Playbook: Windows Defender ATP Identifier Activity Analysis

Description

Accepts a file_hash or domain name, and asks Windows Defender ATP for a list of devices that have interacted with each. It then produces a normalized output and summary table.

Apps:

Associated Detections

How To Implement

This input playbook requires the Windows Defender ATP connector to be configured. It is designed to work in conjunction with the Dynamic Identifier Activity Analysis playbook or other playbooks in the same style.

Explore Playbook

explore

Required fields

Reference

source | version: 1