Skip to content

Commit d2f4594

Browse files
Merge pull request #280639 from cwatson-cat/7-10-24-xdr-integr-upds-sent
Sentinel - more edits to XDR integration doc
2 parents 5b71a9b + cd8ec0e commit d2f4594

File tree

2 files changed

+7
-8
lines changed

2 files changed

+7
-8
lines changed

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how using Microsoft Defender XDR together with Microsoft Sent
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 07/08/2024
7+
ms.date: 07/11/2024
88
appliesto:
99
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
1010
ms.collection: usx-security
@@ -17,7 +17,7 @@ Integrate Microsoft Defender XDR with Microsoft Sentinel to stream all Defender
1717

1818
Alternatively, onboard Microsoft Sentinel with Defender XDR to the unified security operations platform in the Defender portal. The unified security operations platform brings together the full capabilities of Microsoft Sentinel, Defender XDR, and generative AI built specifically for cybersecurity. For more information, see the following resources:
1919

20-
- [Unified security operations platform with Microsoft Sentinel and Defender XDR](https://aka.ms/unified-soc-announcement)
20+
- Blog post: [General availability of the Microsoft unified security operations platform](https://aka.ms/unified-soc-announcement)
2121
- [Microsoft Sentinel in the Microsoft Defender portal](microsoft-sentinel-defender-portal.md)
2222
- [Microsoft Copilot in Microsoft Defender](/defender-xdr/security-copilot-in-microsoft-365-defender)
2323

@@ -76,7 +76,7 @@ Other services whose alerts are collected by Defender XDR include:
7676
- Microsoft Purview Data Loss Prevention ([Learn more](/microsoft-365/security/defender/investigate-dlp))
7777
- Microsoft Entra ID Protection ([Learn more](/defender-cloud-apps/aadip-integration))
7878

79-
The Defender XDR connector also brings incidents from Microsoft Defender for Cloud. To synchronize alerts and entities from these incidents as well, you must enable the Microsoft Defender for Cloud connector. Otherwise, your Microsoft Defender for Cloud incidents appear empty. For more information, see [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](ingest-defender-for-cloud-incidents.md).
79+
The Defender XDR connector also brings incidents from Microsoft Defender for Cloud. To synchronize alerts and entities from these incidents as well, you must enable the Defender for Cloud connector in Microsoft Sentinel. Otherwise, your Defender for Cloud incidents appear empty. For more information, see [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](ingest-defender-for-cloud-incidents.md).
8080

8181
In addition to collecting alerts from these components and other services, Defender XDR generates alerts of its own. It creates incidents from all of these alerts and sends them to Microsoft Sentinel.
8282

@@ -123,13 +123,12 @@ The exception to this process is Microsoft Defender for Cloud. Although its inte
123123

124124
To avoid creating *duplicate incidents for the same alerts*, the **Microsoft incident creation rules** setting is turned off for Defender XDR-integrated products when connecting Defender XDR. Defender XDR-integrated products include Microsoft Defender for Identity, Microsoft Defender for Office 365, and more. Also, Microsoft incident creation rules aren't supported in the unified security operations platform. Defender XDR has its own incident creation rules. This change has the following potential impacts:
125125

126-
- Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
126+
- Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
127127

128128
- After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
129129

130130
- If you use Microsoft Sentinel's incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the unified security operations platform in the Defender portal, replace your incident creation rules with [scheduled analytic rules](create-analytics-rule-from-template.md).
131131

132-
133132
## Working with Microsoft Defender XDR incidents in Microsoft Sentinel and bi-directional sync
134133

135134
Defender XDR incidents appear in the Microsoft Sentinel incidents queue with the product name **Microsoft Defender XDR**, and with similar details and functionality to any other Microsoft Sentinel incidents. Each incident contains a link back to the parallel incident in the Microsoft Defender portal.
@@ -158,5 +157,5 @@ The Defender XDR connector also lets you stream **advanced hunting** events&mdas
158157
In this document, you learned the benefits of enabling the Defender XDR connector in Microsoft Sentinel.
159158

160159
- [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md)
161-
- To use the unified security operations platform in the Defender portal, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md).
160+
- To use the unified security operations platform in the Defender portal, see [Connect Microsoft Sentinel to Microsoft Defender XDR](/defender-xdr/microsoft-sentinel-onboard).
162161
- Check [availability of different Microsoft Defender XDR data types](microsoft-365-defender-cloud-support.md) in the different Microsoft 365 and Azure clouds.

articles/sentinel/microsoft-sentinel-defender-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about changes in the Microsoft Defender portal with the integ
44
author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: conceptual
7-
ms.date: 07/10/2024
7+
ms.date: 07/11/2024
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
ms.collection: usx-security
@@ -14,7 +14,7 @@ ms.collection: usx-security
1414

1515
This article describes the Microsoft Sentinel experience in the Microsoft Defender portal. Microsoft Sentinel is now generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. For more information, see:
1616

17-
- [Blog post announcement for the general availability of Microsoft Sentinel within the unified security operations platform](https://aka.ms/unified-soc-announcement)
17+
- Blog post: [General availability of the Microsoft unified security operations platform](https://aka.ms/unified-soc-announcement)
1818
- [Connect Microsoft Sentinel to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-sentinel-onboard)
1919

2020
## New and improved capabilities

0 commit comments

Comments
 (0)