Skip to content

Commit 210f1f8

Browse files
committed
updated screenshots
1 parent 7d58a4b commit 210f1f8

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

defender-xdr/incident-queue.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107107

108108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109109

110-
:::image type="content" source="/defender/media/incidents-queue/fig1-newfilters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110+
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
111111

112112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113113

@@ -134,8 +134,9 @@ This table lists the filter names that are available.
134134
| **Classification** | Specify the set of classifications of the related alerts. |
135135
| **Automated investigation state** | Specify the status of automated investigation. |
136136
| **Associated threat** | Specify a named threat. |
137-
| **Alert policies** | Specify an alert policy title. |
138-
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |
137+
| **Policy/policy rule** | Filter incidents based on policy or policy rule. |
138+
| **Product names** | Filter incidents based on product name. |
139+
| **Data stream** | Filter incidents based on the location or workload. |
139140

140141
> [!NOTE]
141142
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).

defender-xdr/investigate-alerts.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.topic: conceptual
2222
search.appverid:
2323
- MOE150
2424
- met150
25-
ms.date: 1/17/2025
25+
ms.date: 1/27/2025
2626
appliesto:
2727
- Microsoft Defender XDR
2828
---
@@ -46,9 +46,9 @@ Alerts from different Microsoft security solutions like Microsoft Defender for E
4646

4747
By default, the alerts queue in the Microsoft Defender portal displays the new and in progress alerts from the last seven days. The most recent alert is at the top of the list so you can see it first.
4848

49-
From the default alerts queue, you can select **Filter** to see a **Filter** pane, from which you can specify a subset of the alerts. Here's an example.
49+
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
5050

51-
**INSERT SCREENSHOT**
51+
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
5252

5353
You can filter alerts according to these criteria:
5454

@@ -63,7 +63,6 @@ You can filter alerts according to these criteria:
6363
- Entities (the impacted assets)
6464
- Automated investigation state
6565
- Data stream (workload or location)
66-
- Alert subscription IDs
6766

6867
> [!NOTE]
6968
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
87.5 KB
Loading
54 KB
Loading

0 commit comments

Comments
 (0)