Skip to content

Commit 111c48d

Browse files
authored
Merge pull request #277706 from yelevin/yelevin/incident-creation-rules
Updating article for freshness
2 parents 16cd8cd + 1db10e9 commit 111c48d

File tree

8 files changed

+34
-20
lines changed

8 files changed

+34
-20
lines changed

articles/sentinel/create-incidents-from-alerts.md

Lines changed: 34 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -19,47 +19,61 @@ You can easily configure Microsoft Sentinel to automatically create incidents ev
1919
> - Enabled [**Microsoft Defender XDR incident integration**](microsoft-365-defender-sentinel-integration.md), or
2020
> - Onboarded Microsoft Sentinel to the [**unified security operations platform**](microsoft-sentinel-defender-portal.md).
2121
>
22-
> In these scenarios, Microsoft Defender XDR creates incidents from alerts generated in Microsoft services.
22+
> In these scenarios, Microsoft Defender XDR [creates incidents from alerts](/defender-xdr/alerts-incidents-correlation) generated in Microsoft services.
2323
2424
## Prerequisites
2525

2626
Connect your security solution by installing the appropriate solution from the **Content Hub** in Microsoft Sentinel and setting up the data connector. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md) and [Microsoft Sentinel data connectors](connect-data-sources.md).
2727

28-
## Using Microsoft Security incident creation analytics rules
28+
## Enable automatic incident generation in data connector
2929

30-
Use the rule templates available in Microsoft Sentinel to choose which connected Microsoft security solutions should create Microsoft Sentinel incidents automatically. You can also edit the rules to define more specific options for filtering which of the alerts generated by the Microsoft security solution should create incidents in Microsoft Sentinel. For example, you can choose to create Microsoft Sentinel incidents automatically only from high-severity Microsoft Defender for Cloud alerts.
30+
The most direct way to automatically create incidents from alerts generated from Microsoft security solutions is to configure the solution's data connector to create incidents:
3131

32-
1. In the Azure portal under Microsoft Sentinel, select **Analytics**.
32+
1. Connect a Microsoft security solution data source.
3333

34-
1. Select the **Rule templates** tab to see all of the analytics rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel.
34+
:::image type="content" source="media/incidents-from-alerts/generate-security-incidents.png" alt-text="Screenshot of data connector configuration screen." lightbox="media/incidents-from-alerts/generate-security-incidents.png":::
3535

36-
![Rule templates](media/incidents-from-alerts/rule-templates.png)
36+
1. Under **Create incidents – Recommended**, select **Enable** to enable the default analytics rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
3737

38-
1. Choose the **Microsoft security** analytics rule template that you want to use, and select **Create rule**.
38+
> [!IMPORTANT]
39+
>
40+
> If you don't see this section as shown, you most likely have enabled incident integration in your Microsoft Defender XDR connector, or you have onboarded Microsoft Sentinel to the unified security operations platform in the Microsoft Defender portal.
41+
>
42+
> In either case, this article does not apply to your environment, since your incidents are created by the Microsoft Defender correlation engine instead of by Microsoft Sentinel.
3943
40-
![Security analytics rule](media/incidents-from-alerts/security-analytics-rule.png)
44+
## Create incident creation rules from a Microsoft Security template
4145

42-
1. You can modify the rule details, and choose to filter the alerts that will create incidents by alert severity or by text contained in the alert’s name.
43-
44-
For example, if you choose **Microsoft Defender for Cloud** in the **Microsoft security service** field and choose **High** in the **Filter by severity** field, only high severity security alerts will automatically create incidents in Microsoft Sentinel.
46+
Microsoft Sentinel provides ready-made rule templates to create Microsoft Security rules. Each Microsoft source solution has its own template. For example, there's one for Microsoft Defender for Endpoint, one for Microsoft Defender for Cloud, and so on. Create a rule from each template that corresponds with the solutions in your environment, for which you want to create incidents automatically. Modify the rules to define more specific options for filtering which alerts should result in incidents. For example, you can choose to create Microsoft Sentinel incidents automatically only from high-severity alerts from Microsoft Defender for Identity.
4547

46-
![Create rule wizard](media/incidents-from-alerts/create-rule-wizard.png)
48+
1. From the Microsoft Sentinel navigation menu, under **Configuration**, select **Analytics**.
4749

48-
1. You can also create a new **Microsoft security** rule that filters alerts from different Microsoft security services by clicking on **+Create** and selecting **Microsoft incident creation rule**.
50+
1. Select the **Rule templates** tab to see all of the analytics rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel.
4951

50-
![Incident creation rule](media/incidents-from-alerts/incident-creation-rule.png)
52+
:::image type="content" source="media/incidents-from-alerts/rule-templates.png" alt-text="Screenshot of rule templates list in Analytics page." lightbox="media/incidents-from-alerts/rule-templates.png":::
5153

52-
You can create more than one **Microsoft Security** analytics rule per **Microsoft security service** type. This does not create duplicate incidents, since each rule is used as a filter. Even if an alert matches more than one **Microsoft Security** analytics rule, it creates just one Microsoft Sentinel incident.
54+
1. Filter the list for the **Microsoft security** rule type to see the analytics rule templates for creating incidents from Microsoft alerts.
5355

54-
## Enable incident generation automatically during connection
56+
:::image type="content" source="media/incidents-from-alerts/security-analytics-rule.png" alt-text="Screenshot of Microsoft security rule templates list.":::
5557

56-
When you connect a Microsoft security solution, you can select whether you want the alerts from the security solution to automatically generate incidents in Microsoft Sentinel automatically.
58+
1. Select the rule template for the alert source for which you want to create incidents. Then, in the details pane, select **Create rule**.
5759

58-
1. Connect a Microsoft security solution data source.
60+
:::image type="content" source="media/incidents-from-alerts/rule-template-details.png" alt-text="Screenshot of rule template details panel.":::
61+
62+
1. Modify the rule details, filtering the alerts that will create incidents by alert severity or by text contained in the alert’s name.
63+
64+
For example, if you choose **Microsoft Defender for Identity** in the **Microsoft security service** field and choose **High** in the **Filter by severity** field, only high severity security alerts will automatically create incidents in Microsoft Sentinel.
65+
66+
:::image type="content" source="media/incidents-from-alerts/create-rule-wizard.png" alt-text="Screenshot of rule creation wizard.":::
67+
68+
1. Like with other types of analytics rules, select the **Automated response** tab to define [automation rules](create-manage-use-automation-rules.md) that run when incidents are created by this rule.
69+
70+
## Create incident creation rules from scratch
71+
72+
You can also create a new **Microsoft security** rule that filters alerts from different Microsoft security services. On the **Analytics** page, select **Create > Microsoft incident creation rule**.
5973

60-
![Generate security incidents](media/incidents-from-alerts/generate-security-incidents.png)
74+
:::image type="content" source="media/incidents-from-alerts/incident-creation-rule.png" alt-text="Screenshot of creating a Microsoft Security rule on the Analytics page.":::
6175

62-
1. Under **Create incidents** select **Enable** to enable the default analytics rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
76+
You can create more than one **Microsoft Security** analytics rule per **Microsoft security service** type. This does not create duplicate incidents if you apply filters on each rule that exclude each other.
6377

6478
## Next steps
6579

3.08 KB
Loading
-101 KB
Loading
-165 KB
Loading
37.6 KB
Loading
89.5 KB
Loading
43.8 KB
Loading
-172 KB
Loading

0 commit comments

Comments
 (0)