Skip to content

Commit 0eda1cc

Browse files
authored
Merge pull request #3924 from limwainstein/incident-overview-changes
Adding removed sections from incident overview
2 parents 41da72f + 65a4268 commit 0eda1cc

File tree

4 files changed

+100
-5
lines changed

4 files changed

+100
-5
lines changed

defender-xdr/TOC.yml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -79,22 +79,24 @@
7979
- name: Investigate and respond to threats
8080
items:
8181
- name: Overview
82-
href: incidents-overview.md
82+
href: incidents-overview.md
8383
- name: Correlation and merging
8484
href: alerts-incidents-correlation.md
8585
- name: Prioritize incidents
8686
href: incident-queue.md
8787
- name: Manage incidents
8888
href: manage-incidents.md
89-
- name: Investigate incidents
89+
- name: Investigate and respond to incidents
9090
items:
91-
- name: Incidents
91+
- name: Plan incident response
92+
href: /unified-secops-platform/plan-incident-response
93+
- name: Investigate incidents
9294
href: investigate-incidents.md
9395
- name: Move alerts to another incident
9496
href: move-alert-to-another-incident.md
95-
- name: Alerts
97+
- name: Investigate alerts
9698
href: investigate-alerts.md
97-
- name: Entity pages
99+
- name: Investigate entity pages
98100
items:
99101
- name: User
100102
href: investigate-users.md

defender-xdr/manage-incidents.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,16 @@ To generate the PDF, perform the following steps:
342342

343343
The report is cached for a couple of minutes. The system provides the previously generated PDF if you try to export the same incident again within a short time frame. To generate a newer version of the PDF, wait for a few minutes for the cache to expire.
344344

345+
## Set up email notifications for incidents
346+
347+
You can set up the Microsoft Defender portal to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
348+
349+
- Alert severity
350+
- Alert sources
351+
- Device group
352+
353+
To set up email notifications for incidents, see [get email notifications on incidents](m365d-notifications-incidents.md).
354+
345355
## Next steps
346356

347357
For new and in-process incidents, continue your [incident investigation](investigate-incidents.md).

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,8 @@
6363
href: /defender-xdr/advanced-hunting-overview?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
6464
- name: Investigate incidents
6565
items:
66+
- name: Plan incident response
67+
href: plan-incident-response.md
6668
- name: Overview
6769
href: /defender-xdr/incidents-overview?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
6870
- name: Correlation and merging
Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
---
2+
title: Plan an incident response workflow in the Microsoft Defender portal
3+
description: Plan an incident response workflow in the Microsoft Defender portal, including triage, investigation, and resolution.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: lwainstein
8+
author: limwainstein
9+
ms.localizationpriority: medium
10+
manager: raynew
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- usx-security
16+
- sentinel-only
17+
ms.custom: admindeeplinkDEFENDER
18+
ms.topic: how-to
19+
ms.date: 05/28/2025
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
---
24+
25+
# Plan an incident response workflow in the Microsoft Defender portal
26+
27+
In the Microsoft Defender portal, you can respond to security incidents that are collections of related alerts and tell the full story of an attack.
28+
29+
This article provides a set of steps that you can follow to investigate, analyze, and resolve security incidents in the Microsoft Defender portal, and also maps these steps to your security team's experience level and role.
30+
31+
## Incident response workflow example in the Microsoft Defender portal
32+
33+
Here's a workflow example for responding to incidents in the Microsoft Defender portal.
34+
35+
:::image type="content" source="/defender/media/incidents-overview/incidents-example-workflow.png" alt-text="An example of an incident response workflow for the Microsoft Defender portal." lightbox="/defender/media/incidents-overview/incidents-example-workflow.png":::
36+
37+
On an ongoing basis, identify the highest priority incidents for analysis and resolution in the incident queue and get them ready for response. This is a combination of:
38+
39+
- [Triage](/defender-xdr/incident-queue) to determining the highest priority incidents through filtering and sorting of the incident queue.
40+
- [Manage](/defender-xdr/manage-incidents) incidents by modifying their title, assigning them to an analyst, and adding tags and comments.
41+
42+
You can use Microsoft Sentinel automation rules to automatically triage and manage (and even respond to) some incidents as they're created, removing the easiest-to-handle incidents from taking up space in your queue.
43+
44+
Consider these steps for your own incident response workflow:
45+
46+
| Stage | Steps |
47+
| ----- | ----- |
48+
| For each incident, begin an [attack and alert investigation and analysis](/defender-xdr/investigate-incidents). | - View the attack story of the incident to understand its scope, severity, detection source, and which asset entities are affected.<br>- Begin analyzing the alerts to understand their origin, scope, and severity with the alert story within the incident.<br>- As needed, gather information on impacted devices, users, and mailboxes with the graph. Select any entity to open a flyout with all the details. Follow through to the entity page for more insights.<br>- See how Microsoft Defender XDR has [automatically resolved some alerts](/defender-xdr/m365d-autoir) with the **Investigations** tab.<br>- As needed, use information in the data set for the incident for more information with the **Evidence and Response** tab. |
49+
| After or during your analysis, perform containment to reduce any additional impact of the attack and eradication of the security threat. | For example,- Disable compromised users<br>- Isolate impacted devices<br>- Block hostile IP addresses. |
50+
| As much as possible, recover from the attack by restoring your tenant resources to the state they were in before the incident.||
51+
| [Resolve](/defender-xdr/manage-incidents#resolve-an-incident) the incident and document your findings. | Take time for post-incident learning to: - Understand the type of the attack and its impact.<br>- Research the attack in [Threat Analytics](/defender-xdr/threat-analytics) and the security community for a security attack trend.<br>- Recall the workflow you used to resolve the incident and update your standard workflows, processes, policies, and playbooks as needed.<br>- Determine whether changes in your security configuration are needed and implement them. |
52+
53+
If you're new to security analysis, see the [introduction to responding to your first incident](/defender-xdr/incidents-overview) for additional information and to step through an example incident.
54+
55+
For more information about incident response across Microsoft products, see [incident response overview](/security/operations/incident-response-overview).
56+
57+
## Plan initial incident management tasks
58+
59+
### Experience level
60+
61+
Follow this table for your level of experience with security analysis and incident response.
62+
63+
| Level | Steps |
64+
|:-------|:-----|
65+
| **New** | - See the [Respond to your first incident walkthrough](/defender-xdr/respond-first-incident-365-defender) to get a guided tour of a typical process of analysis, remediation, and post-incident review in the Microsoft Defender portal with an example attack. <br>- See which incidents should be [prioritized](/defender-xdr/incident-queue) based on severity and other factors.<br>- [Manage incidents](/defender-xdr/manage-incidents), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. |
66+
| **Experienced** | - Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: <br>- See which incidents should be [prioritized](/defender-xdr/incident-queue) based on severity and other factors. <br>- [Manage incidents](/defender-xdr/manage-incidents), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. <br>- Perform [investigations](/defender-xdr/investigate-incidents) of incidents. <br>- Track and respond to emerging threats with [threat analytics](/defender-xdr/threat-analytics). <br>- Proactively hunt for threats with [advanced threat hunting](/defender-xdr/advanced-hunting-overview). <br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
67+
68+
### Security team role
69+
70+
Follow this table based on your security team role.
71+
72+
| Role | Steps |
73+
|---|---|
74+
| Incident responder (Tier 1) | Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: - See which incidents should be [prioritized](/defender-xdr/incident-queue) based on severity and other factors. <br>- [Manage incidents](/defender-xdr/manage-incidents), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. |
75+
| Security investigator or analyst (Tier 2) | - Perform [investigations](/defender-xdr/investigate-incidents) of incidents from the **Incidents** page of the Microsoft Defender portal.<br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
76+
| Advanced security analyst or threat hunter (Tier 3) | - Perform [investigations](/defender-xdr/investigate-incidents) of incidents from the **Incidents** page of the Microsoft Defender portal. <br>- Track and respond to emerging threats with [threat analytics](/defender-xdr/threat-analytics). <br>- Proactively hunt for threats with [advanced threat hunting](/defender-xdr/advanced-hunting-overview). <br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
77+
| SOC manager | See how to [integrate Microsoft Defender XDR into your Security Operations Center (SOC)](/defender-xdr/integrate-microsoft-365-defender-secops). |
78+
79+
## Related items
80+
81+
To learn more about alert correlation and incident merging in the Defender portal, see [Alerts, incidents, and correlation in Microsoft Defender XDR](/defender-xdr/alerts-incidents-correlation).

0 commit comments

Comments
 (0)