Skip to content

Commit 95570d5

Browse files
EdB-MSFTyelevinbatamig
authored
Apply suggestions from code review
Co-authored-by: Yechiel Levin <[email protected]> Co-authored-by: Batami Gold <[email protected]>
1 parent c47fd6f commit 95570d5

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

articles/sentinel/microsoft-sentinel-defender-portal.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ This section covers the Microsoft Sentinel capabilities or integrations that are
5757
| Entities: Add entities to threat intelligence from incidents | Azure portal only | This functionality is unavailable in the Defender portal. <Br><br>For more information, see [Add entity to threat indicators](add-entity-to-threat-intelligence.md). |
5858
| Fusion: Advanced multistage attack detection | Azure portal only | The Fusion analytics rule, which creates incidents based on alert correlations made by the Fusion correlation engine, is disabled when you onboard Microsoft Sentinel to the Defender portal. <br><br>The Defender portal uses Microsoft Defender XDR's incident-creation and correlation functionalities to replace those of the Fusion engine. <br><br>For more information, see [Advanced multistage attack detection in Microsoft Sentinel](fusion.md) |
5959
| Incidents: Adding alerts to incidents /<br>Removing alerts from incidents | Defender portal only | After onboarding Microsoft Sentinel to the Defender portal, you can no longer add alerts to, or remove alerts from, incidents in the Azure portal. <br><br>You can remove an alert from an incident in the Defender portal, but only by linking the alert to another incident (existing or new). |
60-
| <a name="5min"></a>Incidents: Creation | After onboarding to the Defender portal: Incidents are created by the correlation engine in the Microsoft Defender portal. | Incidents created in the Defender portal for alerts generated by Microsoft Sentinel have <b>Incident `providerName`</b> = <b>Microsoft XDR</b>. <br><br>Any active Microsoft security incident creation rules are deactivated to avoid creating duplicate incidents. The incident creation settings in other types of analytics rules remain as they were, but those settings are implemented in the Defender portal, not in Microsoft Sentinel.<br><br>It may take up to 5 minutes for Microsoft Defender incidents to show in Microsoft Sentinel. This doesn't affect features provided directly by Microsoft Defender, such as automatic attack disruption.<br><br>For more information, see the following articles: <br>- [Incidents and alerts in the Microsoft Defender portal](/defender-xdr/incidents-overview) <br>- [Alert correlation and incident merging in the Microsoft Defender portal](/defender-xdr/alerts-incidents-correlation) |
60+
| <a name="5min"></a>Incidents: Creation | After onboarding to the Defender portal: Incidents are created by the correlation engine in the Microsoft Defender portal. | Incidents created in the Defender portal for alerts generated by Microsoft Sentinel have <b>Incident `providerName`</b> = <b>`Microsoft XDR`</b>. <br><br>Any active Microsoft security incident creation rules are deactivated to avoid creating duplicate incidents. The incident creation settings in other types of analytics rules remain as they were, but those settings are implemented in the Defender portal, not in Microsoft Sentinel.<br><br>It may take up to 5 minutes for Microsoft Defender incidents to show in Microsoft Sentinel. This doesn't affect features provided directly by Microsoft Defender, such as automatic attack disruption.<br><br>For more information, see the following articles: <br>- [Incidents and alerts in the Microsoft Defender portal](/defender-xdr/incidents-overview) <br>- [Alert correlation and incident merging in the Microsoft Defender portal](/defender-xdr/alerts-incidents-correlation) |
6161
| Incidents: Editing comments | Azure portal only | After onboarding Microsoft Sentinel to the Defender portal, you can add comments to incidents in either portal, but you can't edit existing comments. <br><br>Edits made to comments in the Azure portal don't synchronize to the Defender portal. |
6262
| Incidents: Programmatic and manual creation of incidents | Azure portal only | Incidents created in Microsoft Sentinel through the API, by a Logic App playbook, or manually from the Azure portal, aren't synchronized to the Defender portal. These incidents are still supported in the Azure portal and the API. See [Create your own incidents manually in Microsoft Sentinel](create-incident-manually.md). |
6363
| Incidents: Reopening closed incidents | Azure portal only | In the Defender portal, you can't set alert grouping in Microsoft Sentinel analytics rules to reopen closed incidents if new alerts are added. <br>Closed incidents aren't reopened in this case, and new alerts trigger new incidents. |
@@ -140,10 +140,10 @@ The following table lists the changes in navigation between the Azure and Defend
140140

141141
### API responses
142142

143-
The unified experience introduces changes to incidents and alerts APIs. It supports API calls based on the Microsoft Graph REST API v1.0, which can be used for automation related to alerts, incidents, and advanced hunting.
143+
The unified experience in the Defender portal introduces notable changes to incidents and alerts from APIs. It supports API calls based on the [Microsoft Graph REST API v1.0](/graph/api/resources/security-api-overview?view=graph-rest-1.0), which can be used for automation related to alerts, incidents, advanced hunting, and more.
144144

145-
The Microsoft Sentinel’s API continues to support actions against Microsoft Sentinel resources, like analytics rules, automation rules. For interacting with unified incidents and alerts, we recommended to use the Microsoft Graph REST API.
146-
If you are using the SecurityInsights API to interact with Microsoft Sentinel incidents, you may need to update your automation conditions and trigger criteria due to changes in the response body. The following fields are important in the response body of the API:
145+
The [Microsoft Sentinel API](/rest/api/securityinsights/api-versions) continues to support actions against Microsoft Sentinel resources, like analytics rules, automation rules and more. For interacting with unified incidents and alerts, we recommend that you use the Microsoft Graph REST API.
146+
If you're using the Microsoft Sentinel `SecurityInsights` API to interact with Microsoft Sentinel incidents, you may need to update your automation conditions and trigger criteria due to changes in the response body. The following fields are important in the response snippets:
147147

148148
+ `alertProductNames`: The source that triggered the detection
149149
+ `incidentUrl`: The direct URL to the incident in the Microsoft Sentinel portal
@@ -155,13 +155,12 @@ After transitioning to the unified experience, the following sections are added
155155

156156
When using an HTTP GET command for a specific unified incident with the Microsoft Graph REST API, the body response has the following differences:
157157

158-
+ The `incidentWebUrl` field provides the direct link to the incident, which can be used to synchronize this information with a ticketing system like ServiceNow.
159-
+ If the response doesn't contain the `alertProductNames` array, you can retrieve it by updating the initial HTTP GET command. Add `?$expand=alerts` after the GET command, for example `https://graph.microsoft.com/v1.0/security/incidents/368?$expand=alerts`
158+
+ The `incidentWebUrl` field provides a direct link to the incident, which can be used to synchronize this information with a third-party ticketing system like ServiceNow.
159+
+ If the response doesn't contain the `alertProductNames` array, you can retrieve it by updating the initial HTTP GET command to add `?$expand=alerts` after the GET command. For example: `https://graph.microsoft.com/v1.0/security/incidents/368?$expand=alerts`
160160

161161
The following new fields have been added to the response body:
162162
+ `serviceSource` : The service or product that created the alert
163163
+ `detectionSource` : Detection technology or sensor that identified the notable component or activity
164-
+ `productName` : The name of the product that published this alert.
165164

166165

167166
## Related content

0 commit comments

Comments
 (0)