Forum Discussion
Audit logs for Vulnerability Management Remediations
Hello all,
Are there any audit logs that can be queried for the creation of Remediations under Endpoint Vulnerability Management (https://security.microsoft.com/remediation/remediation-activities)?
I know that there are API endpoints that can be queried for this information, but we are looking for additional options.
The endgame is to have a ticket created in our external help desk ticketing system when someone creates a Remediation from a Recommendation.
Any advice is appreciated!
Thanks,
- Steve
1 Reply
Hi Stephan,
Good question. Microsoft does not publish one single “master list” of every AI component inside Defender XDR, but based on public documentation and released capabilities, here is a practical overview of where AI / ML is currently used across the platform.
Defender XDR uses AI in multiple layers: detection, correlation, prioritization, investigation, disruption, remediation, and analyst assistance.
Current known areas:
- Incident correlation and alert fusion
Defender XDR automatically correlates signals from endpoint, identity, email, SaaS apps, and cloud workloads into a single incident. This uses analytics and machine learning to group related alerts and reduce noise. (Microsoft Learn)
- Automated Attack Disruption
One of the clearest AI-driven capabilities today. Defender XDR uses high-confidence signals across products to detect active attacks such as ransomware or business email compromise, then automatically contains devices, users, sessions, or assets. (Microsoft Learn)
- Automated Investigation and Remediation (AIR)
Used especially in Defender for Endpoint and Defender for Office 365. AI helps investigate suspicious files, processes, emails, users, and recommends or executes remediation steps. (Microsoft Learn)
- Incident prioritization
Newer capability where machine learning scores incidents based on severity, asset criticality, attack context, likelihood, and business impact so analysts know what to work first. (TECHCOMMUNITY.MICROSOFT.COM)
- Detection models in Defender products
Within the workloads that feed Defender XDR:
- Defender for Endpoint uses behavioral AI, anomaly detection, malware classification
• Defender for Office 365 uses phishing / spoofing / malicious URL detection models
• Defender for Identity uses identity anomaly detections
• Defender for Cloud Apps uses UEBA and anomalous cloud activity detections
Those detections are then surfaced into XDR incidents.
- Microsoft Security Copilot in Defender
Embedded Copilot uses generative AI for:
- Incident summaries
• Guided response steps
• KQL assistance
• Script / file explanation
• Threat hunting support
• Natural language investigations (Microsoft Learn)
- Similar incident matching
Defender can identify similar historical incidents to help triage current alerts. This is ML-based case similarity logic. (Microsoft Learn)
- Dynamic Threat Detection Agent (preview)
Security Copilot + Defender backend capability that continuously analyzes signals to identify threats missed by traditional static detections. (Microsoft Learn)
- Self-healing / automatic response orchestration
Cross-product AI logic can trigger actions such as email purge after malware file detection elsewhere, device containment, identity response, etc. (Microsoft Learn)
How data is used for training and decisions
Microsoft generally separates this into two areas:
Operational models (detections)
Signals such as process behavior, login patterns, email telemetry, device events, attack chains, and threat intelligence are used to train and improve detection models.
Customer tenant decisions
Your tenant telemetry is used in real time for scoring, anomaly detection, incident correlation, attack disruption decisions, prioritization, and Copilot contextual answers based on permissions.
Generative AI / Copilot
Prompts and context are processed under Microsoft enterprise security/privacy commitments. Microsoft states customer data is not used to train foundation models by default in the same public-consumer sense.
Practical summary
If you use Defender XDR today, AI is operating in:
- Prevention
• Detection
• Correlation
• Prioritization
• Investigation
• Automated response
• Analyst productivity
• Threat hunting assistance
Short version: AI is no longer one feature in Defender XDR. It is now part of almost every stage of the SOC workflow.