Skip to content

Commit a1705bd

Browse files
committed
Add bullet about incident creation rules
1 parent d4525be commit a1705bd

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -119,13 +119,15 @@ The exception to this process is Microsoft Defender for Cloud. Although its inte
119119
- [Microsoft Defender for Cloud in the Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-security-center-defender-cloud)
120120
- [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](ingest-defender-for-cloud-incidents.md)
121121

122-
### Avoiding duplicate incidents
122+
### Microsoft incident creation rules
123123

124124
To avoid creating *duplicate incidents for the same alerts*, the **Microsoft incident creation rules** setting is turned off for Defender XDR-integrated products when connecting Defender XDR. This is because Defender XDR has its own incident creation rules. This change has the following potential impacts:
125125

126-
- Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
126+
- Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
127127

128-
- After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
128+
- After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
129+
130+
- Microsoft Sentinel's incident creation rules allowed you automatically create incidents for alerts generated by Microsoft security solutions connected to Microsoft Sentinel, such as Microsoft Purview Insider Risk Management. Automatically create incidents for alerts triggered in Microsoft security solutions by using [scheduled analytic rules](create-analytics-rule-from-template.md).
129131

130132
## Working with Microsoft Defender XDR incidents in Microsoft Sentinel and bi-directional sync
131133

0 commit comments

Comments
 (0)