Skip to content

Commit 92e431c

Browse files
committed
Incorp feedback from Batami and Austin
1 parent a1705bd commit 92e431c

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,13 +121,14 @@ The exception to this process is Microsoft Defender for Cloud. Although its inte
121121

122122
### Microsoft incident creation rules
123123

124-
To avoid creating *duplicate incidents for the same alerts*, the **Microsoft incident creation rules** setting is turned off for Defender XDR-integrated products when connecting Defender XDR. This is because Defender XDR has its own incident creation rules. This change has the following potential impacts:
124+
To avoid creating *duplicate incidents for the same alerts*, the **Microsoft incident creation rules** setting is turned off for Defender XDR-integrated products when connecting Defender XDR. Defender XDR-integrated products include Microsoft Defender for Identity, Microsoft Defender for Office 365, and more. Also, Microsoft incident creation rules aren't supported in the unified security operations platform. Defender XDR has its own incident creation rules. This change has the following potential impacts:
125125

126126
- Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
127127

128128
- After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
129129

130-
- Microsoft Sentinel's incident creation rules allowed you automatically create incidents for alerts generated by Microsoft security solutions connected to Microsoft Sentinel, such as Microsoft Purview Insider Risk Management. Automatically create incidents for alerts triggered in Microsoft security solutions by using [scheduled analytic rules](create-analytics-rule-from-template.md).
130+
- If you use Microsoft Sentinel's incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the unified security operations platform in the Defender portal, replace your incident creation rules with [scheduled analytic rules](create-analytics-rule-from-template.md).
131+
131132

132133
## Working with Microsoft Defender XDR incidents in Microsoft Sentinel and bi-directional sync
133134

0 commit comments

Comments
 (0)