3.0 KiB
title, ms.reviewer, description, keywords, search.product, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title | ms.reviewer | description | keywords | search.product | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Microsoft Defender ATP Flow connector | Microsoft Defender ATP Flow connector | flow, supported apis, api, Microsoft flow, query, automation | eADQiWindows 10XVcnh | w10 | deploy | library | security | macapara | mjcaparas | medium | dansimp | ITPro | M365-security-compliance | article |
Microsoft Defender ATP Flow connector
Applies to: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)
- Want to experience Microsoft Defender ATP? Sign up for a free trial.
Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional Cyber defenders, forces SOC to work in the most efficient way and automation is a must. MS flow supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within few minutes.
Microsoft Defender API has an official Flow Connector with a lot of capabilities:
Usage example
The following example demonstrates how you can create a Flow that will be triggered any time a new Alert occurs on your tenant.
-
Login to Microsoft Flow
-
Go to: My flows > New > Automated
- Choose a name for your Flow, Search for Microsoft Defender ATP Triggers as the trigger and choose the new Alerts trigger.
- Now you have a Flow that is triggered every time a new Alert occurs.
All you need to do now, is to choose your next steps. Lets, for example, Isolate the machine if the Severity of the Alert is High and mail about it. The Alert trigger gives us only the Alert ID and the Machine ID. We can use the Connector to expand these entities.
Get the Alert entity using the connector
-
Choose Microsoft Defender ATP for new step.
-
Choose Alerts - Get single alert API.
-
Set the Alert Id from the last step as Input.
Isolate the machine if the Alert's severity is High
-
Add Condition as a new step .
-
Check if Alert severity equals to High.
-
If yes, add Microsoft Defender ATP - Isolate machine action with the Machine Id and a comment.
Now you can add a new step for mailing about the Alert and the Isolation. There are multiple Email connectors that are very easy to use, e.g. Outlook, GMail, etc.. Save your flow and that's all.
- You can also create scheduled flow that will run Advanced Hunting queries and much more!