

Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. You can use the same process for files found in advanced huntin g, a lerts, or even automated investigations.Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Because the file might be malicious, protecting it with a password will help prevent the file from being inadvertently run.Īfter downloading the file, you can manually inspect it or use any third-party inspection tools to do further investigative work. Provide a reason for auditing purposes for downloading the file and create a password. Once it was collected, t he “Collect file” action will change to “ Download file ” to indicate that the file has been collected. The machine must be reporting properly to the service so that files can be collected. When you see the file you’d like to investigate, head over to the file page by clicking the file link located on the side pane of the interesting event.Īlong the top of the profile page you’ll notice the available actions: T ip: You can use the search bar to look for specific files or use the e vent g roup filter to scope the search to f ile e vents. Navigate to a machine in your environment, then c lick the timeline to review the events seen on the machine.įind a n event that contains a file you would like to investigate.

ĭownload a file found in a machine timeline Interested in downloading the file that was found in the alert? Saw an interest ing file in a machine timeline? Head over to the file page, collect it, and download it for further inspection.

Therefore, Microsoft Defender ATP includes a sandbox in each customer tenant, to detonate files in a sa fe environment and provides a rich and readable report of what the file can do – gain persistence, communicate to IP addresses, change the registry, etc … b ut in some case you want to run such analyses i n your own sandbox or do reverse engineering work, you can now download and inspect any file found o n your network. I nvestigating suspicious files can provide valuable clues on a threat activity.
