Skip to content

Commit 1c02333

Browse files
Merge branch 'main' into patch-7
2 parents 8108ca2 + 2937c2f commit 1c02333

File tree

2 files changed

+24
-14
lines changed

2 files changed

+24
-14
lines changed

CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ App connector errors can be seen in the app connector dialog after attempting to
4949
> |Get Permissions: NoHttpResponseException: `*******.salesforce.com:443` failed to respond|Salesforce|IP restriction on customer ENV.|In the Salesforce portal, under **Setup** > **Session Settings**, clear the **Lock sessions to the IP address from which they originated** check box.|
5050
> |team_not_authorized|Slack|Slack Discovery API is not enabled.|Contact Slack support and ask to enable Discovery API.|
5151
> |RuntimeException: com.adallom.adalib.httputils.exceptions.HttpRequestFailure: Server returned: 403 Forbidden|ServiceNow|Permissions are incorrect|Follow the process to connect ServiceNow to Defender for Cloud Apps again using an admin account.|
52+
> |Operation you are attempting to perform is not supported by your plan|Smartsheet|The Smartsheet Plan is not correct, an enterprise license with the platinum package is required|Upgrade Smartsheet license.|
5253
> |Get events: {"code":403,"serverResponse"<br />Get users: {"code":403,"serverResponse"<br />…<br />"body":"{"error":"permission denied"}"|Workday|Insufficient permission to access audit logs and/or user endpoints|Verify all permissions are in place. [Learn more](./connect-workday.md#prerequisites)|
5354
> |"code":400,"serverResponse"<br />…<br />body":"{"error":"invalid_grant"}|Workday|Authentication issue|Account used to set up the instance may be locked or disabled. To verify, view the Workday account and select **View Sign-on History**. You may see an authentication failure message in the report specifying that the System Account is disabled. [Learn more](./connect-workday.md#how-to-connect-workday-to-defender-for-cloud-apps-using-oauth)|
5455
> |"code":401,"serverResponse":<br />…<br />body":"{"error":"invalid_client"}"|Workday|Client token validity issue|OAuth 2.0 REST API Client token not valid. The token may have expired, or may be incorrect. Generate another token and assign it to the connected instance. [Learn more](./connect-workday.md#how-to-connect-workday-to-defender-for-cloud-apps-using-oauth)|

defender-xdr/alerts-incidents-correlation.md

Lines changed: 23 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 10/25/2024
21+
ms.date: 02/02/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
2525
---
2626

2727
# Alert correlation and incident merging in the Microsoft Defender portal
2828

29-
This article explains how the Microsoft Defender portal aggregates and correlates the alerts that it collects from all the sources that produce them and send them to the portal. It explains how Defender creates incidents from these alerts, and how it continues to monitor their evolution, merging incidents together if the situation warrants. To learn more about alerts and their sources, and how incidents add value in the Microsoft Defender portal, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).
29+
This article explains how the correlation engine in the Microsoft Defender portal aggregates and correlates the alerts collected from all the sources that produce them and send them to the portal. It explains how Defender creates incidents from these alerts, and how it continues to monitor their evolution, merging incidents together if the situation warrants. To learn more about alerts and their sources, and how incidents add value in the Microsoft Defender portal, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).
3030

3131
## Incident creation and alert correlation
3232

@@ -56,36 +56,45 @@ Defender's correlation engine merges incidents when it recognizes common element
5656
- Time frames
5757
- Sequences of events that point to multistage attacks&mdash;for example, a malicious email click event that follows closely on a phishing email detection.
5858

59-
### Outcomes of the merge process
59+
### Details of the merge process
6060

61-
When two or more incidents are merged, a new incident is not created to absorb them. Instead, the contents of one incident are migrated into the other incident, and the incident abandoned in the process is automatically closed. The abandoned incident is no longer visible or available in the Defender portal, and any reference to it is redirected to the consolidated incident. The abandoned, closed incident remains accessible in Microsoft Sentinel in the Azure portal. The contents of the incidents are handled in the following ways:
61+
When two or more incidents are merged, a new incident is *not* created to absorb them. Instead, the contents of one incident (the **"source incident"**) are migrated into the other incident (the **"target incident"**), and the source incident is automatically closed. The source incident is no longer visible or available in the Defender portal, and any reference to it is redirected to the target incident. The source incident, though closed, remains accessible in Microsoft Sentinel in the Azure portal.
6262

63-
- Alerts contained in the abandoned incident are removed from it and added to the consolidated incident.
64-
- Any tags applied to the abandoned incident are removed from it and added to the consolidated incident.
65-
- A **`Redirected`** tag is added to the abandoned incident.
63+
#### Merge direction
64+
65+
The direction of the incident merge refers to which incident is the source and which is the target. This direction is determined by Microsoft Defender, based on its own internal logic, with the goal of maximizing information retention and access. The user doesn't have any input into this decision.
66+
67+
#### Incident contents
68+
69+
The contents of the incidents are handled in the following ways:
70+
71+
- All alerts contained in the source incident are removed from the source incident and added to the target incident.
72+
- Any tags applied to the source incident are removed from the source incident and added to the target incident.
73+
- A **`Redirected`** tag is added to the source incident.
6674
- Entities (assets etc.) follow the alerts they're linked to.
67-
- Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident.
68-
- Currently, comments and activity log entries in the abandoned incident are *not* moved to the consolidated incident.
75+
- Analytics rules recorded as involved in the creation of the source incident are added to the rules recorded in the target incident.
76+
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.
6977

70-
To see the abandoned incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
78+
To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
7179

7280
### When incidents aren't merged
7381

7482
Even when the correlation logic indicates that two incidents should be merged, Defender doesn't merge the incidents under the following circumstances:
7583

7684
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
77-
- The two incidents eligible for merging are assigned to two different people.
78-
- Merging the two incidents would raise the number of entities in the merged incident above the allowed maximum of 50 entities per incident.
85+
- The source and target incidents are assigned to two different people.
86+
- The source and target incidents have two different classifications (for example, true positive and false positive).
87+
- Merging the two incidents would raise the number of entities in the target incident above the allowed maximum.
7988
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
8089

81-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
82-
8390
## Next steps
8491

8592
To learn more about prioritizing and managing incidents, see the following articles:
8693

8794
- [Manage incidents in Microsoft Defender](manage-incidents.md)
8895

96+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
97+
8998
## See also
9099

91100
- [The power of incidents in Microsoft Defender XDR](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/the-power-of-incidents-in-microsoft-365-defender/ba-p/3515483)

0 commit comments

Comments
 (0)