Skip to main content

Microsoft Defender Advanced Threat Protection Get Machine Action Status

This Playbook is part of the Microsoft Defender for Endpoint Pack.#

This playbook uses generic polling to get machine action information.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

GenericPolling

Integrations#

MicrosoftDefenderAdvancedThreatProtection

Scripts#

This playbook does not use any scripts.

Commands#

microsoft-atp-list-machine-actions-details

Playbook Inputs#


NameDescriptionDefault ValueRequired
machine_action_idOptional

Playbook Outputs#


PathDescriptionType
MicrosoftATP.MachineAction.IDThe machine action ID.string
MicrosoftATP.MachineAction.TypeAction type.string
MicrosoftATP.MachineAction.ScopeScope of the action.unknown
MicrosoftATP.MachineAction.RequestorThe ID of the user that executed the action.string
MicrosoftATP.MachineAction.RequestorCommentComment that was written when issuing the action.string
MicrosoftATP.MachineAction.StatusThe current status of the command.string
MicrosoftATP.MachineAction.MachineIDThe machine ID on which the action was executed.string
MicrosoftATP.MachineAction.ComputerDNSNameThe machine DNS name on which the action was executed.string
MicrosoftATP.MachineAction.CreationDateTimeUtcThe date and time when the action was created.date
MicrosoftATP.MachineAction.LastUpdateTimeUtcThe last date and time when the action status was updated.date
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierThe file identifier.string
MicrosoftATP.MachineAction.RelatedFileInfo.FileIdentifierTypeThe type of the file identifier with the possible values: "Sha1" ,"Sha256" and "Md5"string