Required |
scan_type | Defines the type of the scan. Possible values are: Quick, Full. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | Unknown | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1" ,"SHA256", and "MD5". |
#
Command example!microsoft-atp-run-antivirus-scan machine_id=f70f9fe6,48990365 comment=test3 scan_type=Quick
#
Context Example#
Human Readable Output#
Antivirus scan successfully triggered
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 98cf0adc RunAntiVirusScan 2f48b784-5da5-4e61-9957-012d2630f1e4 test3 Pending f70f9fe6 desktop-s9 ecee8124 RunAntiVirusScan 2f48b784-5da5-4e61-9957-012d2630f1e4 test3 Pending 48990365 desktop-s8
#
7. microsoft-atp-list-alertsGets a list of alerts that are present on the system. Filtering can be done on a single argument only.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-list-alerts
#
InputArgument Name | Description | Required |
---|---|---|
severity | Alert severity. Possible values are: High, Medium, Low, Informational. | Optional |
status | Alert status. Possible values are: New, InProgress, Resolved. | Optional |
category | Alert category; only one can be added. | Optional |
limit | The maximum number of files to display. Default is 50. | Optional |
creation_time | The creation timestamp from which to get alerts (<number> <time unit>, e.g., 12 hours, 7 days). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Alert.ID | String | The alert ID. |
MicrosoftATP.Alert.IncidentID | Number | The Incident ID of the alert. |
MicrosoftATP.Alert.InvestigationID | Number | The Investigation ID related to the alert. |
MicrosoftATP.Alert.InvestigationState | String | The current state of the Investigation. |
MicrosoftATP.Alert.AssignedTo | String | The owner of the alert. |
MicrosoftATP.Alert.Severity | String | The severity of the alert. |
MicrosoftATP.Alert.Status | String | The current status of the alert. |
MicrosoftATP.Alert.Classification | String | The alert Classification. |
MicrosoftATP.Alert.Determination | String | The determination of the alert. |
MicrosoftATP.Alert.DetectionSource | String | The detection source. |
MicrosoftATP.Alert.Category | String | The category of the alert. |
MicrosoftATP.Alert.ThreatFamilyName | String | The threat family. |
MicrosoftATP.Alert.Title | String | The alert title. |
MicrosoftATP.Alert.Description | String | The alert description. |
MicrosoftATP.Alert.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.Alert.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.Alert.ResolvedTime | Date | The date and time in which the status of the alert was changed to 'Resolved'. |
MicrosoftATP.Alert.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.Alert.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Alert.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.Alert.Comments.Comment | String | The alert comment string. |
MicrosoftATP.Alert.Comments.CreatedBy | String | The alert comment created by string. |
MicrosoftATP.Alert.Comments.CreatedTime | Date | The alert comment created time date. |
MicrosoftATP.Alert.Evidence | Unknown | Evidence related to the alert. |
MicrosoftATP.Alert.DetectorID | String | The ID of the detector that triggered the alert. |
MicrosoftATP.Alert.ThreatName | String | The threat name. |
MicrosoftATP.Alert.RelatedUser | String | Details of the user related to a specific alert. |
MicrosoftATP.Alert.MitreTechniques | String | MITRE Enterprise technique ID. |
MicrosoftATP.Alert.RBACGroupName | String | The device RBAC group name. |
#
Command example!microsoft-atp-list-alerts category=Malware severity=Informational status=Resolved creation_time="3 days" limit=1
#
Context Example#
Human Readable Output#
Microsoft Defender ATP alerts with limit of 1:
ID Title Description IncidentID Severity Status Category ThreatFamilyName MachineID da637798264000574516_1915313662 'Test_File' malware was prevented Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.648 Informational Resolved Malware Test_File 4cceb3c642212014e0e9553aa8b59e999ea515ff
#
8. microsoft-atp-update-alertUpdates the properties of an alert entity.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-update-alert
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | The alert ID to update. | Required |
status | The alert status to update. Possible values: "New", "InProgress", and "Resolved". | Optional |
assigned_to | The owner of the alert. | Optional |
classification | The specification of the alert. Possible values: "Unknown", "FalsePositive", "TruePositive", "InformationalExpectedActivity". | Optional |
determination | The determination of the alert. Possible values: "NotAvailable", "Malware", "SecurityTesting", "UnwantedSoftware", and "Other". | Optional |
comment | The comment to be added to the alert. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Alert.ID | String | The ID of the alert. |
MicrosoftATP.Alert.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.Alert.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.Alert.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.Alert.AssignedTo | String | The owner of the alert. |
MicrosoftATP.Alert.Severity | String | The severity of the alert. |
MicrosoftATP.Alert.Status | String | The current status of the alert. |
MicrosoftATP.Alert.Classification | String | The alert classification. |
MicrosoftATP.Alert.Determination | String | The determination of the alert. |
MicrosoftATP.Alert.DetectionSource | String | The detection source. |
MicrosoftATP.Alert.Category | String | The category of the alert. |
MicrosoftATP.Alert.ThreatFamilyName | String | The threat family of the alert. |
MicrosoftATP.Alert.Title | String | The title of the alert. |
MicrosoftATP.Alert.Description | String | The description of the alert. |
MicrosoftATP.Alert.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.Alert.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.Alert.ResolvedTime | Date | The date and time in which the status of the alert was changed to "Resolved". |
MicrosoftATP.Alert.MachineID | String | The ID of the machine that is associated with the alert. |
MicrosoftATP.Alert.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.Alert.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.Alert.Comments.Comment | String | The comment string of the alert. |
MicrosoftATP.Alert.Comments.CreatedBy | String | The alert's comment created by the string. |
MicrosoftATP.Alert.Comments.CreatedTime | Date | The time and date the alert's comment was created. |
#
Command Example!microsoft-atp-update-alert alert_id=da637200417169017725_183736971 status=InProgress
#
Context Example#
Human Readable OutputThe alert da637200417169017725_183736971 has been updated successfully
#
9. microsoft-atp-advanced-huntingRuns programmatic queries in Microsoft Defender ATP Portal (https://securitycenter.windows.com/hunting).
- You can only run a query on data from the last 30 days.
- The maximum number of rows is 10,000.
- The number of executions is limited to 15 calls per minute, and 15 minutes of running time every hour, and 4 hours of running time a day.
- This API can only query tables belonging to Microsoft Defender for Endpoint. The following reference - Data Schema, lists all the tables in the schema. Each table name links to a page describing the column names for that table and which service it applies to.
#
Required PermissionsAdvancedQuery.Read.All
#
Base Commandmicrosoft-atp-advanced-hunting
#
InputArgument Name | Description | Required |
---|---|---|
query | The query to run. Must be passed if query_batch argument is empty. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. If specified with query_batch, will be applied to all queries in the array. Default is 10. | Optional |
time_range | Time range to look back. The expected syntax is a human-readable time range, e.g., 60 minutes, 6 hours, 1 day, etc. If specified with query_batch, applies to all queries in the array. | Optional |
query_batch | A JSON array of queries, limited to 10 queries. Cannot be provided with the query argument. Example for input: [ { "query": "query #1", "name": "name #1", "timeout": "timeout #1" "time_range": "2 days ago" // Non-mandatory, will override the {time_range} argument }, { "query": "query #2", "name": "name #2", "timeout": "timeout #2" "time_range": "6 days ago"t } ] . The query and name fields are mandatory. If timeout and time_range are specified, they will override the {timeout} and {time_range} argument. | Optional |
name | If stated along with query, the response will be saved in context under the Result.name path. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Hunt.Result | String | The query results. |
#
Command example``!microsoft-atp-advanced-hunting query_batch=
{"queries": [{"query": "DeviceInfo | where OnboardingStatus == 'Onboarded' | limit 10 | distinct DeviceName", "name": "name", "timeout": "20"}]}12`
#
Context Example#
Human Readable Output#
Hunt results for name query:
DeviceName msde-agent-host-centos7.c.dmst-integrations.internal desktop-s2455r8
#
Command Example!microsoft-atp-advanced-hunting query="DeviceLogonEvents | take 1 | project DeviceId, ReportId, tostring(Timestamp)"
#
Context Example#
Human Readable Output#
Hunt resultsTimestamp | DeviceId | ReportId |
---|---|---|
2020-02-23T07:14:42.1599815Z | 4899036531e374137f63289c3267bad772c13fef | 35275 |
#
10. microsoft-atp-create-alertCreates a new alert entity using event data, as obtained from the Advanced Hunting.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-create-alert
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine on which the event was identified. | Required |
severity | The severity of the alert. Severity of the alert. Possible values: "Low", "Medium", and "High". | Required |
title | The title of the alert. | Required |
description | The description of the alert. | Required |
recommended_action | Recommended action for the security officer to take when analyzing the alert. | Required |
event_time | The time of the event, as obtained from the advanced query. | Required |
report_id | The report ID, as obtained from the advanced query. | Required |
category | The category of the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Alert.ID | String | The ID of the alert. |
MicrosoftATP.Alert.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.Alert.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.Alert.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.Alert.AssignedTo | String | The owner of the alert. |
MicrosoftATP.Alert.Severity | String | The severity of the alert. |
MicrosoftATP.Alert.Status | String | The current status of the alert. |
MicrosoftATP.Alert.Classification | String | The classification of the alert. |
MicrosoftATP.Alert.Determination | String | The determination of the alert. |
MicrosoftATP.Alert.DetectionSource | String | The detection source. |
MicrosoftATP.Alert.Category | String | The category of the alert. |
MicrosoftATP.Alert.ThreatFamilyName | String | The threat family of the alert. |
MicrosoftATP.Alert.Title | String | The title of the alert. |
MicrosoftATP.Alert.Description | String | The description of the alert. |
MicrosoftATP.Alert.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.Alert.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.Alert.ResolvedTime | Date | The date and time in which the status of the alert was changed to "Resolved". |
MicrosoftATP.Alert.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.Alert.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.Alert.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.Alert.Comments.Comment | String | The comment string of the alert. |
MicrosoftATP.Alert.Comments.CreatedBy | String | The alert's comment created by the string. |
MicrosoftATP.Alert.Comments.CreatedTime | Date | The time and date the alert comment was created. |
#
Command Example!microsoft-atp-create-alert category=Backdoor description="test" report_id=20279 event_time=2020-02-23T07:22:07.1532018Z machine_id=deviceid_2 recommended_action="runAntiVirusScan" severity=Low title="testing alert"
#
Context Example#
Human Readable Output#
Alert created:ID | Title | Description | IncidentID | Severity | Status | Category | MachineID |
---|---|---|---|---|---|---|---|
da637204886635759335_1480542752 | testing alert | test | 18 | Low | New | Backdoor | 4899036531e374137f63289c3267bad772c13fef |
#
11. microsoft-atp-get-alert-related-userRetrieves the user associated with a specific alert.
#
Required PermissionsUser.Read.All
#
Base Commandmicrosoft-atp-get-alert-related-user
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.AlertUser.User.ID | String | The ID of the user. |
MicrosoftATP.AlertUser.User.AccountName | String | The account name. |
MicrosoftATP.AlertUser.User.AccountDomain | String | The account domain. |
MicrosoftATP.AlertUser.User.AccountSID | String | The account SID. |
MicrosoftATP.AlertUser.User.FirstSeen | Date | The user first seen date and time. |
MicrosoftATP.AlertUser.User.LastSeen | Date | The user last seen date and time. |
MicrosoftATP.AlertUser.User.MostPrevalentMachineID | String | The most prevalent machine ID. |
MicrosoftATP.AlertUser.User.LeastPrevalentMachineID | String | The least prevalent machine ID. |
MicrosoftATP.AlertUser.User.LogonTypes | String | The user logon types. |
MicrosoftATP.AlertUser.User.LogonCount | Number | The user logon count. |
MicrosoftATP.AlertUser.User.DomainAdmin | Number | The domain admin. |
MicrosoftATP.AlertUser.User.NetworkUser | Number | The network admin. |
MicrosoftATP.AlertUser.AlertID | String | The ID of the alert. |
#
Command Example!microsoft-atp-get-alert-related-user id=da637175364995825348_1865170845
#
Context Example#
Human Readable Output#
Alert Related User:AccountDomain | AccountName | AccountSID | DomainAdmin | FirstSeen | ID | LastSeen | LeastPrevalentMachineID | LogonCount | MostPrevalentMachineID | NetworkUser |
---|---|---|---|---|---|---|---|---|---|---|
desktop-s2455r8 | demisto | S-1-5-21-4197691174-1403503641-4006700887-1001 | false | 2020-02-23T07:14:42Z | desktop-s2455r8\demisto | 2020-03-03T12:32:51Z | 4899036531e374137f63289c3267bad772c13fef | 1 | 4899036531e374137f63289c3267bad772c13fef | false |
#
12. microsoft-atp-get-alert-related-filesRetrieves the files associated to a specific alert.
#
Required PermissionsFile.Read.All
#
Base Commandmicrosoft-atp-get-alert-related-files
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the alert. | Required |
limit | The limit of files to display. | Optional |
offset | The page from which to get the related files. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.AlertFile.Files.FilePublisher | String | The file's publisher. |
MicrosoftATP.AlertFile.Files.Size | Number | The size of the file. |
MicrosoftATP.AlertFile.Files.GlobalLastObserved | Date | The last time the file was observed. |
MicrosoftATP.AlertFile.Files.Sha1 | String | The SHA1 hash of the file. |
MicrosoftATP.AlertFile.Files.IsValidCertificate | Number | Whether the signing of the certificate was successfully verified by the Microsoft Defender ATP agent. |
MicrosoftATP.AlertFile.Files.Sha256 | String | The SHA256 hash of the file. |
MicrosoftATP.AlertFile.Files.Signer | String | The file signer. |
MicrosoftATP.AlertFile.Files.GlobalPrevalence | Number | The file prevalence across the organization. |
MicrosoftATP.AlertFile.Files.DeterminationValue | String | The determination of the file's value. |
MicrosoftATP.AlertFile.Files.GlobalFirstObserved | Date | The first time the file was observed. |
MicrosoftATP.AlertFile.Files.FileType | String | The type of the file. |
MicrosoftATP.AlertFile.Files.SignerHash | String | The hash of the signing certificate. |
MicrosoftATP.AlertFile.Files.Issuer | String | The file issuer. |
MicrosoftATP.AlertFile.Files.IsPeFile | Number | Wether the file is portable executable. |
MicrosoftATP.AlertFile.Files.DeterminationType | String | The determination type of the file. |
MicrosoftATP.AlertFile.Files.FileProductName | Unknown | The product name of the file. |
MicrosoftATP.AlertFile.Files.Md5 | String | The MD5 hash of the file. |
#
Command Example!microsoft-atp-get-alert-related-files id=da637175364995825348_1865170845
#
Context Example#
Human Readable Output#
Alert da637175364995825348_1865170845 Related Files:Sha1 | Sha256 | SizeInBytes |
---|---|---|
d487580502354c61808c7180d1a336beb7ad4624 | f1d62648ef915d85cb4fc140359e925395d315c70f3566b63bb3e21151cb2ce3 | 181248 |
36c5d12033b2eaf251bae61c00690ffb17fddc87 | 908b64b1971a979c7e3e8ce4621945cba84854cb98d76367b791a6e22b5f6d53 | 451584 |
#
13. microsoft-atp-get-alert-related-ipsRetrieves the IP addresses associated to a specific alert.
#
Required PermissionsIp.Read.All
#
Base Commandmicrosoft-atp-get-alert-related-ips
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the alert. | Required |
limit | The limit of IP addresses to display. | Optional |
offset | The page from which to get the related IP addresses. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.AlertIP.IPs.IpAddress | String | The address of the IP address. |
MicrosoftATP.AlertIP.AlertID | String | The ID of the alert. |
#
Command Example!microsoft-atp-get-alert-related-ips id=da637200417169017725_183736971 limit=3 offset=0
#
Context Example#
Human Readable OutputAlert da637200417169017725_183736971 Related IPs: []
#
14. microsoft-atp-get-alert-related-domainsRetrieves the domains associated with a specific alert.
#
Required PermissionsURL.Read.All
#
Base Commandmicrosoft-atp-get-alert-related-domains
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the alert. | Required |
limit | The limit of domains to display. | Optional |
offset | The page from which to get the related domains. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.AlertDomain.Domains.Domain | String | The domain address. |
MicrosoftATP.AlertDomain.AlertID | Unknown | The ID of the alert. |
#
Command Example!microsoft-atp-get-alert-related-domains id=da637175364995825348_1865170845 limit=2 offset=0
#
Context Example#
Human Readable OutputAlert da637175364995825348_1865170845 Related Domains: []
#
15. microsoft-atp-list-machine-actions-detailsReturns the machine's actions. If an action ID is set it returns the information on the specific action. Filtering can only be done on a single argument.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-list-machine-actions-details
#
InputArgument Name | Description | Required |
---|---|---|
id | ID of the action. | Optional |
status | The machine action status. Possible values are: Pending, InProgress, Succeeded, Failed, TimeOut, Cancelled. | Optional |
machine_id | A comma-separated list of machine IDs on which the action was executed. | Optional |
type | The machine action type. Possible values are: RunAntiVirusScan, Offboard, CollectInvestigationPackage, Isolate, Unisolate, StopAndQuarantineFile, RestrictCodeExecution, UnrestrictCodeExecution. | Optional |
requestor | The ID of the user that executed the action, only one can be added. | Optional |
limit | The maximum number of machines to return. Default is 50. | Optional |
filters | String representation of filters (Override every other filters). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | String | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1" ,"SHA256", and "MD5". |
#
Command example!microsoft-atp-list-machine-actions-details machine_id="f70f9fe6,48990365" type=RunAntiVirusScan status=Succeeded
#
Context Example#
Human Readable Output#
Machine actions Info:
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 98cf0adc RunAntiVirusScan 2f48b784-5da5-4e61-9957-012d2630f1e4 test3 Succeeded f70f9fe6 desktop-s9 99a29fc5 RunAntiVirusScan 2f48b784-5da5-4e61-9957-012d2630f1e4 test2 Succeeded 48990365 desktop-s8
#
16. microsoft-atp-collect-investigation-packageCollects an investigation package from a machine.
#
Required PermissionsMachine.CollectForensics
#
Base Commandmicrosoft-atp-collect-investigation-package
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. | Required |
comment | The comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The action ID of the machine. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | String | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name the action was executed on. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1", "SHA256", and "MD5". |
#
Command Example!microsoft-atp-collect-investigation-package comment="testing" machine_id=f70f9fe6b29cd9511652434919c6530618f06606
#
Context Example#
Human Readable Output#
Initiating collect investigation package from f70f9fe6b29cd9511652434919c6530618f06606 machine :ID | Type | Requestor | RequestorComment | Status | MachineID |
---|---|---|---|---|---|
fa952f94-d672-47a6-a637-70b91339c079 | CollectInvestigationPackage | 2f48b784-5da5-4e61-9957-012d2630f1e4 | testing | Pending | f70f9fe6b29cd9511652434919c6530618f06606 |
#
17. microsoft-atp-get-investigation-package-sas-uriGets a URI that allows downloading of an investigation package.
#
Required PermissionsMachine.CollectForensics
#
Base Commandmicrosoft-atp-get-investigation-package-sas-uri
#
InputArgument Name | Description | Required |
---|---|---|
action_id | The action ID of the machine. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.InvestigationURI.Link | String | The investigation package URI. |
#
Command Example!microsoft-atp-get-investigation-package-sas-uri action_id=6ae51f8f-68e6-4259-abae-0018fdf2e418
#
Context Example#
Human Readable OutputSuccess. This link is valid for a very short time and should be used immediately for downloading the package to a local storage: https:
//userrequests-us.securitycenter.windows.com:443/safedownload/WDATP_Investigation_Package.zip?token=MIICYwYJKoZIhvcNAQcCoIICV
#
18. microsoft-atp-restrict-app-executionRestricts the execution of all applications on the machine except a predefined set.
#
Required PermissionsMachine.RestrictExecution
#
Base Commandmicrosoft-atp-restrict-app-execution
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. | Required |
comment | The comment to associate with the action. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The action ID of the machine. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | String | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID the action was executed on. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name the action was executed on. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1", "SHA256", and "MD5". |
#
Command Example!microsoft-atp-restrict-app-execution machine_id=f70f9fe6b29cd9511652434919c6530618f06606 comment="test restrict app"
#
Context Example#
Human Readable Output#
Initiating Restrict execution of all applications on the machine f70f9fe6b29cd9511652434919c6530618f06606 except a predefined set:ID | Type | Requestor | RequestorComment | Status | MachineID |
---|---|---|---|---|---|
264c80f0-1452-43fb-92d0-5515dd0b821e | RestrictCodeExecution | 2f48b784-5da5-4e61-9957-012d2630f1e4 | test restrict app | Pending | f70f9fe6b29cd9511652434919c6530618f06606 |
#
19. microsoft-atp-remove-app-restrictionEnables the execution of any application on the machine.
#
Required PermissionsMachine.RestrictExecution
#
Base Commandmicrosoft-atp-remove-app-restriction
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. | Required |
comment | The comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The action ID of the machine. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | String | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID the action was executed on. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name the action was executed on. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1", "SHA256", and "MD5". |
#
Command Example!microsoft-atp-remove-app-restriction machine_id=f70f9fe6b29cd9511652434919c6530618f06606 comment="testing remove restriction"
#
Context Example#
Human Readable Output#
Removing applications restriction on the machine f70f9fe6b29cd9511652434919c6530618f06606:ID | Type | Requestor | RequestorComment | Status | MachineID |
---|---|---|---|---|---|
5e3cc0b8-b1a1-4a07-92bf-4d63ecec1b18 | UnrestrictCodeExecution | 2f48b784-5da5-4e61-9957-012d2630f1e4 | testing remove restriction | Pending | f70f9fe6b29cd9511652434919c6530618f06606 |
#
20. microsoft-atp-stop-and-quarantine-fileStops the execution of a file on a machine and deletes it.
#
Required PermissionsMachine.StopAndQuarantine
#
Base Commandmicrosoft-atp-stop-and-quarantine-file
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. When providing multiple values, each value is checked for the same hash. | Required |
file_hash | The file SHA1 hash to stop and quarantine on the machine. When providing multiple values, each value is checked for the same machine_id. | Required |
comment | The comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The action ID of the machine. |
MicrosoftATP.MachineAction.Type | String | The type of the action. |
MicrosoftATP.MachineAction.Scope | String | The scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | The comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1", "SHA256", and "MD5". |
#
Command Example!microsoft-atp-stop-and-quarantine-file comment="testing" file_hash=abe3ba25e5660c23dfe478d577cfacde5795870c machine_id=12345678
#
Context Example#
Human Readable Output#
Stopping the execution of a file on 12345678 machine and deleting it:ID | Type | Requestor | RequestorComment | Status | MachineID |
---|---|---|---|---|---|
123 | StopAndQuarantineFile | 123abc | Test | Pending | 12345678 |
#
21. microsoft-atp-list-investigationsRetrieves a collection of investigations or retrieves a specific investigation by its ID.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-list-investigations
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID can be the investigation ID or the investigation triggering an alert ID. | Optional |
limit | The limit of investigations to display. | Optional |
offset | The page from which to get the investigations. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Investigation.ID | String | The ID of the investigation. |
MicrosoftATP.Investigation.StartTime | Date | The date and time when the investigation was created. |
MicrosoftATP.Investigation.EndTime | Date | The date and time when the investigation was completed. |
MicrosoftATP.Investigation.State | String | The state of the investigation. |
MicrosoftATP.Investigation.CancelledBy | Unknown | The ID of the user or application that cancelled that investigation. |
MicrosoftATP.Investigation.StatusDetails | Unknown | The details of the state of the investigation. |
MicrosoftATP.Investigation.MachineID | String | The machine ID the investigation is executed on. |
MicrosoftATP.Investigation.ComputerDNSName | String | The machine DNS name the investigation is executed on. |
MicrosoftATP.Investigation.TriggeringAlertID | String | The alert ID that triggered the investigation. |
#
Command Example!microsoft-atp-list-investigations limit=3 offset=0
#
Context Example#
Human Readable Output#
Investigations Info:ID | StartTime | EndTime | InvestigationState | MachineID | ComputerDNSName | TriggeringAlertID |
---|---|---|---|---|---|---|
10 | 2020-03-17T11:35:17Z | PendingApproval | 4899036531e374137f63289c3267bad772c13fef | desktop-s2455r8 | da637200417169017725_183736971 | |
9 | 2020-03-17T10:43:15Z | PendingApproval | f70f9fe6b29cd9511652434919c6530618f06606 | desktop-s2455r9 | da637200385941308230_1832866941 | |
8 | 2020-03-04T16:37:50Z | 2020-03-11T18:13:42Z | TerminatedBySystem | f70f9fe6b29cd9511652434919c6530618f06606 | desktop-s2455r9 | da637189366671550108_395377714 |
#
22. microsoft-atp-start-investigationStarts an automated investigation on a machine.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-start-investigation
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. | Required |
comment | The comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Investigation.ID | String | The ID of the investigation. |
MicrosoftATP.Investigation.StartTime | Date | The date and time when the investigation was created. |
MicrosoftATP.Investigation.EndTime | Date | The date and time when the investigation was completed. |
MicrosoftATP.Investigation.State | String | The state of the investigation. |
MicrosoftATP.Investigation.CancelledBy | Unknown | The ID of the user or application that cancelled that investigation. |
MicrosoftATP.Investigation.StatusDetails | Unknown | The details of the state of the investigation. |
MicrosoftATP.Investigation.MachineID | String | The machine ID the investigation is executed on. |
MicrosoftATP.Investigation.ComputerDNSName | String | The machine DNS name the investigation is executed on. |
MicrosoftATP.Investigation.TriggeringAlertID | String | The alert ID that triggered the investigation. |
#
Command Example!microsoft-atp-start-investigation comment="testing" machine_id=f70f9fe6b29cd9511652434919c6530618f06606
#
Context Example#
Human Readable Output#
Starting investigation da637205548921456173_375980286 on f70f9fe6b29cd9511652434919c6530618f06606 machine:ID | InvestigationState | TriggeringAlertID |
---|---|---|
da637205548921456173_375980286 | PendingApproval | da637205548921456173_375980286 |
#
23. microsoft-atp-get-domain-statisticsRetrieves statistics on the given domain.
#
Required PermissionsURL.Read.All
#
Base Commandmicrosoft-atp-get-domain-statistics
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain address. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.DomainStatistics.Statistics.Host | String | The domain host. |
MicrosoftATP.DomainStatistics.Statistics.OrgPrevalence | String | The prevalence of the domain in the organization. |
MicrosoftATP.DomainStatistics.Statistics.OrgFirstSeen | Date | The first date and time the domain was seen in the organization. |
MicrosoftATP.DomainStatistics.Statistics.OrgLastSeen | Date | The last date and time the domain was seen in the organization. |
#
Command Example!microsoft-atp-get-domain-statistics domain=google.com
#
Context Example#
Human Readable Output#
Statistics on google.com domain:Host | OrgFirstSeen | OrgLastSeen | OrgPrevalence |
---|---|---|---|
google.com | 2020-02-24T12:50:04Z | 2020-02-24T13:14:54Z | 1 |
#
24. microsoft-atp-get-domain-alertsRetrieves a collection of alerts related to a given domain address.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-domain-alerts
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain address. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.DomainAlert.Domain | String | The domain address. |
MicrosoftATP.DomainAlert.Alerts.ID | String | The ID of the alert. |
MicrosoftATP.DomainAlert.Alerts.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.DomainAlert.Alerts.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.DomainAlert.Alerts.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.DomainAlert.Alerts.AssignedTo | String | The owner of the alert. |
MicrosoftATP.DomainAlert.Alerts.Severity | String | The severity of the alert. |
MicrosoftATP.DomainAlert.Alerts.Status | String | The current status of the alert. |
MicrosoftATP.DomainAlert.Alerts.Classification | String | The alert classification. |
MicrosoftATP.DomainAlert.Alerts.Determination | String | The determination of the alert. |
MicrosoftATP.DomainAlert.Alerts.DetectionSource | String | The detection source. |
MicrosoftATP.DomainAlert.Alerts.Category | String | The category of the alert. |
MicrosoftATP.DomainAlert.Alerts.ThreatFamilyName | String | The family name of the threat. |
MicrosoftATP.DomainAlert.Alerts.Title | String | The title of the alert. |
MicrosoftATP.DomainAlert.Alerts.Description | String | The description of the alert. |
MicrosoftATP.DomainAlert.Alerts.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.DomainAlert.Alerts.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.DomainAlert.Alerts.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.DomainAlert.Alerts.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.DomainAlert.Alerts.ResolvedTime | Date | The date and time in which the status of the alert was changed to "Resolved". |
MicrosoftATP.DomainAlert.Alerts.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.DomainAlert.Alerts.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.DomainAlert.Alerts.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.DomainAlert.Alerts.Comments.Comment | String | The alert comment string. |
MicrosoftATP.DomainAlert.Alerts.Comments.CreatedBy | String | The alert comment created by the string. |
MicrosoftATP.DomainAlert.Alerts.Comments.CreatedTime | Date | The alert comment create time and date. |
#
Command Example!microsoft-atp-get-domain-alerts domain=google.com
#
Context Example#
Human Readable Output#
Domain google.com related alerts Info:No entries.
#
25. microsoft-atp-get-domain-machinesRetrieves a collection of machines that have communicated with a given domain address.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-get-domain-machines
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain address. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.DomainMachine.Domain | String | The domain address. |
MicrosoftATP.DomainMachine.Machines.ID | String | The ID of the machine. |
MicrosoftATP.DomainMachine.Machines.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.DomainMachine.Machines.FirstSeen | Date | The first date and time when the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.DomainMachine.Machines.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.DomainMachine.Machines.OSPlatform | String | The operating system platform. |
MicrosoftATP.DomainMachine.Machines.OSVersion | String | The operating system version. |
MicrosoftATP.DomainMachine.Machines.OSProcessor | String | The operating system processor. |
MicrosoftATP.DomainMachine.Machines.LastIPAddress | String | The last IP address on the machine. |
MicrosoftATP.DomainMachine.Machines.LastExternalIPAddress | String | The last IP address the machine accessed. |
MicrosoftATP.DomainMachine.Machines.OSBuild | Number | The operating system build number. |
MicrosoftATP.DomainMachine.Machines.HealthStatus | String | The health status of the machine. |
MicrosoftATP.DomainMachine.Machines.RBACGroupID | Number | The RBAC group ID of the machine. |
MicrosoftATP.DomainMachine.Machines.RBACGroupName | String | The RBAC group name of the machine. |
MicrosoftATP.DomainMachine.Machines.RiskScore | String | The risk score of the machine. |
MicrosoftATP.DomainMachine.Machines.ExposureLevel | String | The exposure level of the machine. |
MicrosoftATP.DomainMachine.Machines.IsAADJoined | Boolean | Whether the machine is AAD joined. |
MicrosoftATP.DomainMachine.Machines.AADDeviceID | String | The AAD device ID. |
MicrosoftATP.DomainMachine.Machines.MachineTags | String | The set of machine tags. |
#
Command Example!microsoft-atp-get-domain-machines domain=google.com
#
Context Example#
Human Readable Output#
Machines that have communicated with google.com domain:ID | ComputerDNSName | OSPlatform | LastIPAddress | LastExternalIPAddress | HealthStatus | RiskScore | ExposureLevel |
---|---|---|---|---|---|---|---|
4899036531e374137f63289c3267bad772c13fef | desktop-s2455r8 | Windows10 | 192.168.1.71 | 81.166.99.236 | Active | High | Medium |
#
26. microsoft-atp-get-file-statisticsRetrieves statistics for the given file.
#
Required PermissionsFile.Read.All
#
Base Commandmicrosoft-atp-get-file-statistics
#
InputArgument Name | Description | Required |
---|---|---|
file_hash | The file SHA1 hash to get statistics on. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.FileStatistics.Sha1 | String | The file SHA1 hash. |
MicrosoftATP.FileStatistics.Statistics.OrgPrevalence | String | The prevalence of the file in the organization. |
MicrosoftATP.FileStatistics.Statistics.OrgFirstSeen | Date | The first date and time the file was seen in the organization. |
MicrosoftATP.FileStatistics.Statistics.OrgLastSeen | Date | The last date and time the file was seen in the organization. |
MicrosoftATP.FileStatistics.Statistics.GlobalPrevalence | String | The global prevalence of the file. |
MicrosoftATP.FileStatistics.Statistics.GlobalFirstObserved | Date | The first global observation date and time of the file. |
MicrosoftATP.FileStatistics.Statistics.GlobalLastObserved | Date | The last global observation date and time of the file. |
MicrosoftATP.FileStatistics.Statistics.TopFileNames | String | The top names of the file. |
#
Command Example!microsoft-atp-get-file-statistics file_hash=9fe3ba25e5660c23dfe478d577cfacde5795870c
#
Context Example#
Human Readable Output#
Statistics on 9fe3ba25e5660c23dfe478d577cfacde5795870c file:GlobalFirstObserved | GlobalLastObserved | GlobalPrevalence | OrgPrevalence | TopFileNames |
---|---|---|---|---|
2019-04-03T04:10:18.1001071Z | 2020-03-23T09:24:54.169574Z | 1355899 | 0 | lsass.exe |
#
27. microsoft-atp-get-file-alertsRetrieves a collection of alerts related to a given file hash.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-file-alerts
#
InputArgument Name | Description | Required |
---|---|---|
file_hash | The file SHA1 hash to get statistics on. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.FileAlert.Sha1 | String | The file SHA1 hash. |
MicrosoftATP.FileAlert.Alerts.ID | String | The ID of the alert. |
MicrosoftATP.FileAlert.Alerts.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.FileAlert.Alerts.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.FileAlert.Alerts.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.FileAlert.Alerts.AssignedTo | String | The owner of the alert. |
MicrosoftATP.FileAlert.Alerts.Severity | String | The severity of the alert. |
MicrosoftATP.FileAlert.Alerts.Status | String | The current status of the alert. |
MicrosoftATP.FileAlert.Alerts.Classification | String | The alert classification. |
MicrosoftATP.FileAlert.Alerts.Determination | String | The determination of the alert. |
MicrosoftATP.FileAlert.Alerts.DetectionSource | String | The detection source. |
MicrosoftATP.FileAlert.Alerts.Category | String | The category of the alert. |
MicrosoftATP.FileAlert.Alerts.ThreatFamilyName | String | The family name of the threat. |
MicrosoftATP.FileAlert.Alerts.Title | String | The title of the alert. |
MicrosoftATP.FileAlert.Alerts.Description | String | The description of the alert. |
MicrosoftATP.FileAlert.Alerts.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.FileAlert.Alerts.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.FileAlert.Alerts.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.FileAlert.Alerts.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.FileAlert.Alerts.ResolvedTime | Date | The date and time in which the status of the alert was changed to "Resolved". |
MicrosoftATP.FileAlert.Alerts.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.FileAlert.Alerts.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.FileAlert.Alerts.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.FileAlert.Alerts.Comments.Comment | String | The alert comment string. |
MicrosoftATP.FileAlert.Alerts.Comments.CreatedBy | String | The alert comment created by the string. |
MicrosoftATP.FileAlert.Alerts.Comments.CreatedTime | Date | The time and date the alert comment was created. |
#
Command Example!microsoft-atp-get-file-alerts file_hash=9fe3ba25e5660c23dfe478d577cfacde5795870c
#
Context Example#
Human Readable Output#
File 9fe3ba25e5660c23dfe478d577cfacde5795870c related alerts Info:ID | Title | Description | IncidentID | Severity | Status | Category | MachineID |
---|---|---|---|---|---|---|---|
da637200429318902470_-1583197054 | test alert | Created for test | 15 | Medium | New | None | 4899036531e374137f63289c3267bad772c13fef |
#
28. microsoft-atp-get-ip-statisticsRetrieves statistics for the given IP address.
#
Required PermissionsIp.Read.All
#
Base Commandmicrosoft-atp-get-ip-statistics
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.IPStatistics.Statistics.IPAddress | String | The IP address. |
MicrosoftATP.IPStatistics.Statistics.OrgPrevalence | String | The prevalence of the IP address in the organization. |
MicrosoftATP.IPStatistics.Statistics.OrgFirstSeen | Date | The first date and time the IP address was seen in the organization. |
MicrosoftATP.IPStatistics.Statistics.OrgLastSeen | Date | The last date and time the IP address was seen in the organization. |
#
Command Example!microsoft-atp-get-ip-statistics ip=8.8.8.8
#
Context Example#
Human Readable Output#
Statistics on 8.8.8.8 IP:OrgFirstSeen | OrgLastSeen | OrgPrevalence |
---|---|---|
2020-02-22T12:52:35Z | 2020-03-01T15:19:40Z | 1 |
#
29. microsoft-atp-get-ip-alertsRetrieves a collection of alerts related to a given IP address.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-ip-alerts
#
InputArgument Name | Description | Required |
---|---|---|
ip | The Ip address. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.IPAlert.IPAddress | String | The IP address. |
MicrosoftATP.IPAlert.Alerts.ID | String | The alert ID. |
MicrosoftATP.IPAlert.Alerts.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.IPAlert.Alerts.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.IPAlert.Alerts.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.IPAlert.Alerts.AssignedTo | String | The owner of the alert. |
MicrosoftATP.IPAlert.Alerts.Severity | String | The severity of the alert. |
MicrosoftATP.IPAlert.Alerts.Status | String | The current status of the alert. |
MicrosoftATP.IPAlert.Alerts.Classification | String | The alert classification. |
MicrosoftATP.IPAlert.Alerts.Determination | String | The determination of the alert. |
MicrosoftATP.IPAlert.Alerts.DetectionSource | String | The detection source. |
MicrosoftATP.IPAlert.Alerts.Category | String | The category of the alert. |
MicrosoftATP.IPAlert.Alerts.ThreatFamilyName | String | The family name of the threat. |
MicrosoftATP.IPAlert.Alerts.Title | String | The title of the alert. |
MicrosoftATP.IPAlert.Alerts.Description | String | The description of the alert. |
MicrosoftATP.IPAlert.Alerts.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.IPAlert.Alerts.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.IPAlert.Alerts.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.IPAlert.Alerts.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.IPAlert.Alerts.ResolvedTime | Date | The date and time in which the status of the alert was changed to "Resolved". |
MicrosoftATP.IPAlert.Alerts.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.IPAlert.Alerts.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.IPAlert.Alerts.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.IPAlert.Alerts.Comments.Comment | String | The alert's comment string. |
MicrosoftATP.IPAlert.Alerts.Comments.CreatedBy | String | The alert comment created by the string. |
MicrosoftATP.IPAlert.Alerts.Comments.CreatedTime | Date | The time and date the alert comment was created. |
#
Command Example!microsoft-atp-get-ip-alerts ip=8.8.8.8
#
Context Example#
Human Readable Output#
IP 8.8.8.8 related alerts Info:No entries.
#
30. microsoft-atp-get-user-alertsRetrieves a collection of alerts related to a given user ID.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-user-alerts
#
InputArgument Name | Description | Required |
---|---|---|
username | The user ID. The ID is not the full UPN, but only the username. For example, to retrieve alerts for "user1@test.com" use "user1". | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.UserAlert.Username | String | The name of the user. |
MicrosoftATP.UserAlert.Alerts.ID | String | The ID of the alert. |
MicrosoftATP.UserAlert.Alerts.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.UserAlert.Alerts.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.UserAlert.Alerts.InvestigationState | String | The current state of the investigation. |
MicrosoftATP.UserAlert.Alerts.AssignedTo | String | The owner of the alert. |
MicrosoftATP.UserAlert.Alerts.Severity | String | The severity of the alert. |
MicrosoftATP.UserAlert.Alerts.Status | String | The current status of the alert. |
MicrosoftATP.UserAlert.Alerts.Classification | String | The alert classification. |
MicrosoftATP.UserAlert.Alerts.Determination | String | The determination of the alert. |
MicrosoftATP.UserAlert.Alerts.DetectionSource | String | The detection source. |
MicrosoftATP.UserAlert.Alerts.Category | String | The category of the alert. |
MicrosoftATP.UserAlert.Alerts.ThreatFamilyName | String | The family name of the threat. |
MicrosoftATP.UserAlert.Alerts.Title | String | The title of the alert. |
MicrosoftATP.UserAlert.Alerts.Description | String | The description of the alert. |
MicrosoftATP.UserAlert.Alerts.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.UserAlert.Alerts.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.UserAlert.Alerts.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.UserAlert.Alerts.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.UserAlert.Alerts.ResolvedTime | Date | The date and time when the status of the alert was changed to "Resolved". |
MicrosoftATP.UserAlert.Alerts.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.UserAlert.Alerts.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.UserAlert.Alerts.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.UserAlert.Alerts.Comments.Comment | String | The comment string of the alert. |
MicrosoftATP.UserAlert.Alerts.Comments.CreatedBy | String | The alert comment created by the string. |
MicrosoftATP.UserAlert.Alerts.Comments.CreatedTime | Date | The time and date the alert comment was created. |
#
Command Example!microsoft-atp-get-user-alerts username=demisto
#
Context Example#
Human Readable Output#
User XSOAR related alerts Info:ID | Title | Description | IncidentID | Severity | Status | Category | MachineID |
---|---|---|---|---|---|---|---|
da637175364336494657_410871946 | Suspicious process injection observed | A process abnormally injected code into another process, As a result, unexpected code may be running in the target process memory. Injection is often used to hide malicious code execution within a trusted process. As a result, the target process may exhibit abnormal behaviors such as opening a listening port or connecting to a command and control server. | 7 | Medium | InProgress | DefenseEvasion | 4899036531e374137f63289c3267bad772c13fef |
#
31. microsoft-atp-get-user-machinesRetrieves a collection of machines related to a given user ID.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-get-user-machines
#
InputArgument Name | Description | Required |
---|---|---|
username | The user ID. The ID is not the full UPN, but only the user name. For example, to retrieve machines for "user1@test.com" use "user1". | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.UserMachine.Username | String | The name of the user. |
MicrosoftATP.UserMachine.Machines.ID | String | The ID of the machine. |
MicrosoftATP.UserMachine.Machines.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.UserMachine.Machines.FirstSeen | Date | The first date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.UserMachine.Machines.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.UserMachine.Machines.OSPlatform | String | The operating system platform. |
MicrosoftATP.UserMachine.Machines.OSVersion | String | The operating system version. |
MicrosoftATP.UserMachine.Machines.OSProcessor | String | The operating system processor. |
MicrosoftATP.v.Machines.LastIPAddress | String | The last IP address on the machine. |
MicrosoftATP.UserMachine.Machines.LastExternalIPAddress | String | The last IP address through which the machine accessed the internet. |
MicrosoftATP.UserMachine.Machines.OSBuild | Number | The operating system build number. |
MicrosoftATP.UserMachine.Machines.HealthStatus | String | The health status of the machine. |
MicrosoftATP.UserMachine.Machines.RBACGroupID | Number | The RBAC group ID of the machine. |
MicrosoftATP.UserMachine.Machines.RBACGroupName | String | The RBAC group name of the machine. |
MicrosoftATP.UserMachine.Machines.RiskScore | String | The risk score of the machine. |
MicrosoftATP.UserMachine.Machines.ExposureLevel | String | The exposure level of the machine. |
MicrosoftATP.UserMachine.Machines.IsAADJoined | Boolean | Whether the machine is AAD joined. |
MicrosoftATP.UserMachine.Machines.AADDeviceID | String | The AAD device ID. |
MicrosoftATP.UserMachine.Machines.MachineTags | String | The set of machine tags. |
#
Command Example!microsoft-atp-get-user-machines username=demisto
#
Context Example#
Human Readable Output#
Machines that are related to user XSOAR:ID | ComputerDNSName | OSPlatform | LastIPAddress | LastExternalIPAddress | HealthStatus | RiskScore | ExposureLevel |
---|---|---|---|---|---|---|---|
4899036531e374137f63289c3267bad772c13fef | desktop-s2455r8 | Windows10 | 192.168.1.71 | 81.166.99.236 | Active | High | Medium |
f70f9fe6b29cd9511652434919c6530618f06606 | desktop-s2455r9 | Windows10 | 192.168.1.73 | 81.166.99.236 | Active | Medium | Medium |
#
32. microsoft-atp-add-remove-machine-tagAdds or removes a tag on a specific machine.
#
Required PermissionsMachine.ReadWrite.All
#
Base Commandmicrosoft-atp-add-remove-machine-tag
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The ID of the machine. | Required |
action | The action to use for the tag. | Required |
tag | The name of the tag. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Machine.ID | String | The ID of the machine. |
MicrosoftATP.Machine.ComputerDNSName | String | The DNS name of the machine. |
MicrosoftATP.Machine.FirstSeen | Date | The first date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.OSPlatform | String | The operating system platform. |
MicrosoftATP.Machine.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.Machine.LastIPAddress | String | The last IP address on the machine. |
MicrosoftATP.Machine.LastExternalIPAddress | String | The last IP address through which the machine accessed the internet. |
MicrosoftATP.Machine.OSBuild | Number | The operating system build number. |
MicrosoftATP.Machine.HealthStatus | String | The health status of the machine. |
MicrosoftATP.Machine.RBACGroupID | Number | The RBAC group ID of the machine. |
MicrosoftATP.Machine.RBACGroupName | String | The RBAC group name of the machine. |
MicrosoftATP.Machine.RiskScore | String | The risk score of the machine. |
MicrosoftATP.Machine.ExposureLevel | String | The exposure level of the machine. |
MicrosoftATP.Machine.IsAADJoined | Boolean | Whether the machine is AAD joined. |
MicrosoftATP.Machine.AADDeviceID | String | The AAD device ID. |
MicrosoftATP.Machine.MachineTags | String | The set of machine tags. |
#
Command Example!microsoft-atp-add-remove-machine-tag action=Add machine_id=f70f9fe6b29cd9511652434919c6530618f06606 tag="test add tag"
#
Context Example#
Human Readable Output#
Succeed to Add tag to f70f9fe6b29cd9511652434919c6530618f06606:ID | ComputerDNSName | OSPlatform | LastExternalIPAddress | HealthStatus | RiskScore | ExposureLevel | MachineTags |
---|---|---|---|---|---|---|---|
f70f9fe6b29cd9511652434919c6530618f06606 | desktop-s2455r9 | Windows10 | 81.166.99.236 | Active | Medium | Medium | test add tag, testing123 |
#
microsoft-atp-indicator-listDeprecated. Use the microsoft-atp-sc-indicator-list command instead. Lists all indicators by the ID that the system creates when the indicator is ingested.
#
Base Commandmicrosoft-atp-indicator-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | The maximum number of indicators to return. Default is 50. | Optional |
page_size | Specify the page size of the result set. Maximum is 200. Default value is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert. |
MicrosoftATP.Indicators.additionalInformation | String | A catchall area into which extra data from the indicator not covered by the other indicator properties may be placed. Data placed into additionalInformation is typically not be used by the targetProduct security tool. |
MicrosoftATP.Indicators.azureTenantId | String | Stamped by the system when the indicator is ingested. The Azure Active Directory tenant ID of submitting client. |
MicrosoftATP.Indicators.confidence | Number | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100, with 100 being the highest. |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.diamondModel | String | The area of the Diamond Model in which this indicator exists. Possible values are: "unknown", "adversary", "capability", "infrastructure", "victim". |
MicrosoftATP.Indicators.domainName | String | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain. |
MicrosoftATP.Indicators.emailEncoding | String | The type of text encoding used in the email. |
MicrosoftATP.Indicators.emailLanguage | String | The language of the email. |
MicrosoftATP.Indicators.emailRecipient | String | Recipient email address. |
MicrosoftATP.Indicators.emailSenderAddress | String | Email address of the attacker |
MicrosoftATP.Indicators.emailSenderName | String | Display name of the attacker |
MicrosoftATP.Indicators.emailSourceDomain | String | Domain used in the email. |
MicrosoftATP.Indicators.emailSourceIpAddress | String | Source IP address of the email. |
MicrosoftATP.Indicators.emailSubject | String | Subject line of the email. |
MicrosoftATP.Indicators.emailXMailer | String | X-Mailer value used in the email. |
MicrosoftATP.Indicators.expirationDateTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.externalId | String | An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key). |
MicrosoftATP.Indicators.fileCompileDateTime | Date | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileCreatedDateTime | Date | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileHashType | String | The type of hash stored in fileHashValue. Possible values are: "unknown", "sha1", "sha256", "md5", "authenticodeHash256", "lsHash", and "ctph". |
MicrosoftATP.Indicators.fileHashValue | String | The file hash value. |
MicrosoftATP.Indicators.fileMutexName | String | Mutex name used in file-based detections. |
MicrosoftATP.Indicators.fileName | String | Name of the file if the indicator is file-based. Supports comma-separate list of file names. |
MicrosoftATP.Indicators.filePacker | String | The packer used to build the file in question. |
MicrosoftATP.Indicators.filePath | String | Path of the file indicating a compromise. May be a Windows or *nix style. |
MicrosoftATP.Indicators.fileSize | Number | Size of the file in bytes. |
MicrosoftATP.Indicators.fileType | String | Text description of the type of file. For example, “Word Document” or “Binary”. |
MicrosoftATP.Indicators.ingestedDateTime | Date | Stamped by the system when the indicator is ingested. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.isActive | Boolean | Used to deactivate indicators within system. By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system. |
MicrosoftATP.Indicators.knownFalsePositives | String | Scenarios in which the indicator may cause false positives. This should be human-readable text. |
MicrosoftATP.Indicators.lastReportedDateTime | Date | The last time the indicator was seen. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.networkCidrBlock | String | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. |
MicrosoftATP.Indicators.networkDestinationAsn | Number | The destination autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkDestinationCidrBlock | String | CIDR Block notation representation of the destination network in this indicator. |
MicrosoftATP.Indicators.networkDestinationIPv4 | String | IPv4 IP address destination. |
MicrosoftATP.Indicators.networkDestinationIPv6 | String | IPv6 IP address destination. |
MicrosoftATP.Indicators.networkDestinationPort | Number | TCP port destination. |
MicrosoftATP.Indicators.networkIPv4 | String | IPv4 IP address. |
MicrosoftATP.Indicators.networkIPv6 | String | IPv6 IP address. |
MicrosoftATP.Indicators.networkPort | Number | TCP port. |
MicrosoftATP.Indicators.networkProtocol | Number | Decimal representation of the protocol field in the IPv4 header. |
MicrosoftATP.Indicators.networkSourceAsn | Number | The source autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkSourceCidrBlock | String | CIDR Block notation representation of the source network in this indicator. |
MicrosoftATP.Indicators.networkSourceIPv4 | String | IPv4 IP address source. |
MicrosoftATP.Indicators.networkSourceIPv6 | String | IPv6 IP address source. |
MicrosoftATP.Indicators.networkSourcePort | Number | TCP port source. |
MicrosoftATP.Indicators.passiveOnly | Boolean | Determines if the indicator should trigger an event that is visible to an end user. When set to ‘true,’ security tools will not notify the end user that a ‘hit’ has occurred. This is most often treated as audit or silent mode by security products where they will simply log that a match occurred but will not perform the action. Default value is false. |
MicrosoftATP.Indicators.severity | Number | Severity of the malicious behavior identified by the data within the indicator. Possible values are 0 – 5, where 5 is the most severe and zero is not severe at all. Default is 3 |
MicrosoftATP.Indicators.targetProduct | String | A string value representing a single security product to which the indicator should be applied. |
MicrosoftATP.Indicators.threatType | String | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList. |
MicrosoftATP.Indicators.tlpLevel | String | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, and red. |
MicrosoftATP.Indicators.url | String | Uniform Resource Locator. This URL complies with RFC 1738. |
MicrosoftATP.Indicators.userAgent | String | User-Agent string from a web request that could indicate compromise. |
MicrosoftATP.Indicators.vendorInformation | String | Information about the vendor. |
#
Command Example!microsoft-atp-indicator-list
#
Context Example#
Human Readable Output#
Indicators from Microsoft ATP:
id action severity domainName 16 block 2 jacoviya.net
#
microsoft-atp-indicator-get-by-idDeprecated. Use the microsoft-atp-sc-indicator-get-by-id command instead. Gets an indicator by its ID.
#
Base Commandmicrosoft-atp-indicator-get-by-id
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | The ID of the indicator to get. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert. |
MicrosoftATP.Indicators.additionalInformation | String | A catchall area into which extra data from the indicator not covered by the other indicator properties may be placed. Data placed into additionalInformation will typically not be used by the targetProduct security tool. |
MicrosoftATP.Indicators.azureTenantId | String | Timestamp when the indicator was ingested into the system. |
MicrosoftATP.Indicators.confidence | Number | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100, with 100 being the highest. |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.diamondModel | String | The area of the Diamond Model in which this indicator exists. Possible values are: unknown, adversary, capability, infrastructure, victim. |
MicrosoftATP.Indicators.domainName | String | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain. |
MicrosoftATP.Indicators.emailEncoding | String | The type of text encoding used in the email. |
MicrosoftATP.Indicators.emailLanguage | String | The language of the email. |
MicrosoftATP.Indicators.emailRecipient | String | Recipient email address. |
MicrosoftATP.Indicators.emailSenderAddress | String | Email address of the attacker |
MicrosoftATP.Indicators.emailSenderName | String | Display name of the attacker |
MicrosoftATP.Indicators.emailSourceDomain | String | Domain used in the email. |
MicrosoftATP.Indicators.emailSourceIpAddress | String | Source IP address of the email. |
MicrosoftATP.Indicators.emailSubject | String | Subject line of the email. |
MicrosoftATP.Indicators.emailXMailer | String | X-Mailer value used in the email. |
MicrosoftATP.Indicators.expirationDateTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.externalId | String | An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key). |
MicrosoftATP.Indicators.fileCompileDateTime | Date | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileCreatedDateTime | Date | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileHashType | String | The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph. |
MicrosoftATP.Indicators.fileHashValue | String | The file hash value. |
MicrosoftATP.Indicators.fileMutexName | String | Mutex name used in file-based detections. |
MicrosoftATP.Indicators.fileName | String | Name of the file if the indicator is file-based. Supports comma-separate list of file names. |
MicrosoftATP.Indicators.filePacker | String | The packer used to build the file in question. |
MicrosoftATP.Indicators.filePath | String | Path of the file indicating a compromise. May be a Windows or *nix style. |
MicrosoftATP.Indicators.fileSize | Number | Size of the file in bytes. |
MicrosoftATP.Indicators.fileType | String | Text description of the type of file. For example, “Word Document” or “Binary”. |
MicrosoftATP.Indicators.ingestedDateTime | Date | Stamped by the system when the indicator is ingested. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.isActive | Boolean | Used to deactivate indicators within system. By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system. |
MicrosoftATP.Indicators.knownFalsePositives | String | Scenarios in which the indicator may cause false positives. This should be human-readable text. |
MicrosoftATP.Indicators.lastReportedDateTime | Date | The last time the indicator was seen. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.networkCidrBlock | String | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. |
MicrosoftATP.Indicators.networkDestinationAsn | Number | The destination autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkDestinationCidrBlock | String | CIDR Block notation representation of the destination network in this indicator. |
MicrosoftATP.Indicators.networkDestinationIPv4 | String | IPv4 IP address destination. |
MicrosoftATP.Indicators.networkDestinationIPv6 | String | IPv6 IP address destination. |
MicrosoftATP.Indicators.networkDestinationPort | Number | TCP port destination. |
MicrosoftATP.Indicators.networkIPv4 | String | IPv4 IP address. |
MicrosoftATP.Indicators.networkIPv6 | String | IPv6 IP address. |
MicrosoftATP.Indicators.networkPort | Number | TCP port. |
MicrosoftATP.Indicators.networkProtocol | Number | Decimal representation of the protocol field in the IPv4 header. |
MicrosoftATP.Indicators.networkSourceAsn | Number | The source autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkSourceCidrBlock | String | CIDR Block notation representation of the source network in this indicator. |
MicrosoftATP.Indicators.networkSourceIPv4 | String | IPv4 IP address source. |
MicrosoftATP.Indicators.networkSourceIPv6 | String | IPv6 IP address source. |
MicrosoftATP.Indicators.networkSourcePort | Number | TCP port source. |
MicrosoftATP.Indicators.passiveOnly | Boolean | Determines if the indicator should trigger an event that is visible to an end user. When set to ‘true,’ security tools will not notify the end user that a ‘hit’ has occurred. This is most often treated as audit or silent mode by security products where they will simply log that a match occurred but will not perform the action. Default value is false. |
MicrosoftATP.Indicators.severity | Number | Severity of the malicious behavior identified by the data within the indicator. Possible values are 0 – 5, where 5 is the most severe and zero is not severe at all. Default is 3 |
MicrosoftATP.Indicators.targetProduct | String | A string value representing a single security product to which the indicator should be applied. |
MicrosoftATP.Indicators.threatType | String | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList. |
MicrosoftATP.Indicators.tlpLevel | String | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. |
MicrosoftATP.Indicators.url | String | Uniform Resource Locator. This URL complies with RFC 1738. |
MicrosoftATP.Indicators.userAgent | String | User-Agent string from a web request that could indicate compromise. |
MicrosoftATP.Indicators.vendorInformation | String | Information about the vendor. |
#
Command Example!microsoft-atp-indicator-get-by-id indicator_id=17
#
Context Example#
Human Readable Output#
Indicators from Microsoft ATP:
id action severity domainName 17 block 2 example.com
#
microsoft-atp-indicator-create-networkDeprecated. Use the microsoft-atp-sc-indicator-create command instead. Creates a network indicator.
#
Base Commandmicrosoft-atp-indicator-create-network
#
InputArgument Name | Description | Required |
---|---|---|
action | The action to apply if the indicator is matched from within the targetProduct security tool. | Required |
description | Brief description (100 characters or less) of the threat represented by the indicator. | Required |
expiration_time | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). | Required |
threat_type | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, Cryptomining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, or WatchList. | Required |
tlp_level | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. | Optional |
confidence | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100 with 100 being the highest. | Optional |
severity | The severity of the malicious behavior identified by the data within the indicator. Possible values are Informational, Low, MediumLow, MediumHigh, High, where 5 is the most severe and zero is not severe at all. | Optional |
tags | A comma-separated list that stores arbitrary tags/keywords. | Optional |
domain_name | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain (For example, example.domain.net) | Optional |
network_cidr_block | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. | Optional |
network_destination_asn | The destination autonomous system identifier of the network referenced in the indicator. | Optional |
network_destination_cidr_block | CIDR Block notation representation of the destination network in this indicator. | Optional |
network_destination_ipv4 | IPv4 IP address destination. | Optional |
network_destination_ipv6 | IPv6 IP address destination. | Optional |
network_destination_port | TCP port destination. | Optional |
network_ipv4 | IPv4 IP address. Use only if the Source and Destination cannot be identified. | Optional |
network_ipv6 | IPv6 IP address. Use only if the Source and Destination cannot be identified. | Optional |
network_port | TCP port. Use only if the Source and Destination cannot be identified. | Optional |
network_protocol | Decimal representation of the protocol field in the IPv4 header. | Optional |
network_source_asn | The source autonomous system identifier of the network referenced in the indicator. | Optional |
network_source_cidr_block | CIDR Block notation representation of the source network in this indicator. | Optional |
network_source_ipv4 | IPv4 IP address source. | Optional |
network_source_ipv6 | IPv6 IP address source. | Optional |
network_source_port | TCP port source. | Optional |
url | Uniform Resource Locator. This URL must comply with RFC 1738. | Optional |
user_agent | User-Agent string from a web request that could indicate compromise. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert. |
MicrosoftATP.Indicators.additionalInformation | String | A catchall area into which extra data from the indicator not covered by the other indicator properties may be placed. Data placed into additionalInformation will typically not be used by the targetProduct security tool. |
MicrosoftATP.Indicators.azureTenantId | String | Timestamp when the indicator was ingested into the system. |
MicrosoftATP.Indicators.confidence | Number | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100, with 100 being the highest. |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.diamondModel | String | The area of the Diamond Model in which this indicator exists. Possible values are: unknown, adversary, capability, infrastructure, victim. |
MicrosoftATP.Indicators.domainName | String | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain. |
MicrosoftATP.Indicators.emailEncoding | String | The type of text encoding used in the email. |
MicrosoftATP.Indicators.emailLanguage | String | The language of the email. |
MicrosoftATP.Indicators.emailRecipient | String | Recipient email address. |
MicrosoftATP.Indicators.emailSenderAddress | String | Email address of the attacker |
MicrosoftATP.Indicators.emailSenderName | String | Display name of the attacker |
MicrosoftATP.Indicators.emailSourceDomain | String | Domain used in the email. |
MicrosoftATP.Indicators.emailSourceIpAddress | String | Source IP address of the email. |
MicrosoftATP.Indicators.emailSubject | String | Subject line of the email. |
MicrosoftATP.Indicators.emailXMailer | String | X-Mailer value used in the email. |
MicrosoftATP.Indicators.expirationDateTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.externalId | String | An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key). |
MicrosoftATP.Indicators.fileCompileDateTime | Date | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileCreatedDateTime | Date | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileHashType | String | The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, or ctph. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph. |
MicrosoftATP.Indicators.fileHashValue | String | The file hash value. |
MicrosoftATP.Indicators.fileMutexName | String | Mutex name used in file-based detections. |
MicrosoftATP.Indicators.fileName | String | Name of the file if the indicator is file-based. Supports comma-separate list of file names. |
MicrosoftATP.Indicators.filePacker | String | The packer used to build the file in question. |
MicrosoftATP.Indicators.filePath | String | Path of the file indicating a compromise. May be a Windows or *nix style. |
MicrosoftATP.Indicators.fileSize | Number | Size of the file in bytes. |
MicrosoftATP.Indicators.fileType | String | Text description of the type of file. For example, “Word Document” or “Binary”. |
MicrosoftATP.Indicators.ingestedDateTime | Date | Stamped by the system when the indicator is ingested. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.isActive | Boolean | Used to deactivate indicators within system. By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system. |
MicrosoftATP.Indicators.knownFalsePositives | String | Scenarios in which the indicator may cause false positives. This should be human-readable text. |
MicrosoftATP.Indicators.lastReportedDateTime | Date | The last time the indicator was seen. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.networkCidrBlock | String | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. |
MicrosoftATP.Indicators.networkDestinationAsn | Number | The destination autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkDestinationCidrBlock | String | CIDR Block notation representation of the destination network in this indicator. |
MicrosoftATP.Indicators.networkDestinationIPv4 | String | IPv4 IP address destination. |
MicrosoftATP.Indicators.networkDestinationIPv6 | String | IPv6 IP address destination. |
MicrosoftATP.Indicators.networkDestinationPort | Number | TCP port destination. |
MicrosoftATP.Indicators.networkIPv4 | String | IPv4 IP address. |
MicrosoftATP.Indicators.networkIPv6 | String | IPv6 IP address. |
MicrosoftATP.Indicators.networkPort | Number | TCP port. |
MicrosoftATP.Indicators.networkProtocol | Number | Decimal representation of the protocol field in the IPv4 header. |
MicrosoftATP.Indicators.networkSourceAsn | Number | The source autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkSourceCidrBlock | String | CIDR Block notation representation of the source network in this indicator. |
MicrosoftATP.Indicators.networkSourceIPv4 | String | IPv4 IP address source. |
MicrosoftATP.Indicators.networkSourceIPv6 | String | IPv6 IP address source. |
MicrosoftATP.Indicators.networkSourcePort | Number | TCP port source. |
MicrosoftATP.Indicators.passiveOnly | Boolean | Determines if the indicator should trigger an event that is visible to an end user. When set to ‘true,’ security tools will not notify the end user that a ‘hit’ has occurred. This is most often treated as audit or silent mode by security products where they will simply log that a match occurred but will not perform the action. Default value is false. |
MicrosoftATP.Indicators.severity | Number | Severity of the malicious behavior identified by the data within the indicator. Possible values are 0 – 5, where 5 is the most severe and zero is not severe at all. Default is 3 |
MicrosoftATP.Indicators.targetProduct | String | A string value representing a single security product to which the indicator should be applied. |
MicrosoftATP.Indicators.threatType | String | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList. |
MicrosoftATP.Indicators.tlpLevel | String | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. |
MicrosoftATP.Indicators.url | String | Uniform Resource Locator. This URL complies with RFC 1738. |
MicrosoftATP.Indicators.userAgent | String | User-Agent string from a web request that could indicate compromise. |
MicrosoftATP.Indicators.vendorInformation | String | Information about the vendor. |
#
Command Example!microsoft-atp-indicator-create-network action=unknown description="A description!" expiration_time="7 days" threat_type=CryptoMining domain_name="example.com"
#
Context Example#
Human Readable Output#
Indicator 17 was successfully created:
id action severity domainName 17 block 2 example.com
#
microsoft-atp-indicator-create-fileDeprecated. Use the microsoft-atp-sc-indicator-create command instead. Creates a file indicator
#
Base Commandmicrosoft-atp-indicator-create-file
#
InputArgument Name | Description | Required |
---|---|---|
action | The action to apply if the indicator is matched from within the targetProduct security tool. | Required |
description | Brief description (100 characters or less) of the threat represented by the indicator. | Required |
expiration_time | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). | Required |
threat_type | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, Cryptomining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, or WatchList. | Required |
tlp_level | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. | Optional |
confidence | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100 with 100 being the highest. | Optional |
severity | The severity of the malicious behavior identified by the data within the indicator. Possible values are Informational, Low, MediumLow, MediumHigh, High, where 5 is the most severe and zero is not severe at all. | Optional |
tags | A comma-separated list that stores arbitrary tags/keywords. | Optional |
file_compile_date_time | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' | Optional |
file_created_date_time | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' | Optional |
file_hash_type | The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, or ctph. | Optional |
file_hash_value | The file hash value. | Optional |
file_mutex_name | Mutex name used in file-based detections. | Optional |
file_name | Name of the file if the indicator is file-based. Supports comma-separate list of file names. | Optional |
file_packer | The packer used to build the file in question. | Optional |
file_path | Path of the file indicating a compromise. Can be a Windows or *nix style path. | Optional |
file_size | Size of the file in bytes. | Optional |
file_type | Text description of the type of file. For example, “Word Document” or “Binary”. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert. |
MicrosoftATP.Indicators.additionalInformation | String | A catchall area into which extra data from the indicator not covered by the other indicator properties may be placed. Data placed into additionalInformation will typically not be used by the targetProduct security tool. |
MicrosoftATP.Indicators.azureTenantId | String | Timestamp when the indicator was ingested into the system. |
MicrosoftATP.Indicators.confidence | Number | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100, with 100 being the highest. |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.diamondModel | String | The area of the Diamond Model in which this indicator exists. Possible values are: unknown, adversary, capability, infrastructure, victim. |
MicrosoftATP.Indicators.domainName | String | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain. |
MicrosoftATP.Indicators.emailEncoding | String | The type of text encoding used in the email. |
MicrosoftATP.Indicators.emailLanguage | String | The language of the email. |
MicrosoftATP.Indicators.emailRecipient | String | Recipient email address. |
MicrosoftATP.Indicators.emailSenderAddress | String | Email address of the attacker |
MicrosoftATP.Indicators.emailSenderName | String | Display name of the attacker |
MicrosoftATP.Indicators.emailSourceDomain | String | Domain used in the email. |
MicrosoftATP.Indicators.emailSourceIpAddress | String | Source IP address of the email. |
MicrosoftATP.Indicators.emailSubject | String | Subject line of the email. |
MicrosoftATP.Indicators.emailXMailer | String | X-Mailer value used in the email. |
MicrosoftATP.Indicators.expirationDateTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.externalId | String | An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key). |
MicrosoftATP.Indicators.fileCompileDateTime | Date | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileCreatedDateTime | Date | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileHashType | String | The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, or ctph. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph. |
MicrosoftATP.Indicators.fileHashValue | String | The file hash value. |
MicrosoftATP.Indicators.fileMutexName | String | Mutex name used in file-based detections. |
MicrosoftATP.Indicators.fileName | String | Name of the file if the indicator is file-based. Supports comma-separate list of file names. |
MicrosoftATP.Indicators.filePacker | String | The packer used to build the file in question. |
MicrosoftATP.Indicators.filePath | String | Path of the file indicating a compromise. May be a Windows or *nix style. |
MicrosoftATP.Indicators.fileSize | Number | Size of the file in bytes. |
MicrosoftATP.Indicators.fileType | String | Text description of the type of file. For example, “Word Document” or “Binary”. |
MicrosoftATP.Indicators.ingestedDateTime | Date | Stamped by the system when the indicator is ingested. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.isActive | Boolean | Used to deactivate indicators within system. By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system. |
MicrosoftATP.Indicators.knownFalsePositives | String | Scenarios in which the indicator may cause false positives. This should be human-readable text. |
MicrosoftATP.Indicators.lastReportedDateTime | Date | The last time the indicator was seen. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.networkCidrBlock | String | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. |
MicrosoftATP.Indicators.networkDestinationAsn | Number | The destination autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkDestinationCidrBlock | String | CIDR Block notation representation of the destination network in this indicator. |
MicrosoftATP.Indicators.networkDestinationIPv4 | String | IPv4 IP address destination. |
MicrosoftATP.Indicators.networkDestinationIPv6 | String | IPv6 IP address destination. |
MicrosoftATP.Indicators.networkDestinationPort | Number | TCP port destination. |
MicrosoftATP.Indicators.networkIPv4 | String | IPv4 IP address. |
MicrosoftATP.Indicators.networkIPv6 | String | IPv6 IP address. |
MicrosoftATP.Indicators.networkPort | Number | TCP port. |
MicrosoftATP.Indicators.networkProtocol | Number | Decimal representation of the protocol field in the IPv4 header. |
MicrosoftATP.Indicators.networkSourceAsn | Number | The source autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkSourceCidrBlock | String | CIDR Block notation representation of the source network in this indicator. |
MicrosoftATP.Indicators.networkSourceIPv4 | String | IPv4 IP address source. |
MicrosoftATP.Indicators.networkSourceIPv6 | String | IPv6 IP address source. |
MicrosoftATP.Indicators.networkSourcePort | Number | TCP port source. |
MicrosoftATP.Indicators.passiveOnly | Boolean | Determines if the indicator should trigger an event that is visible to an end user. When set to ‘true,’ security tools will not notify the end user that a ‘hit’ has occurred. This is most often treated as audit or silent mode by security products where they will simply log that a match occurred but will not perform the action. Default value is false. |
MicrosoftATP.Indicators.severity | Number | Severity of the malicious behavior identified by the data within the indicator. Possible values are 0 – 5, where 5 is the most severe and zero is not severe at all. Default is 3 |
MicrosoftATP.Indicators.targetProduct | String | A string value representing a single security product to which the indicator should be applied. |
MicrosoftATP.Indicators.threatType | String | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList. |
MicrosoftATP.Indicators.tlpLevel | String | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. |
MicrosoftATP.Indicators.url | String | Uniform Resource Locator. This URL complies with RFC 1738. |
MicrosoftATP.Indicators.userAgent | String | User-Agent string from a web request that could indicate compromise. |
MicrosoftATP.Indicators.vendorInformation | String | Information about the vendor. |
#
Command Example!microsoft-atp-indicator-create-file action=allow description="A description" expiration_time="3 days" threat_type=Darknet confidence=23 file_hash_type=sha256 file_hash_value=50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
#
Context Example#
Human Readable Output#
Indicator 18 was successfully created:
id action severity fileHashType fileHashValue 18 allow 2 sha256 50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
#
microsoft-atp-indicator-updateDeprecated. Use the microsoft-atp-sc-indicator-update command instead. Updates the specified indicator.
#
Base Commandmicrosoft-atp-indicator-update
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | The ID of the indicator to update. | Required |
severity | The severity of the malicious behavior identified by the data within the indicator. Possible values are Informational, Low, MediumLow, MediumHigh, High, where High is the most severe and Informational is not severe at all. | Optional |
expiration_time | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). | Required |
description | Brief description (100 characters or less) of the threat represented by the indicator. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert. |
MicrosoftATP.Indicators.additionalInformation | String | A catchall area into which extra data from the indicator not covered by the other indicator properties may be placed. Data placed into additionalInformation will typically not be used by the targetProduct security tool. |
MicrosoftATP.Indicators.azureTenantId | String | Timestamp when the indicator was ingested into the system. |
MicrosoftATP.Indicators.confidence | Number | An integer representing the confidence with which the data within the indicator accurately identifies malicious behavior. Possible values are 0 – 100, with 100 being the highest. |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.diamondModel | String | The area of the Diamond Model in which this indicator exists. Possible values are: unknown, adversary, capability, infrastructure, victim. |
MicrosoftATP.Indicators.domainName | String | Domain name associated with this indicator. Should be in the format subdomain.domain.topleveldomain. |
MicrosoftATP.Indicators.emailEncoding | String | The type of text encoding used in the email. |
MicrosoftATP.Indicators.emailLanguage | String | The language of the email. |
MicrosoftATP.Indicators.emailRecipient | String | Recipient email address. |
MicrosoftATP.Indicators.emailSenderAddress | String | Email address of the attacker |
MicrosoftATP.Indicators.emailSenderName | String | Display name of the attacker |
MicrosoftATP.Indicators.emailSourceDomain | String | Domain used in the email. |
MicrosoftATP.Indicators.emailSourceIpAddress | String | Source IP address of the email. |
MicrosoftATP.Indicators.emailSubject | String | Subject line of the email. |
MicrosoftATP.Indicators.emailXMailer | String | X-Mailer value used in the email. |
MicrosoftATP.Indicators.expirationDateTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.externalId | String | An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key). |
MicrosoftATP.Indicators.fileCompileDateTime | Date | DateTime when the file was compiled. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileCreatedDateTime | Date | DateTime when the file was created.The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.fileHashType | String | The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, or ctph. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph. |
MicrosoftATP.Indicators.fileHashValue | String | The file hash value. |
MicrosoftATP.Indicators.fileMutexName | String | Mutex name used in file-based detections. |
MicrosoftATP.Indicators.fileName | String | Name of the file if the indicator is file-based. Supports comma-separate list of file names. |
MicrosoftATP.Indicators.filePacker | String | The packer used to build the file in question. |
MicrosoftATP.Indicators.filePath | String | Path of the file indicating a compromise. May be a Windows or *nix style. |
MicrosoftATP.Indicators.fileSize | Number | Size of the file in bytes. |
MicrosoftATP.Indicators.fileType | String | Text description of the type of file. For example, “Word Document” or “Binary”. |
MicrosoftATP.Indicators.ingestedDateTime | Date | Stamped by the system when the indicator is ingested. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.isActive | Boolean | Used to deactivate indicators within system. By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system. |
MicrosoftATP.Indicators.knownFalsePositives | String | Scenarios in which the indicator may cause false positives. This should be human-readable text. |
MicrosoftATP.Indicators.lastReportedDateTime | Date | The last time the indicator was seen. The Timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.networkCidrBlock | String | CIDR Block notation representation of the network referenced in this indicator. Use only if the Source and Destination cannot be identified. |
MicrosoftATP.Indicators.networkDestinationAsn | Number | The destination autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkDestinationCidrBlock | String | CIDR Block notation representation of the destination network in this indicator. |
MicrosoftATP.Indicators.networkDestinationIPv4 | String | IPv4 IP address destination. |
MicrosoftATP.Indicators.networkDestinationIPv6 | String | IPv6 IP address destination. |
MicrosoftATP.Indicators.networkDestinationPort | Number | TCP port destination. |
MicrosoftATP.Indicators.networkIPv4 | String | IPv4 IP address. |
MicrosoftATP.Indicators.networkIPv6 | String | IPv6 IP address. |
MicrosoftATP.Indicators.networkPort | Number | TCP port. |
MicrosoftATP.Indicators.networkProtocol | Number | Decimal representation of the protocol field in the IPv4 header. |
MicrosoftATP.Indicators.networkSourceAsn | Number | The source autonomous system identifier of the network referenced in the indicator. |
MicrosoftATP.Indicators.networkSourceCidrBlock | String | CIDR Block notation representation of the source network in this indicator. |
MicrosoftATP.Indicators.networkSourceIPv4 | String | IPv4 IP address source. |
MicrosoftATP.Indicators.networkSourceIPv6 | String | IPv6 IP address source. |
MicrosoftATP.Indicators.networkSourcePort | Number | TCP port source. |
MicrosoftATP.Indicators.passiveOnly | Boolean | Determines if the indicator should trigger an event that is visible to an end user. When set to ‘true,’ security tools will not notify the end user that a ‘hit’ has occurred. This is most often treated as audit or silent mode by security products where they will simply log that a match occurred but will not perform the action. Default value is false. |
MicrosoftATP.Indicators.severity | Number | Severity of the malicious behavior identified by the data within the indicator. Possible values are 0 – 5, where 5 is the most severe and zero is not severe at all. Default is 3 |
MicrosoftATP.Indicators.targetProduct | String | A string value representing a single security product to which the indicator should be applied. |
MicrosoftATP.Indicators.threatType | String | Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList. |
MicrosoftATP.Indicators.tlpLevel | String | Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, or amber. |
MicrosoftATP.Indicators.url | String | Uniform Resource Locator. This URL complies with RFC 1738. |
MicrosoftATP.Indicators.userAgent | String | User-Agent string from a web request that could indicate compromise. |
MicrosoftATP.Indicators.vendorInformation | String | Information about the vendor. |
#
Command Example!microsoft-atp-indicator-update expiration_time="2 days" indicator_id=18
#
Context Example#
Human Readable Output#
Indicator ID: 18 was updated successfully.
action azureTenantId description expirationDateTime fileHashType fileHashValue id ingestedDateTime isActive severity targetProduct allow TENANT-ID Title: Indicator 50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c of type FileSha256, Description: A description 2020-08-28T17:21:15Z sha256 50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c 18 2020-08-26T17:18:03.5249643Z true 0 Microsoft Defender ATP
#
microsoft-atp-indicator-deleteDeprecated. Use the microsoft-atp-sc-indicator-delete command instead. Deletes the specified indicator.
#
Base Commandmicrosoft-atp-indicator-delete
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | The ID of the indicator to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!microsoft-atp-indicator-delete indicator_id=18
#
Human Readable OutputIndicator ID: 18 was successfully deleted
#
microsoft-atp-sc-indicator-listLists all indicators by the ID that the system creates when the indicator is ingested.
#
PermissionsTi.ReadWrite
#
NoteTo ensure that the application is accessible to all indicators, the 'Ti.ReadWrite.All' permission must be granted. Without this permission, the application will only be accessible to the indicators it has created.
#
Base Commandmicrosoft-atp-sc-indicator-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | The maximum number of indicators to return. Default is 50. | Optional |
skip | The number of indicators that are to be skipped and not included in the result. | Optional |
indicator_value | The value of the indicator to get. | Optional |
indicator_title | The title of the indicator to get. | Optional |
indicator_type | The type of the indicator to get. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values: "unknown", "allow", "block", and "alert". |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.expirationTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.severity | String | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium", and "High", where High is the most severe and Informational is not severe at all. |
MicrosoftATP.Indicators.indicatorValue | String | The value of the indicator. |
MicrosoftATP.Indicators.recommendedActions | String | Recommended actions for the indicator. |
MicrosoftATP.Indicators.generateAlert | Boolean | Whether an alert was generated. |
MicrosoftATP.Indicators.rbacGroupNames | Unknown | A list of RBAC device group names where the indicator is exposed and active. Empty list if it is exposed to all devices. |
MicrosoftATP.Indicators.mitreTechniques | Unknown | A list of MITRE techniques. |
MicrosoftATP.Indicators.indicatorType | String | Indicator Type. Possible values: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url". |
MicrosoftATP.Indicators.lastUpdateTime | Date | The last time the indicator was updated. |
MicrosoftATP.Indicators.createdByDisplayName | String | Display name of the created app. |
MicrosoftATP.Indicators.application | String | The application associated with the indicator. |
MicrosoftATP.Indicators.title | String | Indicator title. |
MicrosoftATP.Indicators.createdBySource | String | Source of indicator creation. For example, PublicApi. |
MicrosoftATP.Indicators.historicalDetection | Boolean | Whether a historical detection exists. |
MicrosoftATP.Indicators.lastUpdatedBy | String | Identity of the user/application that last updated the indicator. |
MicrosoftATP.Indicators.creationTimeDateTimeUtc | Date | The date and time when the indicator was created. |
MicrosoftATP.Indicators.category | Number | A number representing the indicator category. |
MicrosoftATP.Indicators.createdBy | String | Unique identity of the user/application that submitted the indicator. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
Domain.Name | String | The domain name, for example: "google.com". |
IP.Address | String | IP address. |
URL.Data | String | The URL. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!microsoft-atp-sc-indicator-list limit=2
#
Context Example#
Human Readable Output#
Results found in Microsoft Defender ATP SC for value: 5.5.5.5
id action indicatorValue indicatorType severity title description 5141 Allowed 5.5.5.5 IpAddress Low title description
#
microsoft-atp-sc-indicator-updateUpdates the specified indicator.
#
PermissionsTi.ReadWrite
#
Base Commandmicrosoft-atp-sc-indicator-update
#
InputArgument Name | Description | Required |
---|---|---|
indicator_value | The value of the indicator to update. | Required |
indicator_type | Indicator Type. Possible values are: FileSha1, FileSha256, IpAddress, DomainName, Url. | Required |
action | The action taken if the indicator is discovered in the organization. Possible values are: Alert, AlertAndBlock, Allowed. | Required |
severity | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium", and "High", where High is the most severe and Informational is not severe at all. | Optional |
expiration_time | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). Default is 14 days. | Optional |
indicator_description | Brief description (100 characters or less) of the threat represented by the indicator. | Required |
indicator_title | Indicator alert title. | Required |
indicator_application | The application associated with the indicator. | Optional |
recommended_actions | TI indicator alert recommended actions. | Optional |
rbac_group_names | Comma-separated list of RBAC group names the indicator is applied to. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values: "unknown", "allow", "block", and "alert". |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.expirationTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.severity | String | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium", and "High", where High is the most severe and Informational is not severe at all. |
MicrosoftATP.Indicators.indicatorValue | String | The value of the indicator. |
MicrosoftATP.Indicators.recommendedActions | String | Recommended actions for the indicator. |
MicrosoftATP.Indicators.generateAlert | Boolean | Whether an alert was generated. |
MicrosoftATP.Indicators.rbacGroupNames | Unknown | A list of RBAC device group names where the indicator is exposed and active. Empty list if it is exposed to all devices. |
MicrosoftATP.Indicators.mitreTechniques | Unknown | A list of MITRE techniques. |
MicrosoftATP.Indicators.indicatorType | String | Indicator Type. Possible values: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url". |
MicrosoftATP.Indicators.lastUpdateTime | Date | The last time the indicator was updated. |
MicrosoftATP.Indicators.createdByDisplayName | String | Display name of the created app. |
MicrosoftATP.Indicators.application | String | The application associated with the indicator. |
MicrosoftATP.Indicators.title | String | Indicator title. |
MicrosoftATP.Indicators.createdBySource | String | Source of indicator creation. For example, PublicApi. |
MicrosoftATP.Indicators.historicalDetection | Boolean | Whether a historical detection exists. |
MicrosoftATP.Indicators.lastUpdatedBy | String | Identity of the user/application that last updated the indicator. |
MicrosoftATP.Indicators.creationTimeDateTimeUtc | Date | The date and time when the indicator was created. |
MicrosoftATP.Indicators.category | Number | An number representing the indicator category. |
MicrosoftATP.Indicators.createdBy | String | Unique identity of the user/application that submitted the indicator. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
Domain.Name | String | The domain name, for example: "google.com". |
IP.Address | String | IP address. |
URL.Data | String | The URL. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!microsoft-atp-sc-indicator-update action=Allowed indicator_description=test indicator_title=title indicator_type=IpAddress indicator_value=2.2.2.2 expiration_time="1 day" severity=Low
#
Context Example#
Human Readable Output#
Indicator 2.2.2.2 was updated successfully.
id action indicatorValue indicatorType severity title description 5143 Allowed 2.2.2.2 IpAddress Low title test
#
microsoft-atp-sc-indicator-get-by-idGets an indicator by its ID.
#
PermissionsTi.ReadWrite
#
Base Commandmicrosoft-atp-sc-indicator-get-by-id
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | The ID of the indicator to get. The ID can be retrieved by running the microsoft-atp-sc-indicator-list command. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values: "unknown", "allow", "block", and "alert". |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.expirationTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.severity | String | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium" and "High", where High is the most severe and Informational is not severe at all. |
MicrosoftATP.Indicators.indicatorValue | String | The value of the indicator. |
MicrosoftATP.Indicators.recommendedActions | String | Recommended actions for the indicator. |
MicrosoftATP.Indicators.generateAlert | Boolean | Whether an alert was generated. |
MicrosoftATP.Indicators.rbacGroupNames | Unknown | A list of RBAC device group names where the indicator is exposed and active. Empty list if it is exposed to all devices. |
MicrosoftATP.Indicators.mitreTechniques | Unknown | A list of MITRE techniques. |
MicrosoftATP.Indicators.indicatorType | String | Indicator Type. Possible values: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url". |
MicrosoftATP.Indicators.lastUpdateTime | Date | The last time the indicator was updated. |
MicrosoftATP.Indicators.createdByDisplayName | String | Display name of the created app. |
MicrosoftATP.Indicators.application | String | The application associated with the indicator. |
MicrosoftATP.Indicators.title | String | Indicator title. |
MicrosoftATP.Indicators.createdBySource | String | Source of indicator creation. For example, PublicApi. |
MicrosoftATP.Indicators.historicalDetection | Boolean | Whether a historical detection exists. |
MicrosoftATP.Indicators.lastUpdatedBy | String | Identity of the user/application that last updated the indicator. |
MicrosoftATP.Indicators.creationTimeDateTimeUtc | Date | The date and time when the indicator was created. |
MicrosoftATP.Indicators.category | Number | An number representing the indicator category. |
MicrosoftATP.Indicators.createdBy | String | Unique identity of the user/application that submitted the indicator. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
Domain.Name | String | The domain name, for example: "google.com". |
IP.Address | String | IP address. |
URL.Data | String | The URL. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!microsoft-atp-sc-indicator-get-by-id indicator_id=5142
#
Context Example#
Human Readable Output#
Results found in Microsoft Defender ATP SC for value: 1.1.1.1
id action indicatorValue indicatorType severity title description 5142 Allowed 1.1.1.1 IpAddress Low title description
#
microsoft-atp-sc-indicator-deleteDeletes the specified indicator.
#
PermissionsTi.ReadWrite
#
Base Commandmicrosoft-atp-sc-indicator-delete
#
InputArgument Name | Description | Required |
---|---|---|
indicator_id | The ID of the indicator to delete. The ID can be retrieved by running the microsoft-atp-sc-indicator-list command. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!microsoft-atp-sc-indicator-delete indicator_id=5142
#
Human Readable OutputIndicator ID: 5142 was successfully deleted
#
microsoft-atp-sc-indicator-create
Creates a new indicator.
#
PermissionsTi.ReadWrite
#
Base Commandmicrosoft-atp-sc-indicator-create
#
InputArgument Name | Description | Required |
---|---|---|
indicator_value | The value of the indicator to update. | Required |
indicator_type | Indicator Type. Possible values are: FileSha1, FileSha256, IpAddress, DomainName, Url. | Required |
action | The action taken if the indicator is discovered in the organization. Possible values are: Alert, AlertAndBlock, Allowed. | Required |
severity | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium", and "High", where High is the most severe and Informational is not severe at all. | Optional |
expiration_time | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). Default is 14 days. | Optional |
indicator_description | Brief description (100 characters or less) of the threat represented by the indicator. | Required |
indicator_title | Indicator alert title. | Required |
indicator_application | The application associated with the indicator. | Optional |
recommended_actions | TI indicator alert recommended actions. | Optional |
rbac_group_names | Comma-separated list of RBAC group names the indicator is applied to. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.id | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.action | String | The action to apply if the indicator is matched from within the targetProduct security tool. Possible values: "unknown", "allow", "block", "alert". |
MicrosoftATP.Indicators.description | String | Brief description (100 characters or less) of the threat represented by the indicator. |
MicrosoftATP.Indicators.expirationTime | Date | DateTime string indicating when the indicator expires. To avoid stale indicators persisting in the system, all indicators must have an expiration date. The timestamp type represents date and time information in ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like: '2014-01-01T00:00:00Z' |
MicrosoftATP.Indicators.severity | String | The severity of the malicious behavior identified by the data within the indicator. Possible values: "Informational", "Low", "Medium", and "High", where High is the most severe and Informational is not severe at all. |
MicrosoftATP.Indicators.indicatorValue | String | The value of the indicator. |
MicrosoftATP.Indicators.recommendedActions | String | Recommended actions for the indicator. |
MicrosoftATP.Indicators.generateAlert | Boolean | Whether an alert was generated. |
MicrosoftATP.Indicators.rbacGroupNames | Unknown | A list of RBAC device group names where the indicator is exposed and active. Empty list if it is exposed to all devices. |
MicrosoftATP.Indicators.mitreTechniques | Unknown | A list of MITRE techniques. |
MicrosoftATP.Indicators.indicatorType | String | Type of the indicator. Possible values: "FileSha1", "FileSha256", "IpAddress", "DomainName" and "Url". |
MicrosoftATP.Indicators.lastUpdateTime | Date | The last time the indicator was updated. |
MicrosoftATP.Indicators.createdByDisplayName | String | Display name of the created app. |
MicrosoftATP.Indicators.application | String | The application associated with the indicator. |
MicrosoftATP.Indicators.title | String | Indicator title. |
MicrosoftATP.Indicators.createdBySource | String | Source of indicator creation. For example, PublicApi. |
MicrosoftATP.Indicators.historicalDetection | Boolean | Whether a historical detection exists. |
MicrosoftATP.Indicators.lastUpdatedBy | String | Identity of the user/application that last updated the indicator. |
MicrosoftATP.Indicators.creationTimeDateTimeUtc | Date | The date and time when the indicator was created. |
MicrosoftATP.Indicators.category | Number | An number representing the indicator category. |
MicrosoftATP.Indicators.createdBy | String | Unique identity of the user/application that submitted the indicator. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
Domain.Name | String | The domain name, for example: "google.com". |
IP.Address | String | IP address. |
URL.Data | String | The URL. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!microsoft-atp-sc-indicator-create action=Allowed indicator_description=test indicator_title=title indicator_type=IpAddress indicator_value=2.2.2.2 expiration_time="1 day" severity=Informational
#
Context Example#
Human Readable Output#
Indicator 2.2.2.2 was updated successfully.
id action indicatorValue indicatorType severity title description 5143 Allowed 2.2.2.2 IpAddress Informational title test
#
microsoft-atp-list-machines-by-vulnerabilityRetrieves a list of machines affected by a vulnerability.
#
Required PermissionsVulnerability.Read.All
#
Base Commandmicrosoft-atp-list-machines-by-vulnerability
#
InputArgument Name | Description | Required |
---|---|---|
cve_id | A comma-separated list of CVE IDs used for getting the machines. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.CveMachine.ID | String | The machine ID. |
MicrosoftATP.CveMachine.ComputerDNSName | String | The machine hostname. |
MicrosoftATP.CveMachine.OSPlatform | String | The operating system platform. |
MicrosoftATP.CveMachine.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.CveMachine.CVE | Unknown | The given CVE IDs related to this machine. |
#
Command example!microsoft-atp-list-machines-by-vulnerability cve_id=CVE-2021-32810,CVE-2020-12321
#
Context Example#
Human Readable Output#
Microsoft Defender ATP machines by vulnerabilities: ['CVE-2021-32810', 'CVE-2020-12321']
ID ComputerDNSName OSPlatform RBACGroupID CVE f3bba49a ec2amaz WindowsServer2016 0 CVE-2021-32810,CVE-2020-12321 48a62a74 msde-agent-host-centos7 Linux 0 CVE-2020-12321
#
microsoft-atp-get-file-infoRetrieves file information by a file hash (SHA1 or SHA256).
#
Required PermissionsFile.Read.All
#
Base Commandmicrosoft-atp-get-file-info
#
InputArgument Name | Description | Required |
---|---|---|
hash | A comma-separated list of file hashes (SHA1 or SHA256) used for getting the file information. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.File.Sha1 | String | The SHA1 hash of the file. |
MicrosoftATP.File.Md5 | String | The MD5 hash of the file. |
MicrosoftATP.File.Sha256 | String | The SHA256 hash of the file. |
MicrosoftATP.File.GlobalPrevalence | Number | The file prevalence across the organization. |
MicrosoftATP.File.GlobalFirstObserved | Date | The first time the file was observed. |
MicrosoftATP.File.GlobalLastObserved | Date | The last time the file was observed. |
MicrosoftATP.File.Size | Number | The size of the file. |
MicrosoftATP.File.FileType | String | The type of the file. |
MicrosoftATP.File.IsPeFile | Boolean | True if the file is portable executable, False otherwise. |
MicrosoftATP.File.FilePublisher | String | The file's publisher. |
MicrosoftATP.File.FileProductName | String | The file product name. |
MicrosoftATP.File.Signer | String | The file signer. |
MicrosoftATP.File.Issuer | String | The file issuer. |
MicrosoftATP.File.SignerHash | String | The hash of the signing certificate. |
MicrosoftATP.File.IsValidCertificate | Boolean | Was signing certificate successfully verified by Microsoft Defender ATP agent. |
MicrosoftATP.File.DeterminationValue | String | The file determination value. |
MicrosoftATP.File.DeterminationType | String | The file determination type. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.Type | String | The file type. |
File.Size | Number | The file size. |
#
Command example!microsoft-atp-get-file-info hash="3395856ce81,db79e9e669c"
#
Context Example#
Human Readable Output#
Microsoft Defender ATP file info by hashes: ['3395856ce81', 'db79e9e669c']
Sha1 Sha256 Size 3395856ce81 275a021bbfb648 68 db79e9e669c ef67e4b2bb4ee5 36768
#
endpointGets machines that have communicated with Microsoft Defender for Endpoint cloud. At least one of the following arguments is required ip, hostanme ot id. Otherwise, an error appears.
#
Required PermissionsMachine.Read.All Machine.ReadWrite.All
#
Base Commandendpoint
#
InputArgument Name | Description | Required |
---|---|---|
id | The endpoint ID. | Optional |
ip | The endpoint IP address. | Optional |
hostname | The endpoint hostname. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Endpoint.ID | String | The endpoint's identifier. |
Endpoint.Hostname | String | The hostname of the endpoint. |
Endpoint.OS | String | The endpoint's operating system. |
Endpoint.OSVersion | String | The endpoint's operating system's version. |
Endpoint.IPAddress | String | The endpoint's IP address. |
Endpoint.Status | String | The health status of the endpoint. |
Endpoint.MACAddress | String | The endpoint's MAC address. |
Endpoint.Vendor | String | The integration name of the endpoint vendor. |
MicrosoftATP.Machine.ID | String | The machine ID. |
MicrosoftATP.Machine.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Machine.FirstSeen | Date | The first date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.LastSeen | Date | The last date and time where the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.OSPlatform | String | The operating system platform. |
MicrosoftATP.Machine.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.Machine.LastIPAddress | String | The last IP on the machine. |
MicrosoftATP.Machine.LastExternalIPAddress | String | The last machine IP to access the internet. |
MicrosoftATP.Machine.OSBuild | Number | The operating system build number. |
MicrosoftATP.Machine.HealthStatus | String | The machine health status. |
MicrosoftATP.Machine.RBACGroupID | Number | The machine RBAC group ID. |
MicrosoftATP.Machine.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.Machine.RiskScore | String | The machine risk score. |
MicrosoftATP.Machine.ExposureLevel | String | The machine exposure score. |
MicrosoftATP.Machine.IsAADJoined | Boolean | True if machine is AAD joined, False otherwise. |
MicrosoftATP.Machine.AADDeviceID | String | The AAD Device ID. |
MicrosoftATP.Machine.MachineTags | String | Set of machine tags. |
MicrosoftATP.Machine.IPAddresses.ipAddress | String | The machine IP address. |
MicrosoftATP.Machine.IPAddresses.MACAddress | String | The machine MAC address. |
MicrosoftATP.Machine.IPAddresses.operationalStatus | String | The machine operational status. |
MicrosoftATP.Machine.IPAddresses.type | String | The machine macine IP address type. |
MicrosoftATP.Machine.AgentVersion | String | The machine Agent version. |
#
Command example!endpoint id="f3bba49a,48a62a74"ip=1.2.3.4 hostname="ec2amaz-ua9hieu"
#
Context Example#
Human Readable Output#
Microsoft Defender ATP Machine:
ID ComputerDNSName OSPlatform LastIPAddress LastExternalIPAddress HealthStatus RiskScore ExposureLevel f3bba49a ec2amaz-ua9hieu WindowsServer2016 1.2.3.4 127.0.0.1 Active None High
#
microsoft-atp-indicator-batch-updateUpdates batch of indicator. If an indicator does not exist, a new indicator will be created.
#
Required PermissionsTi.ReadWrite Ti.ReadWrite.All
#
Limitations- Rate limitations for this API are 30 calls per minute.
- There is a limit of 15,000 active indicators per tenant.
- Maximum batch size for one API call is 500.
#
NotePlease read here about the Microsoft Defender for Endpoint indicator resource type. We suggest using the TransformIndicatorToMSDefenderIOC automation to load the XSOAR IOCs to MSDE indicator format.
#
Base Commandmicrosoft-atp-indicator-batch-update
#
InputArgument Name | Description | Required |
---|---|---|
indicator_batch | A JSON object with a list of MS defender ATP indicators to update. The indicator_batch query should be a list of dictionaries. For example: [{"indicatorValue": "value1"}, {"indicatorValue": "value2"}]. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Indicators.ID | String | Created by the system when the indicator is ingested. Generated GUID/unique identifier. |
MicrosoftATP.Indicators.Value | String | The value of the indicator. |
MicrosoftATP.Indicators.FailureReason | String | The reason for update failure. |
MicrosoftATP.Indicators.IsFailed | Boolean | Whether the update failed. |
#
Command example``!microsoft-atp-indicator-batch-update indicator_batch=
[{"indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f","indicatorType": "FileSha1","title": "demo","application": "demo-test", "action": "Alert","severity": "Informational","description": "demo2","recommendedActions": "nothing","rbacGroupNames": ["group1", "group2"]},{"indicatorValue": "2233223322332233223322332233223322332233223322332233223322332222","indicatorType": "FileSha256","title": "demo2","application": "demo-test2","action": "Alert","severity": "Medium","description": "demo2","recommendedActions": "nothing","rbacGroupNames": []}]````
#
Context Example#
Human Readable Output#
Indicators updated successfully.
ID Value IsFailed 5217 220e7d15b011d7fac48f2bd61114db1022197f7f false 5218 2233223322332233223322332233223322332233223322332233223322332222 false
#
microsoft-atp-get-alert-by-idRetrieves specific alert by the given alert ID.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-alert-by-id
#
InputArgument Name | Description | Required |
---|---|---|
alert_ids | A comma-separated list of alert IDs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Alert.ID | String | The alert ID. |
MicrosoftATP.Alert.IncidentID | Number | The incident ID of the alert. |
MicrosoftATP.Alert.InvestigationID | Number | The investigation ID related to the alert. |
MicrosoftATP.Alert.InvestigationState | String | The current state of the Investigation. |
MicrosoftATP.Alert.AssignedTo | String | The owner of the alert. |
MicrosoftATP.Alert.Severity | String | The severity of the alert. |
MicrosoftATP.Alert.Status | String | The current status of the alert. |
MicrosoftATP.Alert.Classification | String | The alert Classification. |
MicrosoftATP.Alert.Determination | String | The determination of the alert. |
MicrosoftATP.Alert.DetectionSource | String | The detection source. |
MicrosoftATP.Alert.Category | String | The category of the alert. |
MicrosoftATP.Alert.ThreatFamilyName | String | The threat family. |
MicrosoftATP.Alert.Title | String | The alert title. |
MicrosoftATP.Alert.Description | String | The alert description. |
MicrosoftATP.Alert.AlertCreationTime | Date | The date and time the alert was created. |
MicrosoftATP.Alert.FirstEventTime | Date | The first event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastEventTime | Date | The last event time that triggered the alert on that machine. |
MicrosoftATP.Alert.LastUpdateTime | Date | The UTC time of the last update. |
MicrosoftATP.Alert.ResolvedTime | Date | The date and time when the status of the alert was changed to 'Resolved'. |
MicrosoftATP.Alert.MachineID | String | The machine ID that is associated with the alert. |
MicrosoftATP.Alert.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Alert.AADTenantID | String | The AAD tenant ID. |
MicrosoftATP.Alert.Comments.Comment | String | The alert comment string. |
MicrosoftATP.Alert.Comments.CreatedBy | String | The alert comment created by string. |
MicrosoftATP.Alert.Comments.CreatedTime | Date | The alert comment created time date. |
MicrosoftATP.Alert.Evidence | Unknown | Evidence related to the alert. |
MicrosoftATP.Alert.DetectorID | String | The ID of the detector that triggered the alert. |
MicrosoftATP.Alert.ThreatName | String | The threat name. |
MicrosoftATP.Alert.RelatedUser | String | Details of the user related to a specific alert. |
MicrosoftATP.Alert.MitreTechniques | String | MITRE Enterprise technique ID. |
MicrosoftATP.Alert.RBACGroupName | String | The device RBAC group name. |
#
Command example!microsoft-atp-get-alert-by-id alert_ids=da637797972607470400_795854214,da637750706361180181_-1167994114
#
Context Example#
Human Readable Output#
Microsoft Defender ATP Alerts Info for IDs ['da637797972607470400795854214', 'da637750706361180181-1167994114']:
ID Title Description IncidentID Severity Status Classification Category MachineID da637797972607470400_795854214 Automated investigation started manually MS Graph ATP (Application Id: 1281a70f-8ffb-4b3c-bc82-eef2a44dbb2a) initiated an Automated investigation on msde-agent-host-win2016-dc.msde.lab.demisto.
The investigation automatically identifies and reviews threat artifacts for possible remediation.
Details: testing645 Informational Resolved SuspiciousActivity 96444b946be252d1f4550354edef5fdc23aca2c5 da637750706361180181_-1167994114 Automated investigation started manually MS Graph ATP (Application Id: 1281a70f-8ffb-4b3c-bc82-eef2a44dbb2a) initiated an Automated investigation on desktop-s2455r8.
The investigation automatically identifies and reviews threat artifacts for possible remediation.
Details: testing510 Informational Resolved TruePositive SuspiciousActivity 4899036531e374137f63289c3267bad772c13fef
#
microsoft-atp-live-response-put-filePuts a file from the library to the device. Files are saved in a working folder and are deleted when the device restarts by default.
#
Base Commandmicrosoft-atp-live-response-put-file
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | Machine ID to add file to. | Required |
comment | A comment to associate with the action. | Required |
file_name | File name to take from library to device. | Required |
machine_action_id | Action ID to retrieve status and data for. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.LiveResponseAction.id | String | The machine action ID. |
MicrosoftATP.LiveResponseAction.type | String | The machine action type. |
MicrosoftATP.LiveResponseAction.title | String | The machine action title. |
MicrosoftATP.LiveResponseAction.requestor | String | The machine action requestor. |
MicrosoftATP.LiveResponseAction.requestorComment | String | The machine action requestorComment. |
MicrosoftATP.LiveResponseAction.status | String | The machine action status. |
MicrosoftATP.LiveResponseAction.machineId | String | The machine ID. |
MicrosoftATP.LiveResponseAction.computerDnsName | String | The computerDnsName. |
MicrosoftATP.LiveResponseAction.creationDateTimeUtc | Date | The action creationDateTimeUtc. |
MicrosoftATP.LiveResponseAction.lastUpdateDateTimeUtc | Date | The machine action lastUpdateDateTimeUtc. |
MicrosoftATP.LiveResponseAction.cancellationRequestor | String | The machine action cancellationRequestor. |
MicrosoftATP.LiveResponseAction.cancellationComment | String | The machine action cancellationComment. |
MicrosoftATP.LiveResponseAction.cancellationDateTimeUtc | String | The cancellationDateTimeUtc. |
MicrosoftATP.LiveResponseAction.errorHResult | String | The errorHResult if exists. |
MicrosoftATP.LiveResponseAction.scope | String | The action scope. |
MicrosoftATP.LiveResponseAction.externalId | String | The machine action externalId. |
MicrosoftATP.LiveResponseAction.requestSource | String | The machine action requestSource. |
MicrosoftATP.LiveResponseAction.relatedFileInfo | String | The machine action relatedFileInfo. |
MicrosoftATP.LiveResponseAction.commands.index | String | The machine action command index. |
MicrosoftATP.LiveResponseAction.commands.startTime | String | The machine action command startTime. |
MicrosoftATP.LiveResponseAction.commands.endTime | String | The machine action command endTime. |
MicrosoftATP.LiveResponseAction.commands.commandStatus | String | The machine action command Status. |
MicrosoftATP.LiveResponseAction.commands.errors | String | The machine action command errors if found. |
MicrosoftATP.LiveResponseAction.commands.command.type | String | The machine action command type. |
MicrosoftATP.LiveResponseAction.commands.command.params.key | String | The machine action command params key. |
MicrosoftATP.LiveResponseAction.commands.command.params.value | String | The machine action command params value. |
MicrosoftATP.LiveResponseAction.troubleshootInfo | String | The machine action troubleshootInfo. |
#
Command example!microsoft-atp-live-response-put-file machine_id="4899036531e374137f63289c3267bad772c13fef" comment="testing" file_name="C:\Users\demisto\Desktop\test.txt"
#
Context Example#
Human Readable Output#
Machine Action:
Commands Creation time Hostname Machine Action Id MachineId Status {'index': 0, 'startTime': None, 'endTime': None, 'commandStatus': 'Created', 'errors': [], 'command': {'type': 'PutFile', 'params': [{'key': 'FileName', 'value': 'C:\Users\demisto\Desktop\test.txt'}]}} 2022-02-07T10:32:14.1704612Z desktop-s2455r8 20d1de3f-acef-4715-8bed-a92223c5553c 4899036531e374137f63289c3267bad772c13fef Failed
#
microsoft-atp-live-response-run-scriptRuns a script from the library on a device. The Args parameter is passed to your script. Timeouts after 10 minutes.
#
Base Commandmicrosoft-atp-live-response-run-script
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | Machine ID to add file to. | Required |
comment | A comment to associate with the action. | Required |
scriptName | Script name to run on device. | Required |
arguments | Arguments to run the script with. | Optional |
machine_action_id | Action ID to retrieve status and data for. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.LiveResponseAction.script_name | String | The script name. |
MicrosoftATP.LiveResponseAction.exit_code | String | The script exit code. |
MicrosoftATP.LiveResponseAction.script_output | String | The script outputs. |
MicrosoftATP.LiveResponseAction.script_errors | String | The script errors if found. |
#
microsoft-atp-live-response-get-fileCollect file from a device. NOTE: Backslashes in path must be escaped.
#
Base Commandmicrosoft-atp-live-response-get-file
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | Machine ID to add file to. | Required |
comment | A comment to associate with the action. | Required |
path | File path to get from device. | Required |
machine_action_id | Action ID to retrieve status and data for. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.LiveResponseAction.id | String | The machine action ID. |
MicrosoftATP.LiveResponseAction.type | String | The machine action type. |
MicrosoftATP.LiveResponseAction.title | String | The machine action title. |
MicrosoftATP.LiveResponseAction.requestor | String | The machine action requestor. |
MicrosoftATP.LiveResponseAction.requestorComment | String | The machine action requestorComment. |
MicrosoftATP.LiveResponseAction.status | String | The machine action status. |
MicrosoftATP.LiveResponseAction.machineId | String | The machine ID. |
MicrosoftATP.LiveResponseAction.computerDnsName | String | The computerDnsName. |
MicrosoftATP.LiveResponseAction.creationDateTimeUtc | Date | The action creationDateTimeUtc. |
MicrosoftATP.LiveResponseAction.lastUpdateDateTimeUtc | Date | The machine action lastUpdateDateTimeUtc. |
MicrosoftATP.LiveResponseAction.cancellationRequestor | String | The machine action cancellationRequestor. |
MicrosoftATP.LiveResponseAction.cancellationComment | String | The machine action cancellationComment. |
MicrosoftATP.LiveResponseAction.cancellationDateTimeUtc | String | The cancellationDateTimeUtc. |
MicrosoftATP.LiveResponseAction.errorHResult | String | The errorHResult if exists. |
MicrosoftATP.LiveResponseAction.scope | String | The action scope. |
MicrosoftATP.LiveResponseAction.externalId | String | The machine action externalId. |
MicrosoftATP.LiveResponseAction.requestSource | String | The machine action requestSource. |
MicrosoftATP.LiveResponseAction.relatedFileInfo | String | The machine action relatedFileInfo. |
MicrosoftATP.LiveResponseAction.commands.index | String | The machine action command index. |
MicrosoftATP.LiveResponseAction.commands.startTime | String | The machine action command startTime. |
MicrosoftATP.LiveResponseAction.commands.endTime | String | The machine action command endTime. |
MicrosoftATP.LiveResponseAction.commands.commandStatus | String | The machine action command Status. |
MicrosoftATP.LiveResponseAction.commands.errors | String | The machine action command errors if found. |
MicrosoftATP.LiveResponseAction.commands.command.type | String | The machine action command type. |
MicrosoftATP.LiveResponseAction.commands.command.params.key | String | The machine action command params key. |
MicrosoftATP.LiveResponseAction.commands.command.params.value | String | The machine action command params value. |
MicrosoftATP.LiveResponseAction.troubleshootInfo | String | The machine action troubleshootInfo. |
#
microsoft-atp-live-response-resultGets a result file for a specified action.
#
Base Commandmicrosoft-atp-live-response-result
#
InputArgument Name | Description | Required |
---|---|---|
machine_action_id | Action ID to retrieve status and data for. | Required |
command_index | A command index to retrieve file for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.LiveResponseAction | String | The machine action ID. |
#
Command example!microsoft-atp-live-response-result machine_action_id=11a86b87-12b8-423b-9e8d-9775ab2da78f command_index=0
#
Context Example#
Human Readable Outputfile_link: https://automatedirstrprdeus.blob.core.windows.net/investigation-actions-data/b7df6ab7-5c73-4e13-8cd3-82e1f3d849ed/CustomPlaybookCommandOutput/7ef257a5069c45fe790be86d479d1518?se=2022-02-07T14%3A33%3A07Z&sp=rt&sv=2020-06-12&sr=b&rscd=attachment%3B%20filename%3Doutput_11a86b87-12b8-423b-9e8d-9775ab2da78f_0.json&skoid=34334208-452d-4d6d-afc6-0c319d62a726&sktid=124edf19-b350-4797-aefc-3206115ffdb3&skt=2022-02-07T13%3A48%3A07Z&ske=2022-02-07T14%3A33%3A07Z&sks=b&skv=2020-06-12&sig=IRxMKavzQqHplTsAL350holkkm%2B3NI2mhUUWxaHbOAM%3D
#
microsoft-atp-advanced-hunting-lateral-movement-evidence
Detects evidence of attempted lateral movement. When you select a “query_purpose” argument, a designated query template is used.
#
Base Commandmicrosoft-atp-advanced-hunting-lateral-movement-evidence
#
InputArgument Name | Description | Required |
---|---|---|
query_purpose | When you select a “query_purpose” argument, a designated query template is used. "network_connections" - The network connections initiated by the host/file to other internal hosts. "smb_connections" - SMB connections. "credential_dumping" - Was there a use of credential dumping? If so can we detect the use of the dumped users on other hosts on the network. "management_connection" - Management connection attempts to other hosts. | Required |
device_name | Device name to look for. | Optional |
remote_ip_count | Threshold for network enumeration in smb_connection. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | The maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntLateralMovementEvidence.Result.network_connections | String | The query results for network_connections query_purpose. |
MicrosoftATP.HuntLateralMovementEvidence.Result.smb_connections | String | The query results for smb_connections query_purpose. |
MicrosoftATP.HuntLateralMovementEvidence.Result.credential_dumping | String | The query results for credential_dumping query_purpose. |
MicrosoftATP.HuntLateralMovementEvidence.Result.management_connection | String | The query results for management_connection query_purpose. |
#
Command example!microsoft-atp-advanced-hunting-lateral-movement-evidence query_purpose=network_connections device_name=devicename_2,devicename_1 limit=6
#
Context Example#
Human Readable Output#
Lateral Movement Evidence Hunt (network_connections) Results
DeviceName RemoteIP RemotePort TotalConnections devicename_2 ip1 54296 21
#
Command example!microsoft-atp-advanced-hunting-lateral-movement-evidence query_purpose=smb_connections device_name=devicename_1
#
Context Example#
Human Readable Output#
Lateral Movement Evidence Hunt (smb_connections) Results
DeviceName InitiatingProcessCreationTime InitiatingProcessFileName InitiatingProcessId RemoteIPCount devicename_1 2022-03-03T19:43:46.4373311Z powershell.exe 5748 5 devicename_1 2022-03-03T19:51:43.2411889Z powershell_ise.exe 10084 17
#
Command example!microsoft-atp-advanced-hunting-lateral-movement-evidence query_purpose="management_connection" device_id="4cceb3c642212014e0e9553aa8b59e999ea515ff" query_operation="or" limit="50" timeout="10"
#
Context Example#
Human Readable Output#
Lateral Movement Evidence Hunt (management_connection) Results
DeviceName LocalIP RemoteIP RemotePort TotalCount device_name ip3 ip4 135 41 device_name ip3 ip3 139 1
#
microsoft-atp-advanced-hunting-persistence-evidenceDetects evidence of persistence. When you select a “query_purpose” argument, a designated query template is used.
#
Base Commandmicrosoft-atp-advanced-hunting-persistence-evidence
#
InputArgument Name | Description | Required |
---|---|---|
query_purpose | When you select a “query_purpose” argument, a designated query template is used. "scheduled_job" - Did the process create any scheduled jobs? "registry_entry" - Did it write to the registry? Requires also argument process_cmd to be provided. "startup_folder_changes" - Was anything added to the startup folder? "new_service_created" - Was a new service created? "service_updated" - Was an existing service edited? "file_replaced" - Was a file replaced in program files? "new_user" - Was a new user created? (On the local machine). "new_group" - Was a new group created? "group_user_change" - Was a user added to a group? (On the local machine) "local_firewall_change" - Was there a change to the local FW rules? "host_file_change" - Was there a change to the hosts file?. Possible values are: scheduled_job, registry_entry, startup_folder_changes, new_service_created, service_updated, file_replaced, new_user, new_group, group_user_change, local_firewall_change, host_file_change. | Required |
device_name | Device name to look for. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
process_cmd | Proccess command line that initiated the registry entry. Can only be used with "registry_entry" query_purpose. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntPersistenceEvidence.Result.scheduled_job | String | The query results for scheduled_job query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.registry_entry | String | The query results for registry_entry query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.startup_folder_changes | String | The query results for startup_folder_changes query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.new_service_created | String | The query results for new_service_created query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.service_updated | String | The query results for service_updated query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.file_replaced | String | The query results for file_replaced query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.new_user | String | The query results for new_user query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.new_group | String | The query results for new_group query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.group_user_change | String | The query results for group_user_change query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.local_firewall_change | String | The query results for local_firewall_change query_purpose. |
MicrosoftATP.HuntPersistenceEvidence.Result.host_file_change | String | The query results for host_file_change query_purpose. |
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=scheduled_job device_name=devicename_2 device_id=4cceb3c642212014e0e9553aa8b59e999ea515ff,96444b946be252d1f4550354edef5fdc23aca2c5 query_operation=or
#
Human Readable Output#
Persistence EvidenceHunt Hunt (scheduled_job) ResultsNo entries.
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=new_service_created file_name=installer,services
#
Context Example#
Human Readable Output#
Persistence EvidenceHunt Hunt (new_service_created) Results
DeviceName InitiatingProcessCommandLine InitiatingProcessFileName InitiatingProcessVersionInfoOriginalFileName InitiatingProcessVersionInfoProductName RegistryKey RegistryValueType Timestamp devicename_2 services.exe services.exe services.exe Microsoft® Windows® Operating System HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl49022091 None 2022-03-12T00:45:51.2745622Z devicename_2 services.exe services.exe services.exe Microsoft® Windows® Operating System HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl897892ef None 2022-03-13T00:45:49.9561415Z
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=new_user device_name=desktop
#
Context Example#
Human Readable Output#
Persistence EvidenceHunt Hunt (new_user) Results
AccountDomain AccountName AccountSid DeviceName InitiatingProcessAccountName InitiatingProcessLogonId Timestamp devicename_1 delete_me accound-sid devicename_1 demisto 74706995 2022-03-03T21:25:52.4538765Z
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=new_group device_id=deviceid device_name=desktop query_operation=and
#
Context Example#
Human Readable Output#
Persistence EvidenceHunt Hunt (new_group) Results
AdditionalFields DeviceName InitiatingProcessAccountName InitiatingProcessLogonId Timestamp {"GroupName":"Test_group_delete","GroupDomainName":"devicename_1","GroupSid":"S-1-5-21-4197691174-1403503641-4006700887-1006"} devicename_1 demisto 74706995 2022-03-03T21:26:30.8791017Z
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=group_user_change device_name=desktop
#
Context Example#
Human Readable Output#
Persistence EvidenceHunt Hunt (group_user_change) Results
AccountSid accound-sid
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=local_firewall_change device_name=desktop
#
Human Readable Output#
Persistence EvidenceHunt Hunt (local_firewall_change) ResultsNo entries.
#
Command example!microsoft-atp-advanced-hunting-persistence-evidence query_purpose=host_file_change device_name=desktop
#
Human Readable Output#
Persistence EvidenceHunt Hunt (host_file_change) ResultsNo entries.
#
microsoft-atp-advanced-hunting-process-detailsDetects process details. When you select a “query_purpose” argument, a designated query template is used.
#
Base Commandmicrosoft-atp-advanced-hunting-process-details
#
InputArgument Name | Description | Required |
---|---|---|
query_purpose | When you select a “query_purpose” argument, a designated query template is used. "parent_process" - Parent process. "grandparent_process" - Grandparent process. "process_details" - Process hash, path, signature details. "beaconing_evidence" - Does the process appear to be beaconing? "powershell_execution_unsigned_files" - Has the file executed PowerShell? Query without specifying processes. No additional arguments are required. "process_excecution_powershell" - Has the file executed PowerShell?. Possible values are: parent_process, grandparent_process, process_details, beaconing_evidence, powershell_execution_unsigned_files, process_excecution_powershell. | Required |
device_name | Device name to look for. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntProcessDetails.Result.parent_process | String | The query results for parent_process query_purpose. |
MicrosoftATP.HuntProcessDetails.Result.grandparent_process | String | The query results for grandparent_process query_purpose. |
MicrosoftATP.HuntProcessDetails.Result.process_details | String | The query results for process_details query_purpose. |
MicrosoftATP.HuntProcessDetails.Result.beaconing_evidence | String | The query results for beaconing_evidence query_purpose. |
MicrosoftATP.HuntProcessDetails.Result.powershell_execution_unsigned_files | String | The query results for powershell_execution_unsigned_files query_purpose. |
MicrosoftATP.HuntProcessDetails.Result.process_excecution_powershell | String | The query results for process_excecution_powershell query_purpose. |
#
Command example!microsoft-atp-advanced-hunting-process-details query_purpose=beaconing_evidence file_name=powershell device_name=desktop query_operation=and
#
Context Example#
Human Readable Output#
Process Details Hunt (beaconing_evidence) Results
ActionType DeviceId DeviceName InitiatingProcessFileName InitiatingProcessMD5 InitiatingProcessSHA1 InitiatingProcessSHA256 LocalIP LocalIPType LocalPort Protocol RemoteIP RemoteIPType RemotePort RemoteUrl Timestamp ConnectionSuccess deviceid_2 devicename_2 powershell.exe md5 sha1 sha256 ip1 Private 49169 Tcp ip3 Public 443 winatp-gw-eus.microsoft.com 2022-03-15T20:38:30.5393171Z ConnectionSuccess deviceid devicename_1 powershell.exe md5 sha1 sha256 ip2 Private 52110 Tcp ip3 Public 443 winatp-gw-eus.microsoft.com 2022-03-15T15:33:29.0892401Z
#
microsoft-atp-advanced-hunting-network-connectionsDetects network connections. When you select a “query_purpose” argument, a designated query template is used.
#
Base Commandmicrosoft-atp-advanced-hunting-network-connections
#
InputArgument Name | Description | Required |
---|---|---|
query_purpose | When you select a “query_purpose” argument, a designated query template is used. "external_addresses" - Network connections to external addresses. "dns_query" - DNS query. Query by providing hash or filename or specific processes. At least one of file arguments (file_name, sha1, sha256, md5) is required and one of device arguments (device_name, device_id). "encoded_commands" - Are there commands with base 64 encoding? Only device arguments are required (device_name, device_id), at least one. Possible values are: external_addresses, dns_query, encoded_commands. | Required |
device_name | Device name to look for. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntNetworkConnections.Result.external_addresses | String | The query results for external_addresses query_purpose. |
MicrosoftATP.HuntNetworkConnections.Result.dns_query | String | The query results for dns_query query_purpose. |
MicrosoftATP.HuntNetworkConnections.Result.encoded_commands | String | The query results for encoded_commands query_purpose. |
#
Command example!microsoft-atp-advanced-hunting-network-connections query_purpose=dns_query device_name=devicename_1,devicename_2
#
Context Example#
Human Readable Output#
Network Connections Hunt (dns_query) Results
ActionType DeviceName Packetinfo RemoteIP Timestamp NetworkSignatureInspected devicename_2 {"SignatureName":"DNS_Request","SignatureMatchedContent":"h%D4%01%00%00%01%00%00%00%00%00%00%05ctldl%0Dwindowsupdate%03com","SamplePacketContent":"[\"h%D4%01%00%00%01%00%00%00%00%00%00%05ctldl%0Dwindowsupdate%03com%00%00%01%00%01\"]"} 8.8.8.8 2022-03-15T20:01:20.3307099Z NetworkSignatureInspected devicename_2 {"SignatureName":"DNS_Request","SignatureMatchedContent":"%B0%C5%01%00%00%01%00%00%00%00%00%00%06us-v20%06events%04data%09microsoft%03com","SamplePacketContent":"[\"%B0%C5%01%00%00%01%00%00%00%00%00%00%06us-v20%06events%04data%09microsoft%03com%00%00%01%00%01\"]"} 8.8.8.8 2022-03-15T20:01:20.3327319Z
#
microsoft-atp-advanced-hunting-cover-upDetects cover up actions. When you select a “query_purpose” argument, a designated query template is used.
#
Base Commandmicrosoft-atp-advanced-hunting-cover-up
#
InputArgument Name | Description | Required |
---|---|---|
query_purpose | When you select a “query_purpose” argument, a designated query template is used. "file_deleted" - Did the file delete itself? "event_log_cleared" - Was the event log cleared? Requires at least one of device arguments (device_name/device_id). "compromised_information" - Information on a compromised user and Its activities Requires only username argument. "connected_devices" - All connected devices by compromised user Requires only username argument. "action_types" - All action types created by a user on each machine Requires only username argument. "common_files" - Most common files associated with a user Requires only username argument. Possible values are: file_deleted, event_log_cleared, compromised_information, connected_devices, action_types, common_files. | Required |
device_name | Device name to look for. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
username | Username to look for in relevant query types. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntCoverUp.Result.file_deleted | String | The query results for file_deleted query_purpose. |
MicrosoftATP.HuntCoverUp.Result.event_log_cleared | String | The query results for event_log_cleared query_purpose. |
MicrosoftATP.HuntCoverUp.Result.compromised_information | String | The query results for compromised_information query_purpose. |
MicrosoftATP.HuntCoverUp.Result.connected_devices | String | The query results for connected_devices query_purpose. |
MicrosoftATP.HuntCoverUp.Result.action_types | String | The query results for action_types query_purpose. |
MicrosoftATP.HuntCoverUp.Result.common_files | String | The query results for common_files query_purpose. |
#
Command example!microsoft-atp-advanced-hunting-cover-up query_purpose=file_deleted file_name=chrome device_name=desktop query_operation=and
#
Context Example#
Human Readable Output#
Cover Up Hunt (file_deleted) Results
DeviceId DeviceName FileName FolderPath InitiatingProcessCommandLine InitiatingProcessFileName InitiatingProcessVersionInfoProductName Timestamp deviceid devicename_1 old_chrome_proxy.exe C:\Program Files\Google\Chrome\Temp\scoped_dir9640_1501542081 "setup.exe" --rename-chrome-exe --system-level --verbose-logging --channel=stable setup.exe Google Chrome Installer 2022-03-10T09:41:21.9388696Z deviceid devicename_1 old_chrome_proxy.exe C:\Program Files\Google\Chrome\Temp\scoped_dir9640_1501542081 "setup.exe" --rename-chrome-exe --system-level --verbose-logging --channel=stable setup.exe Google Chrome Installer 2022-03-10T09:41:21.9390745Z deviceid devicename_1 chrome_pwa_launcher.exe C:\Program Files\Google\Chrome\Application\98.0.4758.102 "setup.exe" --channel=stable --delete-old-versions --system-level --verbose-logging setup.exe Google Chrome Installer 2022-03-10T09:41:37.3955125Z deviceid devicename_1 chrome_pwa_launcher.exe C:\Program Files\Google\Chrome\Application\98.0.4758.102 "setup.exe" --channel=stable --delete-old-versions --system-level --verbose-logging setup.exe Google Chrome Installer 2022-03-10T09:41:37.3957224Z deviceid devicename_1 99.0.4844.51_98.0.4758.102_chrome_updater.exe C:\Program Files (x86)\Google\Update\Install{CD86F442-5CCD-4E90-B0AC-36D19A65A0C5} "GoogleUpdate.exe" /svc GoogleUpdate.exe Google Update 2022-03-08T13:29:06.7875767Z deviceid devicename_1 99.0.4844.51_98.0.4758.102_chrome_updater.exe C:\Program Files (x86)\Google\Update\Install{CD86F442-5CCD-4E90-B0AC-36D19A65A0C5} "GoogleUpdate.exe" /svc GoogleUpdate.exe Google Update 2022-03-08T13:29:06.7877821Z
#
Command example!microsoft-atp-advanced-hunting-cover-up query_purpose=event_log_cleared device_name=devicename_1
#
Context Example#
Human Readable Output#
Cover Up Hunt (event_log_cleared) Results
ClearedLogList DeviceId DeviceName FileName InitiatingProcessFileName LogClearCount Timestamp "wevtutil.exe" clear-log System,
"wevtutil.exe" cl Systemdeviceid devicename_1 wevtutil.exe powershell.exe 2 2022-03-09T07:15:00Z
#
Command example!microsoft-atp-advanced-hunting-cover-up query_purpose=compromised_information username=demisto
#
Context Example#
Human Readable Output#
Cover Up Hunt (compromised_information) Results
ActionType DeviceId DeviceName InitiatingProcessFileName Timestamp LogonSuccess deviceid devicename_1 lsass.exe 2022-03-16T08:05:44.8315718Z LogonSuccess deviceid devicename_1 lsass.exe 2022-02-28T12:34:02.8853766Z LogonSuccess deviceid devicename_1 2022-02-28T12:34:02.8855892Z LogonSuccess deviceid devicename_1 lsass.exe 2022-02-28T12:34:05.6575357Z LogonAttempted deviceid devicename_1 svchost.exe 2022-02-28T12:34:05.7005903Z LogonFailed deviceid devicename_1 2022-03-16T08:05:36.0887779Z
#
microsoft-atp-advanced-hunting-file-originHow did the file get on the machine. Possible details are "dropped_file" - Was the file dropped? From where? "created_file" - Created by another File (script, compiled binary). "network_shared" - Shared via network. "execution_chain" - What is the process execution chain.
#
Base Commandmicrosoft-atp-advanced-hunting-file-origin
#
InputArgument Name | Description | Required |
---|---|---|
device_name | Device name to look for. | Optional |
file_name | File name to look for. | Optional |
sha1 | SHA1 hash to look for. | Optional |
sha256 | SHA256 hash to look for. | Optional |
md5 | MD5 hash to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntFileOrigin.Result | String | The query results. |
#
microsoft-atp-advanced-hunting-privilege-escalationIs there evidence for privilege escalation.
#
Base Commandmicrosoft-atp-advanced-hunting-privilege-escalation
#
InputArgument Name | Description | Required |
---|---|---|
device_name | Device name to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntPrivilegeEscalation.Result | String | The query results. |
#
microsoft-atp-advanced-hunting-tamperingDetect if there was any evidence of MSDE agent/sensor manipulation.
#
Base Commandmicrosoft-atp-advanced-hunting-tampering
#
InputArgument Name | Description | Required |
---|---|---|
device_name | Device name to look for. | Optional |
device_id | Device ID to look for. | Optional |
query_operation | Query operator to use with provided arguments. Possible values are: or, and. Default is or. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
time_range | Time range to look back. Expected syntax is a human readable time range, e.g. 60 minutes, 6 hours, 1 day, etc. | Optional |
timeout | The amount of time (in seconds) that a request waits for the query response before a timeout occurs. Default is 10. | Optional |
page | The page number from which to start a search. Default is 1. | Optional |
show_query | Show the query as part of the entry result. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.HuntTampering.Result | String | The query results. |
#
microsoft-atp-live-response-cancel-actionCancels an action with an unfinished status.
#
Base Commandmicrosoft-atp-live-response-cancel-action
#
InputArgument Name | Description | Required |
---|---|---|
machine_action_id | Action ID to retrieve status and data for. | Required |
comment | A comment to associate with the action. | Required |
#
Context OutputThere is no context output for this command.
#
microsoft-atp-get-machine-usersRetrieves a collection of logged on users on a specific device.
#
Required PermissionsUser.Read.All
#
Base Commandmicrosoft-atp-get-machine-users
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A machine ID used for getting logged on users. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineUser.ID | String | The user ID. |
MicrosoftATP.MachineUser.AccountName | String | The user account name. |
MicrosoftATP.MachineUser.AccountDomain | String | The domain of the user account. |
MicrosoftATP.MachineUser.FirstSeen | Date | The first date and time the user has logged on the machine. |
MicrosoftATP.MachineUser.LastSeen | Date | The last date and time the user has logged on the machine. |
MicrosoftATP.MachineUser.LogonTypes | String | The logon types of the user on the machine. |
MicrosoftATP.MachineUser.DomainAdmin | Boolean | True if user is Domain Admin, False otherwise. |
MicrosoftATP.MachineUser.NetworkUser | Boolean | True if user is network user, False otherwise. |
MicrosoftATP.MachineUser.MachineID | String | The machine ID. |
#
Command example!microsoft-atp-get-machine-users machine_id=0a3250e0693a109f1affc9217be9459028aa8424
#
Context Example#
Human Readable Output#
Microsoft Defender ATP logon users for machine 111e6dd8c833c8a052ea231ec1b19adaf497b625:
ID AccountName AccountDomain FirstSeen LastSeen LogonTypes DomainAdmin NetworkUser contoso\user1 user1 contoso 2019-12-18T08:02:54Z 2020-01-06T08:01:48Z Interactive True False
#
microsoft-atp-get-machine-alertsRetrieves all alerts related to a specific device.
#
Required PermissionsAlert.ReadWrite.All
#
Base Commandmicrosoft-atp-get-machine-alerts
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A machine ID used for getting machine related alerts, e.g. 0a3250e0693a109f1affc9217be9459028aa8424. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAlerts.ID | String | The alert ID. |
MicrosoftATP.MachineAlerts.Title | String | The alert title. |
MicrosoftATP.MachineAlerts.Description | String | The alert description. |
MicrosoftATP.MachineAlerts.IncidentID | String | The incident ID, if alert belongs to one. |
MicrosoftATP.MachineAlerts.Severity | String | The alert severtiy. |
MicrosoftATP.MachineAlerts.Status | String | The alert status. |
MicrosoftATP.MachineAlerts.Classification | String | The alert classification. |
MicrosoftATP.MachineAlerts.Category | String | The alert category. |
MicrosoftATP.MachineAlerts.ThreatFamilyName | String | The alert threat family name. |
MicrosoftATP.MachineAlerts.MachineID | String | The alerts machine ID. |
#
Command example!microsoft-atp-get-machine-alerts machine_id=0a3250e0693a109f1affc9217be9459028aa8424
#
Context Example#
Human Readable Output#
Alerts that are related to machine 111e6dd8c833c8a052ea231ec1b19adaf497b625:
ID Title Description IncidentID Severity Status Classification Category ThreatFamilyName MachineID da637472900382838869_1364969609 Low-reputation arbitrary code executed by signed executable Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server. 1126093 Low New Execution 111e6dd8c833c8a052ea231ec1b19adaf497b625
#
microsoft-atp-offboard-machineOffboard a machine from microsoft ATP.
#
Required PermissionsMachine.Offboard
#
Base Commandmicrosoft-atp-offboard-machine
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs to be used for offboarding. e.g., 0a3250e0693a109f1affc9217be9459028aa8426,0a3250e0693a109f1affc9217be9459028aa8424. | Required |
comment | A comment to associate with the action. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.OffboardMachine.ID | String | The machine action ID. |
MicrosoftATP.OffboardMachine.Type | String | Type of the machine action. |
MicrosoftATP.OffboardMachine.Scope | Unknown | Scope of the action. |
MicrosoftATP.OffboardMachine.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.OffboardMachine.RequestorComment | String | Comment that was written when issuing the action. |
MicrosoftATP.OffboardMachine.Status | String | The current status of the command. |
MicrosoftATP.OffboardMachine.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.OffboardMachine.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.OffboardMachine.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.OffboardMachine.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.OffboardMachine.cancellationDateTimeUtc | Date | The date and time when the action was canceled. |
MicrosoftATP.OffboardMachine.RelatedFileInfo | String | The file info. |
MicrosoftATP.OffboardMachine.troubleshootInfo | String | Troubleshooting information. |
#
Command example!microsoft-atp-offboard-machine comment="Testing Offboarding" machine_id="12342c13fef"
#
Context Example#
Human Readable Output#
The offboarding request has been submitted successfully:
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 947a677a-a11a-4240-ab6q-91277e2386b9 Offboard 2f48b784-5da5-4e61-9957-012d2630f1e4 offboard test Pending 12342c13fef desktop-s2455r8
=======
#
microsoft-atp-request-and-download-investigation-packageCollect and download an investigation package as a gz file.
#
Base Commandmicrosoft-atp-request-and-download-investigation-package
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | The machine ID. | Required |
comment | A comment to associate with the action. | Required |
timeout_in_seconds | Timeout for polling. | Optional |
machine_action_id | Action ID to retrieve status and data for. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Status | String | The current status of the machine action. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineAction.ID | String | The machine action ID. |
MicrosoftATP.MachineAction.Type | String | Type of the machine action. |
MicrosoftATP.MachineAction.Scope | Unknown | Scope of the action. |
MicrosoftATP.MachineAction.Requestor | String | The ID of the user that executed the action. |
MicrosoftATP.MachineAction.RequestorComment | String | Comment that was written when issuing the action. |
MicrosoftATP.MachineAction.Status | String | The current status of the command. |
MicrosoftATP.MachineAction.MachineID | String | The machine ID on which the action was executed. |
MicrosoftATP.MachineAction.ComputerDNSName | String | The machine DNS name on which the action was executed. |
MicrosoftATP.MachineAction.CreationDateTimeUtc | Date | The date and time when the action was created. |
MicrosoftATP.MachineAction.LastUpdateTimeUtc | Date | The last date and time when the action status was updated. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifier | String | The file identifier. |
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierType | String | The type of the file identifier. Possible values: "SHA1" ,"SHA256", and "MD5". |
#
Command example!microsoft-atp-isolate-machine comment=isolate_test_3 isolation_type=Full machine_id="12342c13fef,12342c13fef8f06606"
#
Context Example#
Human Readable Output#
The isolation request has been submitted successfully:
ID Type Requestor RequestorComment Status MachineID ComputerDNSName 1f3098e20464 Isolate 2f48b784-5da5-4e61-9957-012d2630f1e4 isolate_test_3 Pending 12342c13fef desktop-s2455r8 6d39a3da0744 Isolate 2f48b784-5da5-4e61-9957-012d2630f1e4 isolate_test_3 Pending 12342c13fef8f06606 desktop-s2455r9
#
microsoft-atp-testTests connectivity to Microsoft Defender for Endpoint.
#
Base Commandmicrosoft-atp-test
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
microsoft-atp-list-softwareRetrieves the organization software inventory.
#
Base Commandmicrosoft-atp-list-software
#
InputArgument Name | Description | Required |
---|---|---|
id | Software ID. | Optional |
name | Software name. | Optional |
vendor | Software publisher name. | Optional |
limit | Maximum number of results to retrieve. Default is 50. | Optional |
offset | The number of items in the queried collection that are to be skipped and not included in the result. Default is 0. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Software.id | String | Software ID. |
MicrosoftATP.Software.name | String | Software name. |
MicrosoftATP.Software.vendor | String | Software publisher name. |
MicrosoftATP.Software.weaknesses | Number | Number of discovered vulnerabilities. |
MicrosoftATP.Software.publicExploit | Boolean | Whether a public exploit exists for some of the vulnerabilities. |
MicrosoftATP.Software.activeAlert | Boolean | Whether an active alert is associated with this software. |
MicrosoftATP.Software.exposedMachines | Number | Number of exposed devices. |
MicrosoftATP.Software.installedMachines | Number | The number of installed machines. |
MicrosoftATP.Software.impactScore | Number | Exposure score impact of this software. |
MicrosoftATP.Software.isNormalized | Boolean | Whether the software is normalized. |
MicrosoftATP.Software.category | String | Software category. |
MicrosoftATP.Software.distributions | String | Software distributions. |
#
Command example!microsoft-atp-list-software id=some_id
#
Context Example#
Human Readable Output#
Microsoft Defender ATP list software:
id name vendor weaknesses activeAlert exposedMachines installedMachines publicExploit some_id some_name some_vendor 0 false 0 1 false
#
microsoft-atp-list-software-version-distributionRetrieves a list of your organization's software version distribution.
#
Base Commandmicrosoft-atp-list-software-version-distribution
#
InputArgument Name | Description | Required |
---|---|---|
id | Software ID. Use the !microsoft-atp-list-software command to get the ID. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.SoftwareVersion.version | String | Version number |
MicrosoftATP.SoftwareVersion.installations | Number | Installations number. |
MicrosoftATP.SoftwareVersion.vulnerabilities | Number | Number of vulnerabilities. |
#
Command example!microsoft-atp-list-software-version-distribution id=some_id
#
Context Example#
Human Readable Output#
Microsoft Defender ATP software version distribution:
version installations vulnerabilities 7.0.2.0 2 7 6.2.4.0 1 0
#
microsoft-atp-list-machines-by-softwareRetrieve a list of device references that has this software installed.
#
Base Commandmicrosoft-atp-list-machines-by-software
#
InputArgument Name | Description | Required |
---|---|---|
id | Software ID. Use the !microsoft-atp-list-software command to get the ID. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.SoftwareMachine.id | String | Machine identity. |
MicrosoftATP.SoftwareMachine.computerDnsName | String | Machine fully qualified name. |
MicrosoftATP.SoftwareMachine.osPlatform | String | Operating system platform. |
MicrosoftATP.SoftwareMachine.rbacGroupName | String | Machine group name. |
MicrosoftATP.SoftwareMachine.rbacGroupId | Number | Machine group ID. |
#
Command example!microsoft-atp-list-machines-by-software id=some_id
#
Context Example#
Human Readable Output#
Microsoft Defender ATP list machines by software: some_id
id computerDnsName osPlatform rbacGroupName rbacGroupId 1111111111111111111111111111111111111111 some_dns_name_1 WindowsServer2016 UnassignedGroup 1111 2222222222222222222222222222222222222222 some_dns_name_2 WindowsServer2016 UnassignedGroup 2222 3333333333333333333333333333333333333333 some_dns_name_3 Windows10 UnassignedGroup 3333
#
microsoft-atp-list-vulnerabilities-by-softwareRetrieves a list of all the vulnerabilities affecting the organization per software.
#
Base Commandmicrosoft-atp-list-vulnerabilities-by-software
#
InputArgument Name | Description | Required |
---|---|---|
id | Software ID. Use the !microsoft-atp-list-software command to get the ID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.SoftwareCVE.id | String | Vulnerability ID. |
MicrosoftATP.SoftwareCVE.name | String | Vulnerability title. |
MicrosoftATP.SoftwareCVE.description | String | Vulnerability description. |
MicrosoftATP.SoftwareCVE.severity | String | Vulnerability severity. Possible values are: "Low", "Medium", "High", "Critical" |
MicrosoftATP.SoftwareCVE.cvssV3 | Number | CVSS v3 score. |
MicrosoftATP.SoftwareCVE.exposedMachines | Number | Number of exposed devices. |
MicrosoftATP.SoftwareCVE.publishedOn | Date | Date when vulnerability was published. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. |
MicrosoftATP.SoftwareCVE.updatedOn | Date | Date when vulnerability was updated. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. |
MicrosoftATP.SoftwareCVE.publicExploit | Boolean | Whether a public exploit exists for some of the vulnerabilities. |
MicrosoftATP.SoftwareCVE.exploitVerified | Boolean | Whether a public exploit exists. |
MicrosoftATP.SoftwareCVE.exploitInKit | Boolean | Whether the exploit is part of an exploit kit. |
MicrosoftATP.SoftwareCVE.exploitTypes | String | Exploit impact. Possible values are: "Local privilege escalation", "Denial of service", "Local". |
MicrosoftATP.SoftwareCVE.exploitUris | String | Exploit source URLs. |
#
Command example!microsoft-atp-list-vulnerabilities-by-software id=some_software
#
Context Example#
Human Readable Output#
Microsoft Defender ATP vulnerability CCVE-2222-22222 by software: some_software
id name description severity cvssV3 publishedOn updatedOn exposedMachines exploitVerified publicExploit CVE-2222-22222 CVE-2222-22222 This vulnerability affects the following vendors: vendor_1, vendor_2, vendor_3. To view more details about this vulnerability please visit the vendor website. Medium 5.9 2021-05-17T22:56:00Z 2021-05-17T22:56:00Z 2 false false
#
microsoft-atp-list-vulnerabilities-by-machineRetrieves a list of all the vulnerabilities affecting the organization per machine.
#
Base Commandmicrosoft-atp-list-vulnerabilities-by-machine
#
InputArgument Name | Description | Required |
---|---|---|
machine_id | A comma-separated list of machine IDs used for getting the vulnerabilities. | Optional |
software_id | A comma-separated list of software IDs used for getting the vulnerabilities. | Optional |
cve_id | A comma-separated list of CVE IDs used for getting the vulnerabilities. | Optional |
product_name | A comma-separated list of product names used for getting the vulnerabilities. | Optional |
product_version | A comma-separated list of product versions used for getting the vulnerabilities. | Optional |
severity | A comma-separated list of vulnerability severities. Possible values are: "Low", "Medium", "High", "Critical". | Optional |
product_vendor | A comma-separated list of product vendors used for getting the vulnerabilities. | Optional |
limit | Maximum number of results to retrieve. Default is 25. | Optional |
offset | The number of items in the queried collection that are to be skipped and not included in the result. Default is 0. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.MachineCVE.id | String | Vulnerability ID. |
MicrosoftATP.MachineCVE.cveId | String | CVE ID. |
MicrosoftATP.MachineCVE.machineId | String | Machine ID. |
MicrosoftATP.MachineCVE.fixingKbId | Unknown | Fixing Kb ID. |
MicrosoftATP.MachineCVE.productName | String | Product name. |
MicrosoftATP.MachineCVE.productVendor | String | Name of the product vendor. |
MicrosoftATP.MachineCVE.productVersion | String | Product version. |
MicrosoftATP.MachineCVE.severity | String | Vulnerability severity. Possible values are: "Low", "Medium", "High", "Critical". |
#
Command example!microsoft-atp-list-vulnerabilities-by-machine cve_id=CVE-1111-1111
#
Context Example#
Human Readable Output#
Microsoft Defender ATP vulnerability CVE-1111-1111:
id cveId machineId productName productVendor productVersion severity 1111111111111111111111111111111111111111--CVE-1111-1111--somevendor--somename--11.11.11.11111111-_- CVE-1111-1111 1111111111111111111111111111111111111111 some_name some_vendor 11.11.11.11111111 Medium
#
microsoft-atp-list-vulnerabilitiesRetrieves a list of all vulnerabilities.
#
Base Commandmicrosoft-atp-list-vulnerabilities
#
InputArgument Name | Description | Required |
---|---|---|
id | Vulnerability ID. | Optional |
name_equal | Vulnerability title. | Optional |
name_contains | Vulnerability title. Does not work with another filter arguments. | Optional |
description_contains | Vulnerability description. Does not work with another filter arguments. | Optional |
published_on | Date when the vulnerability was published. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. | Optional |
cvss | CVSS v3 score. | Optional |
severity | A comma-separated list of vulnerability severities. Possible values are: "Low", "Medium", "High", "Critical". | Optional |
updated_on | Date when the vulnerability was updated. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. | Optional |
limit | Maximum number of results to retrieve. Default is 25. | Optional |
offset | The number of items in the queried collection that are to be skipped and not included in the result. Default is 0. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Vulnerability.id | String | Vulnerability ID. |
MicrosoftATP.Vulnerability.name | String | Vulnerability title. |
MicrosoftATP.Vulnerability.description | String | Vulnerability description. |
MicrosoftATP.Vulnerability.severity | String | Vulnerability severity. Possible values are: "Low", "Medium", "High", "Critical". |
MicrosoftATP.Vulnerability.cvssV3 | Number | CVSS v3 score. |
MicrosoftATP.Vulnerability.exposedMachines | Number | Number of exposed devices. |
MicrosoftATP.Vulnerability.publishedOn | Date | Date when the vulnerability was published. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. |
MicrosoftATP.Vulnerability.updatedOn | Date | Date when the vulnerability was updated. Date format will be in ISO 8601 format or relational expressions like “7 days ago”. |
MicrosoftATP.Vulnerability.publicExploit | Boolean | Whether the public exploit exists. |
MicrosoftATP.Vulnerability.exploitVerified | Boolean | Whether the exploit is verified to work. |
MicrosoftATP.Vulnerability.exploitInKit | Boolean | Whether the exploit is part of an exploit kit. |
MicrosoftATP.Vulnerability.exploitTypes | String | Exploit impact. Possible values are: "Local privilege escalation", "Denial of service", "Local". |
MicrosoftATP.Vulnerability.exploitUris | String | Exploit source URLs. |
#
Command example!microsoft-atp-list-vulnerabilities id="CVE-1111-1111"
#
Context Example#
Human Readable Output#
Microsoft Defender ATP vulnerabilities:
id name description severity publishedOn updatedOn exposedMachines exploitVerified publicExploit cvssV3 CVE-1111-1111 CVE-1111-1111 some_description. Medium 2002-09-10T00:00:00Z 2002-09-10T00:00:00Z 0 false false 6.5
#
microsoft-atp-list-missing-kb-by-softwareRetrieves missing KBs (security updates) by software ID.
#
Base Commandmicrosoft-atp-list-missing-kb-by-software
#
InputArgument Name | Description | Required |
---|---|---|
id | Software ID. Use the !microsoft-atp-list-software command to get the ID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MicMicrosoftATP.SoftwareKB.id | String | Software ID. |
MicMicrosoftATP.SoftwareKB.name | String | Software name. |
MicMicrosoftATP.SoftwareKB.osBuild | Number | The operating system build number. |
MicMicrosoftATP.SoftwareKB.productsNames | String | Product names. |
MicMicrosoftATP.SoftwareKB.url | String | URL. |
MicMicrosoftATP.SoftwareKB.machineMissedOn | Number | Machine missed on. |
MicMicrosoftATP.SoftwareKB.cveAddressed | Number | CVE addressed. |
#
Command example!microsoft-atp-list-missing-kb-by-software id=some_id
#
Context Example#
Human Readable Output#
Microsoft Defender ATP missing kb by software: some_id
id name osBuild productsNames url machineMissedOn cveAddressed 1111111 some_name_1 22222 some_id some_url_1 1 2 2222222 some_name_2 22222 some_id some_url_2 1 2
#
microsoft-atp-generate-login-urlGenerate the login url used for Authorization code flow.
#
Base Commandmicrosoft-atp-generate-login-url
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
Command Examplemicrosoft-atp-generate-login-url
#
Human Readable Output#
Authorization instructions
- Click on the login URL to sign in and grant Cortex XSOAR permissions for your Azure Service Management. You will be automatically redirected to a link with the following structure:
REDIRECT_URI?code=AUTH_CODE&session_state=SESSION_STATE
- Copy the
AUTH_CODE
(without thecode=
prefix, and thesession_state
parameter) and paste it in your instance configuration under the Authorization code parameter.
#
microsoft-atp-auth-resetRun this command if for some reason you need to rerun the authentication process.
#
Base Commandmicrosoft-atp-auth-reset
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
microsoft-atp-get-machine-by-ipFind Machines seen with the requested internal IP in the time range of 15 minutes prior and after a given timestamp.
#
Base Commandmicrosoft-atp-get-machine-by-ip
#
InputArgument Name | Description | Required |
---|---|---|
ip | The endpoint IP address. | Required |
timestamp | The timestamp in witch the machines were seen with the internal ip address, 15 minutes before and after it. The given timestamp must be in the past 30 days. Timestamp format example- 2019-09-22T08:44:05Z. | Required |
limit | Maximum number of results to return. Default is 50. | Optional |
all_results | Whether to retrieve all results. If true, the "limit" argument will be ignored. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MicrosoftATP.Machine.ID | String | The machine ID. |
MicrosoftATP.Machine.ComputerDNSName | String | The machine DNS name. |
MicrosoftATP.Machine.FirstSeen | Date | The first date and time the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.LastSeen | Date | The last date and time the machine was observed by Microsoft Defender ATP. |
MicrosoftATP.Machine.OSPlatform | String | The operating system platform. |
MicrosoftATP.Machine.OSVersion | String | The operating system version. |
MicrosoftATP.Machine.OSProcessor | String | The operating system processor. |
MicrosoftATP.Machine.LastIPAddress | String | The last IP on the machine. |
MicrosoftATP.Machine.LastExternalIPAddress | String | The last machine IP to access the internet. |
MicrosoftATP.Machine.OSBuild | Number | The operating system build number. |
MicrosoftATP.Machine.HealthStatus | String | The machine health status. |
MicrosoftATP.Machine.RBACGroupID | Number | The machine RBAC group ID. |
MicrosoftATP.Machine.RBACGroupName | String | The machine RBAC group name. |
MicrosoftATP.Machine.RiskScore | String | The machine risk score. |
MicrosoftATP.Machine.ExposureLevel | String | The machine exposure score. |
MicrosoftATP.Machine.IsAADJoined | Boolean | True if machine is AAD joined, False otherwise. |
MicrosoftATP.Machine.AADDeviceID | String | The AAD Device ID. |
MicrosoftATP.Machine.MachineTags | String | Set of machine tags. |
MicrosoftATP.Machine.IPAddresses.ipAddress | String | The machine IP address. |
MicrosoftATP.Machine.IPAddresses.MACAddress | String | The machine MAC address. |
MicrosoftATP.Machine.IPAddresses.operationalStatus | String | The machine operational status. |
MicrosoftATP.Machine.IPAddresses.type | String | The machine IP address type. |
MicrosoftATP.Machine.AgentVersion | String | The machine Agent version. |
#
Command example!microsoft-atp-get-machine-by-ip ip=8.8.8.8 timestamp=2024-05-23T10:15:00Z
#
Human Readable Output#
Microsoft Defender ATP Machine:
ID ComputerDNSName OSPlatform LastIPAddress LastExternalIPAddress HealthStatus RiskScore ExposureLevel f3bba49a ec2amaz-ua9hieu WindowsServer2016 1.2.3.4 127.0.0.1 Active None High