Microsoft Defender For Endpoint - Collect investigation package
Microsoft Defender for Endpoint Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.2.0 and later.
This playbook simplifies retrieving investigation packages to Cortex XSOAR from supported machines (See https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/collect-investigation-package?view=o365-worldwide).
The playbook receives information about the target devices (host name, IP, and device ID), validates the devices exist, and retrieves the collection package from those machines into the Cortex XSOAR console.
Note:
This action may take time, the average package size is around ~15 MB.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsMicrosoft Defender Advanced Threat Protection
#
ScriptsThis playbook does not use any scripts.
#
Commands- endpoint
- microsoft-atp-request-and-download-investigation-package
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
AutoCollectinvestigationPackege | Choose True to skip user validation on retrieving the investigation pack within the provided assets. | True | Optional |
Hostnames | A comma-separated list of host names. | Optional | |
MachineIDs | A comma-separated list of machine IDs. | Optional | |
IPs | A comma-separated list of machine IPs. | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
MicrosoftATP.MachineAction | Microsoft Defender For Endpoint machine action details. | unknown |