Skip to content

Commit 92a21e2

Browse files
Merge pull request #282185 from yelevin/yelevin/incident-creation-exception
Incident creation IRM exception
2 parents a70fe93 + bb7af52 commit 92a21e2

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

articles/sentinel/create-incidents-from-alerts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ You can easily configure Microsoft Sentinel to automatically create incidents ev
2020
> - Onboarded Microsoft Sentinel to the [**unified security operations platform**](microsoft-sentinel-defender-portal.md).
2121
>
2222
> In these scenarios, Microsoft Defender XDR [creates incidents from alerts](/defender-xdr/alerts-incidents-correlation) generated in Microsoft services.
23+
>
24+
> If you use incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the unified security operations platform in the Defender portal, replace your incident creation rules with [scheduled analytics rules](scheduled-rules-overview.md).
2325
2426
## Prerequisites
2527

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ To avoid creating *duplicate incidents for the same alerts*, the **Microsoft inc
127127

128128
- After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
129129

130-
- If you use Microsoft Sentinel's incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the unified security operations platform in the Defender portal, replace your incident creation rules with [scheduled analytic rules](create-analytics-rule-from-template.md).
130+
- If you use Microsoft Sentinel's incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the unified security operations platform in the Defender portal, replace your incident creation rules with [scheduled analytics rules](scheduled-rules-overview.md).
131131

132132
## Working with Microsoft Defender XDR incidents in Microsoft Sentinel and bi-directional sync
133133

0 commit comments

Comments
 (0)