Skip to content

Commit 0f0945d

Browse files
authored
Merge pull request #194629 from yelevin/yelevin/incident-assignment
Fixed non-blocking issues from PR 193397
2 parents 2b3a107 + 97238f5 commit 0f0945d

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/sentinel/investigate-cases.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ An incident can include multiple alerts. It's an aggregation of all the relevant
3636

3737
1. Select **Incidents**. The **Incidents** page lets you know how many incidents you have, how many are open, how many you've set to **In progress**, and how many are closed. For each incident, you can see the time it occurred, and the status of the incident. Look at the severity to decide which incidents to handle first.
3838

39-
![View incident severity](media/investigate-cases/incident-severity.png)
39+
:::image type="content" source="media/investigate-cases/incident-severity.png" alt-text="Screenshot of view of incident severity." lightbox="media/investigate-cases/incident-severity.png":::
4040

4141
1. You can filter the incidents as needed, for example by status or severity. For more information, see [Search for incidents](#search-for-incidents).
4242

4343
1. To begin an investigation, select a specific incident. On the right, you can see detailed information for the incident including its severity, summary of the number of entities involved, the raw events that triggered this incident, the incident’s unique ID, and any mapped MITRE ATT&CK tactics or techniques.
4444

4545
1. To view more details about the alerts and entities in the incident, select **View full details** in the incident page and review the relevant tabs that summarize the incident information.
4646

47-
![View alert details](media/investigate-cases/incident-timeline.png)
47+
:::image type="content" source="media/investigate-cases/incident-timeline.png" alt-text="Screenshot of view of alert details." lightbox="media/investigate-cases/incident-timeline.png":::
4848

4949
For example:
5050

@@ -56,7 +56,7 @@ An incident can include multiple alerts. It's an aggregation of all the relevant
5656

5757
1. Incidents can be assigned to a specific user or to a group. For each incident you can assign an owner, by setting the **Owner** field. All incidents start as unassigned. You can also add comments so that other analysts will be able to understand what you investigated and what your concerns are around the incident.
5858

59-
![Assign incident to user](media/investigate-cases/assign-incident-to-user.png)
59+
:::image type="content" source="media/investigate-cases/assign-incident-to-user.png" alt-text="Screenshot of assigning incident to user.":::
6060

6161
Recently selected users and groups will appear at the top of the pictured drop-down list.
6262

@@ -81,7 +81,7 @@ To use the investigation graph:
8181
1. Select an incident, then select **Investigate**. This takes you to the investigation graph. The graph provides an illustrative map of the entities directly connected to the alert and each resource connected further.
8282

8383

84-
[ ![View map.](media/investigate-cases/investigation-map.png) ](media/investigate-cases/investigation-map.png#lightbox)
84+
[![View map.](media/investigate-cases/investigation-map.png)](media/investigate-cases/investigation-map.png#lightbox)
8585

8686
> [!IMPORTANT]
8787
> - You'll only be able to investigate the incident if you used the entity mapping fields when you set up your analytics rule. The investigation graph requires that your original incident includes entities.
@@ -99,17 +99,17 @@ To use the investigation graph:
9999

100100
For example, on a computer you can request related alerts. If you select an exploration query, the resulting entitles are added back to the graph. In this example, selecting **Related alerts** returned the following alerts into the graph:
101101

102-
![View related alerts](media/investigate-cases/related-alerts.png)
102+
:::image type="content" source="media/investigate-cases/related-alerts.png" alt-text="Screenshot: view related alerts" lightbox="media/investigate-cases/related-alerts.png":::
103103

104104
1. For each exploration query, you can select the option to open the raw event results and the query used in Log Analytics, by selecting **Events\>**.
105105

106106
1. In order to understand the incident, the graph gives you a parallel timeline.
107107

108-
![View timeline in map](media/investigate-cases/map-timeline.png)
108+
:::image type="content" source="media/investigate-cases/map-timeline.png" alt-text="Screenshot: view timeline in map." lightbox="media/investigate-cases/map-timeline.png":::
109109

110110
1. Hover over the timeline to see which things on the graph occurred at what point in time.
111111

112-
![Use timeline in map to investigate alerts](media/investigate-cases/use-timeline.png)
112+
:::image type="content" source="media/investigate-cases/use-timeline.png" alt-text="Screenshot: use timeline in map to investigate alerts.'" lightbox="media/investigate-cases/use-timeline.png":::
113113

114114
## Comment on incidents
115115

articles/sentinel/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ While Workbooks are displayed differently in Microsoft Sentinel, it may be usefu
5656

5757
To help you reduce noise and minimize the number of alerts you have to review and investigate, Microsoft Sentinel uses [analytics to correlate alerts into incidents](detect-threats-built-in.md). **Incidents** are groups of related alerts that together create an actionable possible-threat that you can investigate and resolve. Use the built-in correlation rules as-is, or use them as a starting point to build your own. Microsoft Sentinel also provides machine learning rules to map your network behavior and then look for anomalies across your resources. These analytics connect the dots, by combining low fidelity alerts about different entities into potential high-fidelity security incidents.
5858

59-
![Incidents](./media/investigate-cases/incident-severity.png)
59+
![Incidents](./media/investigate-cases/incident-severity.png#lightbox)
6060

6161

6262
## Security automation & orchestration

0 commit comments

Comments
 (0)