7.4 EDR and Automated Investigation Configuration

75 minutes · Module 7

EDR and Automated Investigation Configuration

By the end of this subsection, you will know how to configure EDR in block mode, set the correct automated investigation level, and create custom indicators that operationalize your investigation findings.

EDR in block mode

Standard EDR detects and alerts. EDR in block mode goes further — it automatically quarantines malicious files and terminates malicious processes without waiting for analyst approval. This is separate from ASR rules (which prevent behaviors before execution) and from AIR (which investigates and remediates alert chains).

When to enable: Organizations with mature SOC processes, confidence in Defender detection accuracy, and tolerance for occasional false-positive remediation.

When to keep disabled: Critical infrastructure (manufacturing, medical devices, trading systems) where an automated file quarantine could cause operational disruption. In these environments, false-positive risk outweighs speed benefit.

Automated Investigation and Response (AIR)

When Defender raises an alert, AIR automatically investigates: identifying scope, related entities, impacted files, and affected devices. The automation level determines whether AIR takes remediation actions or waits for human approval.

LevelBehaviorBest forRisk
No automated responseAlerts only, no investigationNot recommendedWastes analyst time on every alert
Semi — require approval for allAIR investigates, proposes actions, waits for approvalMost organizations (default choice)None — human reviews every action
Semi — require approval for non-temp foldersAuto-remediates in temp/downloads, waits for system foldersModerate maturity, after 90+ days on full semiLow — temp folders rarely contain critical files
Full automationAIR investigates and remediates without human approvalHigh-volume environments, mature SOC, 90+ days of dataFalse positive auto-remediation
Start with semi-auto, upgrade with data

Semi-auto (require approval for all) is the correct default. Run it for 90+ days. Track the false positive rate. If every remediation recommendation is approved and no false positives occur, consider advancing to the next level. Do not skip to full automation on day one — you do not have the data to justify the risk.

Custom indicators — operationalize investigation findings

Custom indicators tell Defender to alert on, block, or allow specific files, IPs, URLs, and certificates across all onboarded devices. This is how investigation findings become automated protection.

Indicator typeExample from Module 13ActionScope
IP address203.0.113.45 (attacker token replay IP)Alert and blockAll devices — any connection attempt generates alert
URL/domainnorthgate-voicemail.com (phishing domain)Alert and blockAll devices — DNS request blocked
URL pattern/auth/[a-f0-9]{32}/login (kit URL path)Alert and blockAll devices — catches the kit across new domains
File hashSHA-256 of malware sampleAlert and blockAll devices — file quarantined on detection
CertificateCode signing cert used by attacker toolAlert and blockAll devices — signed executables using this cert blocked
1
2
3
4
5
6
7
8
// Find connections to your blocked indicators in the last 7 days
DeviceNetworkEvents
| where TimeGenerated > ago(7d)
| where RemoteUrl has_any ("northgate-voicemail.com", "northgate-docs.com")
    or RemoteIP == "203.0.113.45"
| project TimeGenerated, DeviceName, RemoteUrl, RemoteIP, RemotePort,
    InitiatingProcessFileName, ActionType
| sort by TimeGenerated desc
Expected Output — After Indicator Deployment
TimeGeneratedDeviceNameRemoteUrlActionTypeInitiatingProcess
14:22DESKTOP-NGE042northgate-voicemail.comConnectionBlockedchrome.exe
What to look for: ConnectionBlocked confirms the indicator is working — the user attempted to visit the phishing domain (possibly from a cached email) and Defender blocked the connection. Without the indicator, this connection would have succeeded and potentially led to a second compromise. Every investigation should produce indicators. Investigations that do not produce operational defenses are incomplete.

Live Response

Live response opens a remote command-line shell to a device from the Defender portal. No RDP, no VPN, no network line-of-sight required — the session routes through the Defender cloud service.

Key capabilities:

CommandWhat it doesWhen to use
processesList all running processes with PID, name, pathIdentify suspicious processes during active investigation
connectionsList active network connectionsFind C2 connections, data exfiltration channels
fileinfo [path]Get file metadata, hash, and digital signatureVerify a suspicious file before collection
getfile [path]Download file from device to investigation portalCollect malware samples, evidence files
run [script]Execute a pre-uploaded PowerShell scriptRun forensic collection scripts, evidence gathering
remediate file [path]Quarantine a specific fileRemove malware or attacker tools
Restrict live response to Tier 2+ analysts

Live response executes commands directly on production devices. A mistyped remediate command on the wrong file path can delete critical system files. A run command with an incorrect script can crash a service. Restrict the "Advanced live response" permission to experienced analysts. Tier 1 analysts investigate via the device timeline (subsection 7.5) and escalate when live response is needed.

Check your understanding

1. After the Module 13 AiTM investigation, you have 5 phishing domains and 1 attacker IP. What should you do with them in Defender?

Create custom indicators: alert-and-block for all 5 domains and the attacker IP. Any device that attempts to connect generates an alert and is blocked. This turns investigation IOCs into automated protection across your entire fleet.
Email the IOCs to the team
Add them to a spreadsheet

2. Semi-auto AIR has run for 30 days with 0 false positives. Should you switch to full automation?

Yes — zero FPs proves safety
Never — always require human approval
Not yet — 30 days is too short. Low-frequency false positives may not appear in this window. Wait 90+ days and assess whether your environment can tolerate automated remediation of a rare FP.