MDE - Search And Block Software
Microsoft Defender for Endpoint Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.9.0 and later.
This playbook will search a file or process activity of a software by a given image file name using Microsoft Defender For Endpoint. The analyst can then choose the files to block.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsMicrosoftDefenderAdvancedThreatProtection
#
Scripts- DeleteContext
- JsonToTable
- Set
#
Commands- microsoft-atp-advanced-hunting
- microsoft-atp-sc-indicator-create
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
Filename | File name to search. | Optional | |
TimeFrame | Time in relative date or range format (for example: "1 day", "3 weeks ago", "between 2021-01-01 12:34:56 +02:00 and 2021-02-01 12:34:56 +02:00"). The default is the last 24 hours. | Optional | |
Defender Indicator Title | The indicator alert title in Defender. | XSOAR Software Block | Optional |
Indicator Expiration | DateTime string indicating when the indicator expires. Format: (<number> <time unit>, e.g., 12 hours, 7 days). | Optional |
#
Playbook OutputsThere are no outputs for this playbook.