Views:
March 12, 2025—The "Collect Quarantined File" action is now available in context menus within Workbench, Observed Attack Techniques, or XDR Data Explorer.
Streamline your incident response with new quarantined file actions available across multiple investigation workflows. When investigating alerts and insights in Workbench, Observed Attack Techniques, or XDR Data Explorer, the system automatically detects quarantined files and displays the "Collect Quarantined File" action in context menus, replacing standard file collection for files quarantined by Standard Endpoint Protection and Server & Workload Protection. You can also restore or delete quarantined files from Endpoint Event Viewer using the Anti-Malware Identified file event view.
For more information about Endpoint Event Viewer, see Endpoint Event Viewer.
Workflow and AutomationResponse Management
Endpoint SecurityEndpoint Event Viewer