You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can manage Microsoft Purview Data Loss Prevention (DLP) alerts in the Microsoft Defender portal. Open **Incidents & alerts**\>**Incidents** on the quick launch of the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>. From this page, you can:
29
+
You can manage and respond to Microsoft Purview Data Loss Prevention (DLP) alerts and incidents in the Microsoft Defender portal. Open **Incidents & alerts**\>**Incidents** on the quick launch of the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>. From this page, you can:
31
30
32
31
- View all your DLP alerts grouped under incidents in the Microsoft Defender XDR incident queue.
33
-
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.
34
-
- Hunt for compliance logs along with security under Advanced Hunting.
35
-
-In-place admin remediation actions on user, file, and device.
32
+
- View DLP alerts correlated with other DLP alerts, or with alerts from other solutions (Defender for Endpoint, Defender for Office 365, Microsoft Sentinel, and so on), under a single incident.
33
+
- Hunt for security threats, using queries combining compliance logs with security logs, under Advanced Hunting.
34
+
-Take remediation actions in-place on users, files, and devices.
36
35
- Associate custom tags to DLP incidents and filter by them.
37
-
- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
36
+
- Filter the unified incident queue by DLP policy name, tag, date, service source, incident status, and user.
38
37
39
-
> [!TIP]
40
-
> You can also pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation with the Microsoft Defender XDR connector in Microsoft Sentinel.
38
+
## Prerequisites
41
39
42
-
## Licensing requirements
40
+
###Licensing requirements
43
41
44
42
To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft Defender portal, you need a license from one of the following subscriptions:
45
43
@@ -51,17 +49,18 @@ To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft
51
49
> [!NOTE]
52
50
> When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft Defender XDR. If you don't want DLP alerts to flow into Defender, open a support case to disable this feature. If you disable this feature DLP alerts will surface in the Defender portal as Microsoft Defender for Office alerts.
53
51
54
-
## Roles
52
+
###Roles
55
53
56
54
It's best practice to only grant minimal permissions to alerts in the Microsoft Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
57
55
58
-
|Permission |Defender Alert Access |
59
-
|---------|---------|
60
-
|Manage Alerts | DLP + Security |
61
-
|View-Only Manage Alerts |DLP + Security |
62
-
|Information Protection Analyst |DLP only |
63
-
|DLP Compliance Management |DLP only |
64
-
|View-Only DLP Compliance Management |DLP only |
56
+
| Permission | Defender Alert Access |
57
+
| ---------- | --------- |
58
+
| Manage Alerts | DLP + Security |
59
+
| View-Only Manage Alerts | DLP + Security |
60
+
| Information Protection Analyst | DLP only |
61
+
| DLP Compliance Management | DLP only |
62
+
| View-Only DLP Compliance Management | DLP only |
63
+
65
64
66
65
## Before you start
67
66
@@ -70,15 +69,15 @@ It's best practice to only grant minimal permissions to alerts in the Microsoft
70
69
> [!NOTE]
71
70
> [Administrative units](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units) restrictions flow from data loss prevention (DLP) into the Defender portal. If you are an administrative unit restricted admin, you'll only see the DLP alerts for your administrative unit.
## Investigate DLP alerts in the Microsoft Defender portal
76
77
77
78
1. Go to the Microsoft Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
78
79
79
-
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts. Here's a few examples of the subfilters that are available in preview:
80
-
1. by user and device names
81
-
1. (in preview) In the **Entities** filter, you can search on file names, user, device names, and file paths.
80
+
1. Select **Add filter** on the toolbar, and choose the **Service/detection sources** filter. Then select that filter and choose **Microsoft Data Loss Prevention** to view all incidents with DLP alerts. You can also filter the queue by user and device names (using the **Entities** filter) and by policies, using the **Policy/policy rule** filter, you can search on file names, user, device names, and file paths.
82
81
1. (in preview) In the **Incidents** queue > **Alert policies** > Alert policy title. You can search on the DLP policy name.
83
82
84
83
1. Search for the DLP policy name of the alerts and incidents you're interested in.
@@ -106,7 +105,7 @@ The **CloudAppEvents** table contains all audit logs across all locations like S
106
105
107
106
If you're new to advanced hunting, you should review [Get started with advanced hunting](advanced-hunting-overview.md).
108
107
109
-
Before you can use advance hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps) that contains the Microsoft Purview data.
108
+
Before you can use advanced hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps) that contains the Microsoft Purview data.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-alerts.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,11 +16,12 @@ ms.collection:
16
16
ms.custom: admindeeplinkDEFENDER
17
17
ms.topic: conceptual
18
18
search.appverid:
19
-
- MOE150
20
-
- met150
21
-
ms.date: 3/25/2025
22
-
appliesto:
19
+
- MOE150
20
+
- met150
21
+
ms.date: 1/27/2025
22
+
appliesto:
23
23
- Microsoft Defender XDR
24
+
- Microsoft Sentinel in the Microsoft Defender portal
24
25
---
25
26
26
27
# Investigate alerts in Microsoft Defender XDR
@@ -30,11 +31,11 @@ appliesto:
30
31
> [!NOTE]
31
32
> This article describes security alerts in Microsoft Defender XDR. However, you can use alert policies to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Alert policies in the Microsoft Defender portal](alert-policies.md).
32
33
33
-
Alerts are the basis of all incidents and indicate the occurrence of malicious or suspicious events in your environment. Alerts are typically part of a broader attack and provide clues about an incident.
34
+
Alerts are signals that result from various threat detection activities. These signals are produced by the many security services that reside in the Microsoft Defender portal, and they indicate the occurrence of malicious or suspicious events in your environment.
34
35
35
-
In Microsoft Defender XDR, related alerts are aggregated together to form [incidents](incidents-overview.md). Incidents will always provide the broader context of an attack, however, analyzing alerts can be valuable when deeper analysis is required.
36
+
These suspicious events are typically part of a broader attack story. In the Microsoft Defender portal, alerts represent individual pieces of evidence that Defender XDR correlates together to form [incidents](incidents-overview.md). Incidents tell the whole attack story; however, analyzing alerts can be valuable when deeper analysis is required.
36
37
37
-
The **Alerts queue** shows the current set of alerts. You get to the alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
38
+
The **Alerts queue** shows the current set of alerts. You can view the entire alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139). You can also see the alerts for each incident on the **incidents queue**, and on each individual incident's page, on the **Alerts** tab.
38
39
39
40
:::image type="content" source="/defender/media/investigate-alerts/alerts-page-defender-small.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-page-defender.png":::
0 commit comments