MDE - Retrieve File
Microsoft Defender for Endpoint Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook is part of the ‘Malware Investigation And Response’ pack. For more information, refer to https://xsoar.pan.dev/docs/reference/packs/malware-investigation-and-response. This playbook uses the Live Response feature to retrieve a file from an endpoint. The playbook supports a supplied machine id as an input. Otherwise, it will take the Device ID incident field. The playbook supports only one element to be retrieved for each task (if needed more then one - use the playbook loop feature).
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- MicrosoftDefenderAdvancedThreatProtection
#
Scripts- isError
- UnzipFile
#
Commands- microsoft-atp-live-response-get-file
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
paths | The file paths to be provided. | Optional | |
MachineID | The ID of the machine. | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
ExtractedFiles | A list of file names that were extracted from the ZIP file. | Unknown |
MicrosoftATP.LiveResponseAction.status | The machine action status. | unknown |