Skip to content

Commit 058d253

Browse files
authored
Merge pull request #2641 from MicrosoftDocs/main
Published main to live, Tuesday 5:00 PM IST, 02/04
2 parents a188a73 + 4519e7e commit 058d253

File tree

10 files changed

+30
-18
lines changed

10 files changed

+30
-18
lines changed

defender-xdr/incident-queue.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 01/10/2025
21+
ms.date: 01/27/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107107

108108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109109

110-
:::image type="content" source="/defender/media/incidents-queue/fig1-newfilters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110+
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
111111

112112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113113

@@ -134,8 +134,9 @@ This table lists the filter names that are available.
134134
| **Classification** | Specify the set of classifications of the related alerts. |
135135
| **Automated investigation state** | Specify the status of automated investigation. |
136136
| **Associated threat** | Specify a named threat. |
137-
| **Alert policies** | Specify an alert policy title. |
138-
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |
137+
| **Policy/policy rule** | Filter incidents based on policy or policy rule. |
138+
| **Product names** | Filter incidents based on product name. |
139+
| **Data stream** | Filter incidents based on the location or workload. |
139140

140141
> [!NOTE]
141142
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).

defender-xdr/investigate-alerts.md

Lines changed: 23 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,17 @@ ms.collection:
1616
ms.custom: admindeeplinkDEFENDER
1717
ms.topic: conceptual
1818
search.appverid:
19-
- MOE150
20-
- met150
21-
ms.date: 01/17/2025
19+
- MOE150
20+
- met150
21+
ms.date: 1/27/2025
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Investigate alerts in Microsoft Defender XDR
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR
31-
3230
> [!NOTE]
3331
> This article describes security alerts in Microsoft Defender XDR. However, you can use activity alerts to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Create activity alerts - Microsoft Purview | Microsoft Docs](/Microsoft-365/compliance/create-activity-alerts).
3432
@@ -38,15 +36,15 @@ In Microsoft Defender XDR, related alerts are aggregated together to form [incid
3836

3937
The **Alerts queue** shows the current set of alerts. You get to the alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
4038

41-
:::image type="content" source="/defender/media/investigate-alerts/alerts-ss-alerts-queue.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-ss-alerts-queue.png":::
39+
:::image type="content" source="/defender/media/investigate-alerts/alerts-page-defender-small.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-page-defender.png":::
4240

4341
Alerts from different Microsoft security solutions like Microsoft Defender for Endpoint, Defender for Office 365, Microsoft Sentinel, Defender for Cloud, Defender for Identity, Defender for Cloud Apps, Defender XDR, App Governance, Microsoft Entra ID Protection, and Microsoft Data Loss Prevention appear here.
4442

4543
By default, the alerts queue in the Microsoft Defender portal displays the new and in progress alerts from the last seven days. The most recent alert is at the top of the list so you can see it first.
4644

47-
From the default alerts queue, you can select **Filter** to see a **Filter** pane, from which you can specify a subset of the alerts. Here's an example.
45+
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
4846

49-
:::image type="content" source="/defender/media/investigate-alerts/alerts-ss-alerts-filter.png" alt-text="The Filters section in the Microsoft Defender portal." lightbox="/defender/media/investigate-alerts/alerts-ss-alerts-filter.png":::
47+
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
5048

5149
You can filter alerts according to these criteria:
5250

@@ -55,10 +53,12 @@ You can filter alerts according to these criteria:
5553
- Categories
5654
- Service/detection sources
5755
- Tags
58-
- Policy
56+
- Policy/Policy rule
57+
- Alert type
58+
- Product name
5959
- Entities (the impacted assets)
6060
- Automated investigation state
61-
- Alert subscription IDs
61+
- Data stream (workload or location)
6262

6363
> [!NOTE]
6464
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -73,6 +73,17 @@ An alert can have system tags and/or custom tags with certain color backgrounds.
7373
> [!TIP]
7474
> Microsoft's Security Exposure Management, based on predefined classifications, automatically tags devices, identities, and cloud resources as a **critical asset**. This out-of-the-box capability ensures the protection of an organization's valuable and most important assets. It also helps security operations teams to prioritize investigation and remediation. Know more about [critical asset management](/security-exposure-management/critical-asset-management).
7575
76+
> [!IMPORTANT]
77+
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
78+
79+
You can search for alerts using a custom date and time range or by using the search bar to search for specific alerts. To search for alerts within a specific date or time range, select **Custom range** in the date picker and then specify the start and end dates and times.
80+
81+
:::image type="content" source="/defender/media/investigate-alerts/alerts-custom-range.png" alt-text="Highlighting the custom range option in the date and time picker in the Alerts queue.":::
82+
83+
To search for specific alerts, enter the search term in the search bar. You can search for alerts based on the alert title or alert ID.
84+
85+
:::image type="content" source="/defender/media/investigate-alerts/alerts-search-bar-small.png" alt-text="Highlighting the search bar in the Alerts queue" lightbox="/defender/media/investigate-alerts/alerts-search-bar.png":::
86+
7687
## Required roles for Defender for Office 365 alerts
7788

7889
You'll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:

defender-xdr/prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/18/2024
19+
ms.date: 02/04/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
---
@@ -31,7 +31,7 @@ Learn about licensing and other requirements for provisioning and using [Microso
3131

3232
Microsoft Defender XDR natively correlates Microsoft security products' signals, providing security operations teams a single pane of glass to detect, investigate, respond, and protect your assets. These signals are dependent on the license that you have and the access provisioned to you.
3333

34-
Any of the these licenses gives you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost:
34+
Any of these licenses give you access to Microsoft Defender XDR features via the Microsoft Defender portal without any additional cost:
3535

3636
- Microsoft 365 E5 or A5
3737
- Microsoft 365 E3 with the Microsoft 365 E5 Security add-on
87.5 KB
Loading
54 KB
Loading
20.1 KB
Loading
111 KB
Loading
231 KB
Loading
28.8 KB
Loading
56.5 KB
Loading

0 commit comments

Comments
 (0)