You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alerts-incidents-correlation.md
+21-9Lines changed: 21 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,19 +37,19 @@ When alerts are generated by the various detection mechanisms in the Microsoft D
37
37
38
38
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
39
39
40
-
### Alert correlation by workspace
40
+
### Alert correlation by Microsoft Sentinel workspace
41
41
42
-
The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. A primary workspace's alerts are correlated with Microsoft Defender XDR data. So, incidents include alerts from Microsoft Sentinel's primary workspace and Defender XDR in a unified queue. All other onboarded workspaces are considered secondary workspaces. For secondary workspaces, incidents are created based on the workspace’s data and won't include Defender XDR data. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579).
42
+
When the Defender portal is configured to include Microsoft Sentinel as a data source, each Microsoft Sentinel workspace is considered its own separate data source. If you have multiple workspaces for Microsoft Sentinel, the Defender portal allows you to configure one of those workspaces as the *primary workspace*. The alerts that come from the primary workspace can be correlated with Microsoft Defender XDR alerts, and they can be included together in incidents. <!-- XDR data? Or data from any other sources in the portal? In other words, are Sentinel alerts from secondary workspaces ON AN ISLAND? They can be correlated amongst themselves, right? --> Any other onboarded Microsoft Sentinel workspaces are considered *secondary workspaces*. Alerts from these secondary workspaces are *not* correlated with alerts from Defender XDR or any other Defender portal data sources, including other Microsoft Sentinel workspaces. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal).
43
43
44
44
### Manual correlation of alerts
45
45
46
-
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
46
+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
47
47
48
48
For more information on moving an alert from one incident to another, see [Move alerts from one incident to another in the Microsoft Defender portal](move-alert-to-another-incident.md).
49
49
50
50
## Incident correlation and merging
51
51
52
-
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents and alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
52
+
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents and alerts across incidents. When multiple incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
53
53
54
54
### Criteria for merging incidents
55
55
@@ -66,7 +66,7 @@ When two or more incidents are merged, a new incident is *not* created to absorb
66
66
67
67
#### Merge direction
68
68
69
-
The direction of the incident merge refers to which incident is the source and which is the target. This direction is determined by Microsoft Defender, based on its own internal logic, with the goal of maximizing information retention and access. The user doesn't have any input into this decision.
69
+
The direction of the incident merge refers to which incident is the source and which is the target. This direction is determined by Microsoft Defender, based on its own internal logic, with the goal of maximizing information retention and access. The user doesn't have any input into this decision, even when merging incidents manually.
70
70
71
71
#### Incident contents
72
72
@@ -77,20 +77,32 @@ The contents of the incidents are handled in the following ways:
77
77
- A **`Redirected`** tag is added to the source incident.
78
78
- Entities (assets etc.) follow the alerts they're linked to.
79
79
- Analytics rules recorded as involved in the creation of the source incident are added to the rules recorded in the target incident.
80
-
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.
81
-
82
-
To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
80
+
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.<br>To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
83
81
84
82
### When incidents aren't merged
85
83
86
84
Even when the correlation logic indicates that two incidents should be merged, Defender doesn't merge the incidents under the following circumstances:
87
85
88
86
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
89
87
- The source and target incidents are assigned to two different people.
90
-
- The source and target incidents have two different classifications (for example, true positive and false positive).
88
+
- The source and target incidents have two different classifications (for example, true positive and false positive) or two different determinations (the subcategories of classifications).
91
89
- Merging the two incidents would raise the number of entities in the target incident above the allowed maximum.
92
90
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
93
91
92
+
### Manual merging of incidents (Preview)
93
+
94
+
If two incidents should be merged, but aren't merged for any of the reasons listed in the [previous section](#when-incidents-arent-merged), you can now merge the incidents manually after you fix the underlying reasons.
95
+
96
+
For example, if the incidents weren't merged because they were assigned to two different people, you can remove the assignment of one of the incidents and then merge the incidents manually.
97
+
98
+
Merging incidents together is preferable to unlinking alerts from one incident and linking them to another, because all the incident information (for example, the activity log) is preserved.
99
+
100
+
Currently, five incidents at a time can be merged manually.
101
+
102
+
Other rules governing manual merging are the same as automatic merging. See [Details of the merge process](#details-of-the-merge-process) above.
103
+
104
+
For instructions and more information on how to merge incidents manually, see [Merge incidents manually in the Microsoft Defender portal](merge-incidents-manually.md).
105
+
94
106
## Next steps
95
107
96
108
To learn more about prioritizing and managing incidents, see the following articles:
title: Merge incidents manually in the Microsoft Defender portal
3
+
description: Learn how to merge two or more incidents into a single incident in the Microsoft Defender portal, to help you investigate incidents more efficiently and effectively and resolve them more quickly and accurately.
4
+
ms.service: defender-xdr
5
+
ms.author: yelevin
6
+
author: yelevin
7
+
ms.localizationpriority: medium
8
+
manager: raynew
9
+
audience: ITPro
10
+
ms.collection:
11
+
- m365-security
12
+
- tier2
13
+
- usx-security
14
+
- sentinel-only
15
+
ms.topic: how-to
16
+
ms.date: 04/09/2025
17
+
search.appverid: met150
18
+
appliesto:
19
+
- Microsoft Defender XDR
20
+
- Microsoft Sentinel in the Microsoft Defender portal
21
+
---
22
+
23
+
# Merge incidents manually in the Microsoft Defender portal (Preview)
24
+
25
+
Incidents are automatically created in the Microsoft Defender portal when suspicious activities are detected. When two incidents describe parts of the same attack story, Defender usually merges those incidents into a single incident automatically to help you investigate incidents more efficiently and effectively and resolve them more quickly and accurately.
26
+
27
+
Sometimes, however, the automatic merging doesn't happen, due to certain conditions that prevent it. To learn more about when incidents are or aren't merged, see [Incident correlation and merging](alerts-incidents-correlation.md#incident-correlation-and-merging). In these circumstances, or if you decide independently that two (unmerged) incidents are related and should be investigated as a single unit, you can merge them manually. This article explains how to do so.
28
+
29
+
## Prerequisites
30
+
31
+
- Users must have permissions to view the incidents queue.
32
+
- Users must have read and write permissions on all the incidents they wish to merge. Incidents from different sources have different RBAC roles defined.
33
+
- Incidents that are candidates for merging must have either the same values as each other, or null values, for the **Assigned to**, **Classification**, and **Determination** fields.
34
+
35
+
## Merge incidents from the incident queue page
36
+
37
+
1. Open the incident queue. Select **Investigation & response > Incidents & alerts > Incidents** from the quick launch menu in the Microsoft Defender portal.
38
+
39
+
1. Select the two incidents you want to merge by marking the checkboxes at the beginning of their rows in the queue. When two incidents are marked, the **Merge incidents** button appears on the toolbar.
40
+
41
+
:::image type="content" source="media/merge-incidents-manually/merge-incidents-from-queue.png" alt-text="Screenshot of selecting incidents from queue to merge them." lightbox="media/merge-incidents-manually/merge-incidents-from-queue.png":::
42
+
43
+
1. Select **Merge incidents** from the toolbar. The **Merge incidents** flyout opens.
44
+
45
+
1. In the **Reason for merging** text box, type a description of the reason why you want to merge the incidents.
46
+
47
+
1. Select **Merge incidents** at the bottom of the flyout to execute the merge.
48
+
49
+
:::image type="content" source="media/merge-incidents-manually/merge-incidents-panel-from-queue.png" alt-text="Screenshot of merging incidents from queue.":::
50
+
51
+
1. In the confirmation dialog that appears, select **Merge**. When the merge is complete, a "Success" notification appears, with a link to follow to go to the merged (target) incident.
52
+
53
+
If the merge fails, a dialog box appears with a message that the incidents failed to merge. Verify that both incidents have the same values, or that at least one of the incidents has a null value, for **Assigned to**, **Classification**, and **Determination**.
54
+
55
+
## Merge incidents from within the incident page
56
+
57
+
1. Select the name of one of the two incidents you want to merge from the incident queue. This could be either the source or the target incident, as Microsoft Defender decides which is which. For more information, see [Details of the merge process](alerts-incidents-correlation.md#details-of-the-merge-process).
58
+
59
+
1. The incident page appears. There, from the **Actions** menu (the three dots in the upper right corner), select **Merge incidents**.
60
+
61
+
:::image type="content" source="media/merge-incidents-manually/merge-incident-from-incident-page.png" alt-text="Screenshot of merging incidents from incident page." lightbox="media/merge-incidents-manually/merge-incident-from-incident-page.png":::
62
+
63
+
1. The **Merge incidents** flyout appears. In the **Other incident name or ID** field, begin typing the name or ID of the incident you want to merge with the open one. The list of available incidents is dynamically displayed and filtered as you type. When you see the one you want in the list, select it.
64
+
65
+
:::image type="content" source="media/merge-incidents-manually/merge-incidents-panel-from-incident-page.png" border = "false" alt-text="Screenshot of incident merge panel from incident page.":::
66
+
67
+
1. In the **Comment** text box, type a description of the reason why you want to merge the incidents.
68
+
69
+
1. Select **Merge incidents** at the bottom of the flyout to execute the merge.
70
+
71
+
1. In the confirmation dialog that appears, select **Merge**. When the merge is complete, a "Success" notification appears, the open incident is closed, and you are redirected to the merged (target) incident.
72
+
73
+
If the merge fails, a dialog box appears with a message that the incidents failed to merge. For the merge to succeed, both incidents must have the same values—or at least one incident must have a null value—for **Assigned to**, **Classification**, and **Determination**.
74
+
75
+
## Notes
76
+
77
+
- When the incidents are in the process of merging, you can't display or make any changes to either incident.
78
+
79
+
- Incident merges are recorded in the target incident's activity log. The log messages show the names and IDs of the source incidents that were merged into the open (target) incident.
80
+
81
+
- Activity log entries from the source incident are copied into the target incident's activity log. The entries appear with an indication that they were merged from the source incident. You can filter the activity log to show entries from either the source or target incidents, or from both.
82
+
83
+
## See also
84
+
85
+
-[Alert correlation and incident merging in the Microsoft Defender portal](alerts-incidents-correlation.md)
86
+
-[Manage incidents in Microsoft Defender](manage-incidents.md)
Copy file name to clipboardExpand all lines: unified-secops-platform/whats-new.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,9 @@ For example, if the incidents weren't merged because they were assigned to two d
68
68
69
69
To understand more about merging incidents, see [Alert correlation and incident merging in the Microsoft Defender portal](/defender-xdr/alerts-incidents-correlation).
70
70
71
+
For instructions on merging incidents manually, see [Merge incidents manually in the Microsoft Defender portal](/defender-xdr/merge-incidents-manually).
72
+
73
+
71
74
### Multi workspace and multi tenant support for Microsoft Sentinel (Preview)
72
75
73
76
Microsoft Sentinel now supports multiple workspaces in the Defender portal, using one primary workspace per tenant and multiple secondary workspaces.
0 commit comments