MDE Malware - Incident Enrichment
Microsoft Defender for Endpoint Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook is part of the 'Malware Investigation And Response' pack. For more information, refer to https://xsoar.pan.dev/docs/reference/packs/malware-investigation-and-response. This playbook enriches Microsoft Defender For Endpoint alerts. The enrichment is done on the involved endpoint and Mitre technique ID information, and it sets the 'Malware-Investigation and Response' layout.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Mitre Attack - Extract Technique Information From ID
- Account Enrichment - Generic v2.1
#
Integrations- Microsoft365DefenderEventCollector
- MicrosoftDefenderAdvancedThreatProtection
#
Scripts- SetGridField
- isError
- SetAndHandleEmpty
#
Commands- microsoft-atp-get-alert-by-id
- setIncident
- endpoint
- extractIndicators
- file
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
DidAlertOriginateFromSIEM | Whether the incident is fetched through a SIEM product. | No | Optional |
AlertID | The Microsoft Defender For Endpoint alert ID. | ${incident.externalsystemid} | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
MITREATTACK | The full MITRE data for the attack pattern. | string |
AttackPattern | An array of attack patterns name and IDs. | string |
MicrosoftATP.Alert | Microsoft Defender For Endpoint alert information. | unknown |
Endpoint | The endpoint information. | unknown |