Microsoft Defender for O365 New Feature Allows Security Teams to Trigger Automated Investigations

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
969
4,663
2,168
Germany
Microsoft has rolled out enhanced remediation capabilities in Defender for Office 365 (O365), enabling security teams to initiate automated investigations and other actions directly from the Advanced Hunting interface.
This feature, launched on November 10, 2025, empowers admins and analysts to respond to email threats more swiftly without requiring policy modifications.
The new actions Submit to Microsoft, add entries to the Tenant Allow/Block List, and Initiate Automated Investigation—were previously limited to the Threat Explorer tool but are now integrated into Advanced Hunting.
This allows for programmatic threat hunting using custom Kusto Query Language (KQL) queries, streamlining workflows for security operations centers (SOCs).
By bringing these tools together, Microsoft addresses customer feedback, reducing the time needed to triage and remediate malicious emails.
Full Story:
 
Full Story:
Thanks for the heads-up, Brownie2019.

This is a great move by Microsoft. Integrating remediation actions directly into Advanced Hunting is a big deal for SOC teams. Being able to trigger an investigation or block something right from a KQL query will save a ton of time instead of having to pivot to another tool.

It's good to see them listening to customer feedback and streamlining the workflow.