Connectors

Microsoft Defender for Endpoint Connector

The Microsoft Defender for Endpoint connector allows you to integrate endpoint detection and response capabilities into your PingOne DaVinci flows.

This connector provides capabilities to enforce device trust in real time:

  • Get Device: Retrieve health, risk, and identity information for a device identifier.

  • Get Device Alerts: Retrieve a list of security alerts associated with a device identifier.

  • Get Device Vulnerabilities: Retrieve a list of discovered vulnerabilities associated with a device identifier.

  • Get User Alerts: Retrieve a list of security alerts associated with a user identifier.

  • Isolate Device: Disconnect a device from the network to contain threats and prevent lateral movement.

  • Release Device: Restore network connectivity to a previously isolated device.

  • Restrict App Execution: Block all applications on the device except those signed by Microsoft.

  • Remove App Restriction: Lift app execution restrictions and allow all applications to run.

  • Offboard Device: Remove a device from active monitoring and management in Microsoft Defender for Endpoint.

Setup

Resources

You can find more information and setup help in the following:

Requirements

To use the connector, you’ll need:

  • A Microsoft 365 E5 license, or a standalone Microsoft Defender for Endpoint Plan 2 license.

  • A Microsoft Entra ID tenant with Global Administrator or Application Administrator permissions to create app registrations and grant admin consent.

  • At least one device is onboarded to Microsoft Defender for Endpoint. Devices can be onboarded using Microsoft Intune, Group Policy, or a local onboarding script.

Configuring the Microsoft Defender for Endpoint connector

Add the connector in DaVinci as shown in Adding a connector, then configure it as follows.

Connector configuration

To get the required credentials, you must create an app registration in Microsoft Entra ID with permissions to the Microsoft Defender for Endpoint API.

  • From the Microsoft Azure Portal, navigate to Microsoft Entra ID > App registrations.

  • Click New registration and create an app (e.g., "PingOne DaVinci - Defender Connector").

  • Navigate to Certificates & secrets > Client secrets and create a new secret. Copy the Value immediately (it won’t be shown again).

  • Navigate to API permissions > Add a permission > WindowsDefenderATP and add the required application permissions.

  • Click Grant admin consent to activate the permissions.

Learn more in Register an application with the Microsoft identity platform in the Microsoft documentation.

Base URL

The regional API endpoint for your tenant. Select the region matching your tenant location (US, EU, UK, and so on) or select Global.

Tenant ID

The Directory (tenant) ID from your Microsoft Entra ID tenant. Found on the app registration overview page.

Client ID

The Application (client) ID generated for your app registration. Used to identify the client requesting access to Microsoft Defender for Endpoint.

Client Secret

The secret value generated for your app registration. Used to authenticate the client ID for Microsoft Defender for Endpoint API access.

Using the connector in a flow

Get Device

A screen capture of the get device flow.

The connector queries the Machine API using a device identifier to retrieve detailed device information, including its risk score, exposure level, health status, and onboarding status. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Get Device Alerts

A screen capture of the get device alerts flow.

The connector queries the Machine API using a device identifier to retrieve all security alerts associated with the specified device, including severity, status, and evidence summaries. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Get Device Vulnerabilities

A screen capture of the get device vulnerabilities flow.

The connector queries the Machine API using a device identifier to retrieve all discovered vulnerabilities on the specified device, including CVE identifiers, severity ratings, CVSS scores, and exploit availability. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Get User Alerts

A screen capture of the get user alerts flow.

The connector queries the Alerts API using a username to retrieve all security alerts associated with the specified user across all of their devices, including severity, status, and evidence summaries. The username should be the sAMAccountName portion of the identity (e.g., "jsmith" for jsmith@contoso.com).

Test the flow by clicking Save, Deploy, and Try Flow.

Isolate Device

A screen capture of the isolate device flow.

The connector submits an isolation request to the Machine Actions API to disconnect a device from the network. Full isolation blocks all network traffic except communication with the Defender service. Selective isolation allows limited connectivity for specific applications. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Release Device

A screen capture of the release device flow.

The connector submits a release request to the Machine Actions API to restore network connectivity to a previously isolated device. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Restrict App Execution

A screen capture of the restrict app execution flow.

The connector submits a restriction request to the Machine Actions API to block all applications on a device except those signed by Microsoft. This containment action prevents potentially malicious code from executing during an active investigation. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Remove App Restriction

A screen capture of the remove app restriction flow.

The connector submits a request to the Machine Actions API to lift app execution restrictions and allow all applications to run normally. This action is typically performed after a security investigation is complete. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Offboard Device

A screen capture of the offboard device flow.

The connector submits a request to the Machine Actions API to remove a device from active monitoring and management in Microsoft Defender for Endpoint. This action is typically performed when a device is being decommissioned or reassigned. The device identifier can be the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Test the flow by clicking Save, Deploy, and Try Flow.

Capabilities

Get Device

Retrieve health, risk, and identity information for a device identifier

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

Input Example

{
  "properties": {
    "deviceId": "da637472900382838869_1364969609"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • id string

      Device Identity in Microsoft Defender

    • name string

      The DNS name of the device.

    • riskScore string

      The current threat risk level assigned to the device.

    • exposureLevel string

      The calculated vulnerability exposure level for the device.

    • healthStatus string

      The operational health state of the device sensor.

    • onboardingStatus string

      The management status of the device in Microsoft Defender.

    • aadDeviceId string

      The unique device identifier in Microsoft Entra ID (when device is joined).

    • os string

      The operating system platform and version information.

    • lastIp string

      The most recent local IP address reported by the device.

    • isJoined boolean

      Indicates if the device is currently joined to Microsoft Entra ID.

    • lastSeen string

      The last time the device communicated with Microsoft Defender.

    • tags array

      Custom tags associated with the device.

    • importance string

      The business value assigned to the asset (e.g., High, Normal, Low).

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#Machines/$entity",
    "id": "da637472900382838869_1364969609",
    "mergedIntoMachineId": null,
    "isPotentialDuplication": false,
    "isExcluded": false,
    "exclusionReason": null,
    "computerDnsName": "johns-work-computer",
    "firstSeen": "2026-01-20T20:02:18.5451725Z",
    "lastSeen": "2026-01-20T20:07:42.6424861Z",
    "osPlatform": "Windows11",
    "osProcessor": "x64",
    "version": "22H2",
    "lastIpAddress": "192.168.51.128",
    "lastExternalIpAddress": "209.133.96.106",
    "agentVersion": "10.8750.22621.3527",
    "osBuild": 22621,
    "healthStatus": "Active",
    "deviceValue": "Normal",
    "rbacGroupId": 0,
    "rbacGroupName": null,
    "riskScore": "None",
    "exposureLevel": "High",
    "isAadJoined": true,
    "aadDeviceId": "da637472900382838869_1364969609",
    "machineTags": [],
    "onboardingStatus": "Onboarded",
    "osArchitecture": "64-bit",
    "managedBy": "Unknown",
    "managedByStatus": "Unknown",
    "ipAddresses": [
      {
        "ipAddress": "192.168.51.128",
        "macAddress": "000C29897942",
        "type": "Ethernet",
        "operationalStatus": "Up"
      },
      {
        "ipAddress": "fe80::b741:5419:51cb:1f6f",
        "macAddress": "000C29897942",
        "type": "Ethernet",
        "operationalStatus": "Up"
      },
      {
        "ipAddress": "127.0.0.1",
        "macAddress": null,
        "type": "SoftwareLoopback",
        "operationalStatus": "Up"
      },
      {
        "ipAddress": "::1",
        "macAddress": null,
        "type": "SoftwareLoopback",
        "operationalStatus": "Up"
      }
    ],
    "vmMetadata": null
  },
  "statusCode": 200,
  "id": "da637472900382838869_1364969609",
  "name": "johns-work-computer",
  "riskScore": "None",
  "exposureLevel": "High",
  "healthStatus": "Active",
  "onboardingStatus": "Onboarded",
  "aadDeviceId": "da637472900382838869_1364969609",
  "os": "Windows11 x64 22H2",
  "lastIp": "192.168.51.128",
  "isJoined": true,
  "lastSeen": "2026-01-20T20:07:42.6424861Z",
  "tags": [],
  "importance": "Normal"
}

Get Device Alerts

Retrieve a list of security alerts associated with a device identifier

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

Input Example

{
  "properties": {
    "deviceId": "da637472900382838869_1364969609"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • alertCount number

      The total number of alerts found for the specified device.

    • alerts array

      A list of alerts with detailed context including MITRE techniques and evidence.

Output Example

 { "rawResponse" :
  { "value" :
   [
    { "id" : "da637472900382838869_1364969609",
     "incidentId" : 1.126093E6,
     "investigationId" : null,
     "assignedTo" : null,
     "severity" : "Low",
     "status" : "New",
     "classification" : null,
     "determination" : null,
     "investigationState" : "Queued",
     "detectionSource" : "WindowsDefenderAtp",
     "detectorId" : "17e10bbc-3a68-474a-8aad-faef14d43952",
     "category" : "Execution",
     "threatFamilyName" : null,
     "title" : "Low-reputation arbitrary code executed by signed executable",
     "description" : "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
     "alertCreationTime" : "2021-01-26T20:33:57.7220239Z",
     "firstEventTime" : "2021-01-26T20:31:32.9562661Z",
     "lastEventTime" : "2021-01-26T20:31:33.0577322Z",
     "lastUpdateTime" : "2021-01-26T20:33:59.2Z",
     "resolvedTime" : null,
     "machineId" : "111e6dd8c833c8a052ea231ec1b19adaf497b625",
     "computerDnsName" : "temp123.middleeast.corp.microsoft.com",
     "rbacGroupName" : "A",
     "aadTenantId" : "a839b112-1253-6432-9bf6-94542403f21c",
     "threatName" : null,
     "mitreTechniques" :
     [ "T1064",
      "T1085",
      "T1220" ],
     "relatedUser" :
     { "userName" : "temp123",
      "domainName" : "DOMAIN" },
     "comments" :
     [
      { "comment" : "test comment for docs",
       "createdBy" : "secop123@contoso.com",
       "createdTime" : "2021-01-26T01:00:37.8404534Z" } ],
     "evidence" :
     [
      { "entityType" : "User",
       "evidenceCreationTime" : "2021-01-26T20:33:58.42Z",
       "sha1" : null,
       "sha256" : null,
       "fileName" : null,
       "filePath" : null,
       "processId" : null,
       "processCommandLine" : null,
       "processCreationTime" : null,
       "parentProcessId" : null,
       "parentProcessCreationTime" : null,
       "parentProcessFileName" : null,
       "parentProcessFilePath" : null,
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : "name",
       "domainName" : "DOMAIN",
       "userSid" : "S-1-5-21-11111607-1111760036-109187956-75141",
       "aadUserId" : "11118379-2a59-1111-ac3c-a51eb4a3c627",
       "userPrincipalName" : "temp123@microsoft.com",
       "detectionStatus" : null },

      { "entityType" : "Process",
       "evidenceCreationTime" : "2021-01-26T20:33:58.6133333Z",
       "sha1" : "ff836cfb1af40252bd2a2ea843032e99a5b262ed",
       "sha256" : "a4752c71d81afd3d5865d24ddb11a6b0c615062fcc448d24050c2172d2cbccd6",
       "fileName" : "rundll32.exe",
       "filePath" : "C:\\Windows\\SysWOW64",
       "processId" : 3276,
       "processCommandLine" : "rundll32.exe  c:\emp\\suspicious.dll,RepeatAfterMe",
       "processCreationTime" : "2021-01-26T20:31:32.9581596Z",
       "parentProcessId" : 8420,
       "parentProcessCreationTime" : "2021-01-26T20:31:32.9004163Z",
       "parentProcessFileName" : "rundll32.exe",
       "parentProcessFilePath" : "C:\\Windows\\System32",
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : null,
       "domainName" : null,
       "userSid" : null,
       "aadUserId" : null,
       "userPrincipalName" : null,
       "detectionStatus" : "Detected" },

      { "entityType" : "File",
       "evidenceCreationTime" : "2021-01-26T20:33:58.42Z",
       "sha1" : "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
       "sha256" : "dc0ade0c95d6db98882bc8fa6707e64353cd6f7767ff48d6a81a6c2aef21c608",
       "fileName" : "suspicious.dll",
       "filePath" : "c:\emp",
       "processId" : null,
       "processCommandLine" : null,
       "processCreationTime" : null,
       "parentProcessId" : null,
       "parentProcessCreationTime" : null,
       "parentProcessFileName" : null,
       "parentProcessFilePath" : null,
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : null,
       "domainName" : null,
       "userSid" : null,
       "aadUserId" : null,
       "userPrincipalName" : null,
       "detectionStatus" : "Detected" } ] } ] },
  "statusCode" : 200,
  "alertCount" : 1,
  "alerts" :
  [
   { "id" : "da637472900382838869_1364969609",
    "incidentId" : 1.126093E6,
    "title" : "Low-reputation arbitrary code executed by signed executable",
    "severity" : "Low",
    "status" : "New",
    "category" : "Execution",
    "detectionSource" : "WindowsDefenderAtp",
    "description" : "Binaries signed by Microsoft can be used...",
    "relatedUser" : "temp123",
    "assignedTo" : null,
    "mitreTechniques" :
    [ "T1064",
     "T1085",
     "T1220" ],
    "creationTime" : "2021-01-26T20:33:57.7220239Z",
    "evidenceSummary" :
    [
     { "entityType" : "File",
      "fileName" : "suspicious.dll",
      "sha1" : "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
      "ipAddress" : null } ] } ] }

Get Device Vulnerabilities

Retrieve a list of discovered vulnerabilities associated with a device identifier

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

Input Example

{
  "properties": {
    "deviceId": "da637472900382838869_1364969609"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • vulnerabilityCount number

      The total number of vulnerabilities found for the specified device ID.

    • vulnerabilities array

      A list of vulnerability objects containing severity, exploitability, and risk scores.

Output Example

{
  "rawResponse": {
    "value": [
      {
        "id": "CVE-2019-1348",
        "name": "CVE-2019-1348",
        "description": "Git could allow a remote attacker to bypass security restrictions, caused by a flaw in the --export-marks option of git fast-import. By persuading a victim to import specially-crafted content, an attacker could exploit this vulnerability to overwrite arbitrary paths.",
        "severity": "Medium",
        "cvssV3": 4.3,
        "exposedMachines": 1,
        "publishedOn": "2019-12-13T00:00:00Z",
        "updatedOn": "2019-12-13T00:00:00Z",
        "publicExploit": false,
        "exploitVerified": false,
        "exploitInKit": false,
        "exploitTypes": [],
        "exploitUris": []
      }
    ]
  },
  "statusCode": 200,
  "vulnerabilityCount": 1,
  "vulnerabilities": [
    {
      "id": "CVE-2019-1348",
      "name": "CVE-2019-1348",
      "severity": "Medium",
      "description": "Git could allow a remote attacker to bypass security restrictions, caused by a flaw in the --export-marks option of git fast-import. By persuading a victim to import specially-crafted content, an attacker could exploit this vulnerability to overwrite arbitrary paths.",
      "cvssV3": 4.3,
      "exposedMachines": 1,
      "publishedOn": "2019-12-13T00:00:00Z",
      "updatedOn": "2019-12-13T00:00:00Z",
      "hasPublicExploit": false,
      "isExploitVerified": false,
      "isInExploitKit": false,
      "exploitTypes": [],
      "epssScore": 0.0012
    }
  ]
}

Get User Alerts

Retrieve a list of security alerts associated with a user identifier

Show details
  • Properties

  • Input Schema

  • Output Schema

User ID textField required

The sAMAccountName or username portion of the identity (e.g., jsmith from jsmith@contoso.com)

  • default object

    • userId string

      The username portion of the identity in Microsoft Entra (e.g., use jsmith for jsmith@contoso.com).

Input Example

{
  "properties": {
    "userId": "jsmith"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • alertCount number

      The total number of alerts found for the specified user ID.

    • alerts array

      Detailed alert objects mapped from Microsoft Defender.

Output Example

 { "rawResponse" :
  { "value" :
   [
    { "id" : "da637472900382838869_1364969609",
     "incidentId" : 1.126093E6,
     "investigationId" : null,
     "assignedTo" : null,
     "severity" : "Low",
     "status" : "New",
     "classification" : null,
     "determination" : null,
     "investigationState" : "Queued",
     "detectionSource" : "WindowsDefenderAtp",
     "detectorId" : "17e10bbc-3a68-474a-8aad-faef14d43952",
     "category" : "Execution",
     "threatFamilyName" : null,
     "title" : "Low-reputation arbitrary code executed by signed executable",
     "description" : "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
     "alertCreationTime" : "2021-01-26T20:33:57.7220239Z",
     "firstEventTime" : "2021-01-26T20:31:32.9562661Z",
     "lastEventTime" : "2021-01-26T20:31:33.0577322Z",
     "lastUpdateTime" : "2021-01-26T20:33:59.2Z",
     "resolvedTime" : null,
     "machineId" : "111e6dd8c833c8a052ea231ec1b19adaf497b625",
     "computerDnsName" : "jsmith.middleeast.corp.microsoft.com",
     "rbacGroupName" : "A",
     "aadTenantId" : "a839b112-1253-6432-9bf6-94542403f21c",
     "threatName" : null,
     "mitreTechniques" :
     [ "T1064",
      "T1085",
      "T1220" ],
     "relatedUser" :
     { "userName" : "jsmith",
      "domainName" : "DOMAIN" },
     "comments" :
     [
      { "comment" : "test comment for docs",
       "createdBy" : "secop123@contoso.com",
       "createdTime" : "2021-01-26T01:00:37.8404534Z" } ],
     "evidence" :
     [
      { "entityType" : "User",
       "evidenceCreationTime" : "2021-01-26T20:33:58.42Z",
       "sha1" : null,
       "sha256" : null,
       "fileName" : null,
       "filePath" : null,
       "processId" : null,
       "processCommandLine" : null,
       "processCreationTime" : null,
       "parentProcessId" : null,
       "parentProcessCreationTime" : null,
       "parentProcessFileName" : null,
       "parentProcessFilePath" : null,
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : "name",
       "domainName" : "DOMAIN",
       "userSid" : "S-1-5-21-11111607-1111760036-109187956-75141",
       "aadUserId" : "11118379-2a59-1111-ac3c-a51eb4a3c627",
       "userPrincipalName" : "jsmith@microsoft.com",
       "detectionStatus" : null },

      { "entityType" : "Process",
       "evidenceCreationTime" : "2021-01-26T20:33:58.6133333Z",
       "sha1" : "ff836cfb1af40252bd2a2ea843032e99a5b262ed",
       "sha256" : "a4752c71d81afd3d5865d24ddb11a6b0c615062fcc448d24050c2172d2cbccd6",
       "fileName" : "rundll32.exe",
       "filePath" : "C:\\Windows\\SysWOW64",
       "processId" : 3276,
       "processCommandLine" : "rundll32.exe  c:\emp\\suspicious.dll,RepeatAfterMe",
       "processCreationTime" : "2021-01-26T20:31:32.9581596Z",
       "parentProcessId" : 8420,
       "parentProcessCreationTime" : "2021-01-26T20:31:32.9004163Z",
       "parentProcessFileName" : "rundll32.exe",
       "parentProcessFilePath" : "C:\\Windows\\System32",
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : null,
       "domainName" : null,
       "userSid" : null,
       "aadUserId" : null,
       "userPrincipalName" : null,
       "detectionStatus" : "Detected" },

      { "entityType" : "File",
       "evidenceCreationTime" : "2021-01-26T20:33:58.42Z",
       "sha1" : "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
       "sha256" : "dc0ade0c95d6db98882bc8fa6707e64353cd6f7767ff48d6a81a6c2aef21c608",
       "fileName" : "suspicious.dll",
       "filePath" : "c:\emp",
       "processId" : null,
       "processCommandLine" : null,
       "processCreationTime" : null,
       "parentProcessId" : null,
       "parentProcessCreationTime" : null,
       "parentProcessFileName" : null,
       "parentProcessFilePath" : null,
       "ipAddress" : null,
       "url" : null,
       "registryKey" : null,
       "registryHive" : null,
       "registryValueType" : null,
       "registryValue" : null,
       "accountName" : null,
       "domainName" : null,
       "userSid" : null,
       "aadUserId" : null,
       "userPrincipalName" : null,
       "detectionStatus" : "Detected" } ] } ] },
  "statusCode" : 200,
  "alertCount" : 1,
  "alerts" :
  [
   { "id" : "da637472900382838869_1364969609",
    "title" : "Low-reputation arbitrary code executed by signed executable",
    "severity" : "Low",
    "status" : "New",
    "category" : "Execution",
    "description" : "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
    "relatedUser" : "jsmith",
    "creationTime" : "2021-01-26T20:33:57.7220239Z" } ] }

Isolate Device

Disconnect a device from the network to contain threats and prevent lateral movement

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Isolation Type dropDown required

Specifies how the device is isolated from the network. Full isolation blocks all network access except to Defender. Selective isolation allows limited app connectivity. Unmanaged Device targets devices not enrolled in Defender.

  • Full (Default)

  • Selective

  • Unmanaged Device

Comment textField required

The comment to associate with the action

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

    • isolationType string

      The type of isolation to perform.

    • comment string

      The comment to associate with the action.

Input Example

{
  "properties": {
    "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "isolationType": "Full",
    "comment": "Isolate device due to alert 1234"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • actionId string

      The unique identifier for the device action.

    • deviceId string

      The unique identifier of the device on which the action was executed.

    • name string

      The DNS name of the device.

    • type string

      The type of action performed on the device.

    • status string

      The current status of the command, such as Pending, Succeeded, or Failed.

    • requestor string

      The identity of the person or app that executed the action.

    • creationDateTimeUtc string

      The date and time in UTC when the action was initially created.

    • lastUpdateDateTimeUtc string

      The last date and time in UTC when the action status was updated.

    • requestorComment string

      The comment provided by the requestor when issuing the action.

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#Machines/$entity",
    "id": "8af71966-4671-4734-a777-a855875c0ec4",
    "type": "Isolate",
    "title": null,
    "requestor": "Defender for Endpoint API",
    "requestorComment": "Isolate device due to alert 1234",
    "status": "Pending",
    "machineId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "computerDnsName": "johns-work-computer",
    "creationDateTimeUtc": "2026-01-23T20:10:40.8785235Z",
    "lastUpdateDateTimeUtc": "2026-01-23T20:10:40.8785246Z",
    "cancellationRequestor": null,
    "cancellationComment": null,
    "cancellationDateTimeUtc": null,
    "errorHResult": 0,
    "scope": null,
    "externalId": null,
    "requestSource": "PublicApi",
    "relatedFileInfo": null,
    "commands": [],
    "troubleshootInfo": null
  },
  "statusCode": 201,
  "actionId": "8af71966-4671-4734-a777-a855875c0ec4",
  "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
  "name": "johns-work-computer",
  "type": "Isolate",
  "status": "Pending",
  "requestor": "Defender for Endpoint API",
  "creationDateTimeUtc": "2026-01-23T20:10:40.8785235Z",
  "lastUpdateDateTimeUtc": "2026-01-23T20:10:40.8785246Z",
  "requestorComment": "Isolate device due to alert 1234"
}

Release Device

Restore network connectivity to a previously isolated device

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Comment textField required

The comment to associate with the action

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

    • comment string

      The comment to associate with the action.

Input Example

{
  "properties": {
    "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "comment": "Device cleared, releasing from isolation"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • actionId string

      The unique identifier for the device action.

    • deviceId string

      The unique identifier of the device on which the action was executed.

    • name string

      The DNS name of the device.

    • type string

      The type of action performed on the device.

    • status string

      The current status of the command, such as Pending, Succeeded, or Failed.

    • requestor string

      The identity of the person or app that executed the action.

    • creationDateTimeUtc string

      The date and time in UTC when the action was initially created.

    • lastUpdateDateTimeUtc string

      The last date and time in UTC when the action status was updated.

    • requestorComment string

      The comment provided by the requestor when issuing the action.

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#MachineActions/$entity",
    "id": "6c4cc569-7d8c-4be0-9f24-327538949e7d",
    "type": "Unisolate",
    "title": null,
    "requestor": "Defender for Endpoint API",
    "requestorComment": "Device cleared, releasing from isolation",
    "status": "Pending",
    "machineId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "computerDnsName": "johns-work-computer",
    "creationDateTimeUtc": "2026-01-24T00:01:58.4314288Z",
    "lastUpdateDateTimeUtc": "2026-01-24T00:01:58.4314293Z",
    "cancellationRequestor": null,
    "cancellationComment": null,
    "cancellationDateTimeUtc": null,
    "errorHResult": 0,
    "scope": null,
    "externalId": null,
    "requestSource": "PublicApi",
    "relatedFileInfo": null,
    "commands": [],
    "troubleshootInfo": null
  },
  "statusCode": 201,
  "actionId": "6c4cc569-7d8c-4be0-9f24-327538949e7d",
  "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
  "name": "johns-work-computer",
  "type": "Unisolate",
  "status": "Pending",
  "requestor": "Defender for Endpoint API",
  "creationDateTimeUtc": "2026-01-24T00:01:58.4314288Z",
  "lastUpdateDateTimeUtc": "2026-01-24T00:01:58.4314293Z",
  "requestorComment": "Device cleared, releasing from isolation"
}

Restrict App Execution

Block all applications on the device except those signed by Microsoft

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Comment textField required

The comment to associate with the action

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

    • comment string

      The comment to associate with the action.

Input Example

{
  "properties": {
    "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "comment": "Restrict app execution due to suspicious activity"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • actionId string

      The unique identifier for the device action.

    • deviceId string

      The unique identifier of the device on which the action was executed.

    • name string

      The DNS name of the device.

    • type string

      The type of action performed on the device.

    • status string

      The current status of the command, such as Pending, Succeeded, or Failed.

    • requestor string

      The identity of the person or app that executed the action.

    • creationDateTimeUtc string

      The date and time in UTC when the action was initially created.

    • lastUpdateDateTimeUtc string

      The last date and time in UTC when the action status was updated.

    • requestorComment string

      The comment provided by the requestor when issuing the action.

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#MachineActions/$entity",
    "id": "7fd99be4-cb9b-42bb-b651-10736d67dd69",
    "type": "RestrictCodeExecution",
    "title": null,
    "requestor": "Defender for Endpoint API",
    "requestorComment": "Restrict app execution due to suspicious activity",
    "status": "Pending",
    "machineId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "computerDnsName": "johns-work-computer",
    "creationDateTimeUtc": "2026-01-24T22:17:02.3601426Z",
    "lastUpdateDateTimeUtc": "2026-01-24T22:17:02.3602286Z",
    "cancellationRequestor": null,
    "cancellationComment": null,
    "cancellationDateTimeUtc": null,
    "errorHResult": 0,
    "scope": null,
    "externalId": null,
    "requestSource": "PublicApi",
    "relatedFileInfo": null,
    "commands": [],
    "troubleshootInfo": null
  },
  "statusCode": 201,
  "actionId": "7fd99be4-cb9b-42bb-b651-10736d67dd69",
  "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
  "name": "johns-work-computer",
  "type": "RestrictCodeExecution",
  "status": "Pending",
  "requestor": "Defender for Endpoint API",
  "creationDateTimeUtc": "2026-01-24T22:17:02.3601426Z",
  "lastUpdateDateTimeUtc": "2026-01-24T22:17:02.3602286Z",
  "requestorComment": "Restrict app execution due to suspicious activity"
}

Remove App Restriction

Lift app execution restrictions and allow all applications to run

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Comment textField required

The comment to associate with the action

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

    • comment string

      The comment to associate with the action.

Input Example

{
  "properties": {
    "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "comment": "Device cleared, removing app restriction"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • actionId string

      The unique identifier for the device action.

    • deviceId string

      The unique identifier of the device on which the action was executed.

    • name string

      The DNS name of the device.

    • type string

      The type of action performed on the device.

    • status string

      The current status of the command, such as Pending, Succeeded, or Failed.

    • requestor string

      The identity of the person or app that executed the action.

    • creationDateTimeUtc string

      The date and time in UTC when the action was initially created.

    • lastUpdateDateTimeUtc string

      The last date and time in UTC when the action status was updated.

    • requestorComment string

      The comment provided by the requestor when issuing the action.

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#MachineActions/$entity",
    "id": "8a5c34dc-9ca9-4be4-b3c2-4c70e4bfb69a",
    "type": "UnrestrictCodeExecution",
    "title": null,
    "requestor": "Defender for Endpoint API",
    "requestorComment": "Device cleared, removing app restriction",
    "status": "Pending",
    "machineId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "computerDnsName": "johns-work-computer",
    "creationDateTimeUtc": "2026-01-30T21:11:22.8419303Z",
    "lastUpdateDateTimeUtc": "2026-01-30T21:11:22.8419314Z",
    "cancellationRequestor": null,
    "cancellationComment": null,
    "cancellationDateTimeUtc": null,
    "errorHResult": 0,
    "scope": null,
    "externalId": null,
    "requestSource": "PublicApi",
    "relatedFileInfo": null,
    "commands": [],
    "troubleshootInfo": null
  },
  "statusCode": 201,
  "actionId": "8a5c34dc-9ca9-4be4-b3c2-4c70e4bfb69a",
  "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
  "name": "johns-work-computer",
  "type": "UnrestrictCodeExecution",
  "status": "Pending",
  "requestor": "Defender for Endpoint API",
  "creationDateTimeUtc": "2026-01-30T21:11:22.8419303Z",
  "lastUpdateDateTimeUtc": "2026-01-30T21:11:22.8419314Z",
  "requestorComment": "Device cleared, removing app restriction"
}

Offboard Device

Remove a device from active monitoring and management in Microsoft Defender for Endpoint

Show details
  • Properties

  • Input Schema

  • Output Schema

Device ID textField required

The device identifier. Accepts the Microsoft Defender for Endpoint device ID, the Microsoft Entra device ID, or the computer DNS name.

Comment textField required

The comment to associate with the action

  • default object

    • deviceId string

      The unique device identifier in Microsoft Defender for Endpoint.

    • comment string

      The comment to associate with the action.

Input Example

{
  "properties": {
    "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "comment": "Device end of life"
  }
}
  • output object

    • rawResponse object

      The full, unmodified JSON object returned directly from the external API call.

    • statusCode number

      The HTTP status code returned by the API request.

    • actionId string

      The unique identifier for the device action.

    • deviceId string

      The unique identifier of the device on which the action was executed.

    • name string

      The DNS name of the device.

    • type string

      The type of action performed on the device.

    • status string

      The current status of the command, such as Pending, Succeeded, or Failed.

    • requestor string

      The identity of the person or app that executed the action.

    • creationDateTimeUtc string

      The date and time in UTC when the action was initially created.

    • lastUpdateDateTimeUtc string

      The last date and time in UTC when the action status was updated.

    • requestorComment string

      The comment provided by the requestor when issuing the action.

Output Example

{
  "rawResponse": {
    "@odata.context": "https://api.security.microsoft.com/api/$metadata#MachineActions/$entity",
    "id": "b2a3c4d5-e6f7-8901-abcd-234567890123",
    "type": "Offboard",
    "title": null,
    "requestor": "Defender for Endpoint API",
    "requestorComment": "Device end of life",
    "status": "Pending",
    "machineId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
    "computerDnsName": "johns-work-computer",
    "creationDateTimeUtc": "2026-01-24T00:01:58.4314288Z",
    "lastUpdateDateTimeUtc": "2026-01-24T00:01:58.4314293Z",
    "cancellationRequestor": null,
    "cancellationComment": null,
    "cancellationDateTimeUtc": null,
    "errorHResult": 0,
    "scope": null,
    "externalId": null,
    "requestSource": "PublicApi",
    "relatedFileInfo": null,
    "commands": [],
    "troubleshootInfo": null
  },
  "statusCode": 201,
  "actionId": "b2a3c4d5-e6f7-8901-abcd-234567890123",
  "deviceId": "49e96a8dd67ac4f1ce9952ccedcde711f0ce28e9",
  "name": "johns-work-computer",
  "type": "Offboard",
  "status": "Pending",
  "requestor": "Defender for Endpoint API",
  "creationDateTimeUtc": "2026-01-24T00:01:58.4314288Z",
  "lastUpdateDateTimeUtc": "2026-01-24T00:01:58.4314293Z",
  "requestorComment": "Device end of life"
}