You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/campaigns.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ The available properties and their associated values are described in the follow
183
183
|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<[email protected]>` (note the angle brackets).|
184
184
|Network Message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|
185
185
|Sender IP|Text. Separate multiple values by commas.|
186
-
|Attachment SHA256|Text. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|
186
+
|Attachment SHA256|Text. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file, run the following command in PowerShell: `Get-FileHash -Path "<Path>\<Filename>" -Algorithm SHA256`.|
187
187
|Cluster ID|Text. Separate multiple values by commas.|
188
188
|Alert ID|Text. Separate multiple values by commas.|
189
189
|Alert Policy ID|Text. Separate multiple values by commas.|
Copy file name to clipboardExpand all lines: defender-office-365/threat-explorer-real-time-detections-about.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1224,7 +1224,7 @@ The filterable properties that are available in the **File name** box in the **C
1224
1224
|Site|Text. Separate multiple values by commas.|✔|✔|
1225
1225
|File owner|Text. Separate multiple values by commas.|✔|✔|
1226
1226
|Last modified by|Text. Separate multiple values by commas.|✔|✔|
1227
-
|SHA256|Integer. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|✔|✔|
1227
+
|SHA256|Integer. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file, run the following command in PowerShell: `Get-FileHash -Path "<Path>\<Filename>" -Algorithm SHA256`.|✔|✔|
1228
1228
|Malware family|Text. Separate multiple values by commas.|✔|✔|
Copy file name to clipboardExpand all lines: defender-xdr/alerts-incidents-correlation.md
+27-72Lines changed: 27 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Alerts, incidents, and correlation in Microsoft Defender XDR
3
-
description: Learn how alerts and incidents are correlated in Microsoft Defender XDR.
2
+
title: Alert correlation and incident merging in the Microsoft Defender portal
3
+
description: Learn how alerts are correlated, and how and why incidents may be merged, in the Microsoft Defender portal.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -13,6 +13,7 @@ ms.collection:
13
13
- m365-security
14
14
- usx-security
15
15
- tier1
16
+
- sentinel-only
16
17
ms.topic: conceptual
17
18
search.appverid:
18
19
- MOE150
@@ -23,92 +24,35 @@ appliesto:
23
24
- Microsoft Sentinel in the Microsoft Defender portal
24
25
---
25
26
26
-
# Alerts, incidents, and correlation in Microsoft Defender XDR
27
+
# Alert correlation and incident merging in the Microsoft Defender portal
27
28
28
-
In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment. Alerts can often be part of a broader, complex attack story, and related alerts are aggregated and correlated together to form ***incidents*** that represent these attack stories.
29
-
30
-
***Incidents*** provide the full picture of an attack. Microsoft Defender XDR's algorithms automatically correlate signals (alerts) from all Microsoft security and compliance solutions, as well as from vast numbers of external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. Defender XDR identifies multiple signals as belonging to the same attack story, using AI to continually monitor its telemetry sources and add more evidence to already open incidents.
31
-
32
-
Incidents also function as "case files," providing you a platform for managing and documenting your investigations. For more information about incidents' functionality in this regard, see [Incident response in the Microsoft Defender portal](incidents-overview.md).
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
37
-
38
-
**Incidents:**
39
-
40
-
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
41
-
- Display the broader context of an attack—the **attack story**.
42
-
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
43
-
- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts.
44
-
- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks).
45
-
- Record all activity related to the threat and its investigation and resolution.
46
-
47
-
**Alerts:**
48
-
49
-
- Represent the individual pieces of the story that are essential to understanding and investigating the incident.
50
-
- Are created by many different sources both internal and external to the Defender portal.
51
-
- Can be analyzed by themselves to add value when deeper analysis is required.
52
-
- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact.
53
-
54
-
## Alert sources
55
-
56
-
Microsoft Defender XDR alerts are generated by many sources:
57
-
58
-
- Solutions that are part of Microsoft Defender XDR
59
-
- Microsoft Defender for Endpoint
60
-
- Microsoft Defender for Office 365
61
-
- Microsoft Defender for Identity
62
-
- Microsoft Defender for Cloud Apps
63
-
- The app governance add-on for Microsoft Defender for Cloud Apps
64
-
- Microsoft Entra ID Protection
65
-
- Microsoft Data Loss Prevention
66
-
67
-
- Other services that have integrations with the Microsoft Defender security portal
68
-
- Microsoft Sentinel
69
-
- Non-Microsoft security solutions that pass their alerts to Microsoft Sentinel
70
-
- Microsoft Defender for Cloud
71
-
72
-
Microsoft Defender XDR itself also creates alerts. With Microsoft Sentinel onboarded to the [unified security operations platform](microsoft-sentinel-onboard.md), Microsoft Defender XDR's correlation engine now has access to all the raw data ingested by Microsoft Sentinel. (You can find this data in **Advanced hunting** tables.) Defender XDR's unique correlation capabilities provide another layer of data analysis and threat detection for all the non-Microsoft solutions in your digital estate. These detections produce Defender XDR alerts, in addition to the alerts already provided by Microsoft Sentinel's analytics rules.
73
-
74
-
When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix.
29
+
This article explains how the Microsoft Defender portal aggregates and correlates the alerts that it collects from all the sources that produce them and send them to the portal. It explains how Defender creates incidents from these alerts, and how it continues to monitor their evolution, merging incidents together if the situation warrants. To learn more about alerts and their sources, and how incidents add value in the Microsoft Defender portal, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).
75
30
76
31
## Incident creation and alert correlation
77
32
78
-
When alerts are generated by the various detection mechanisms in the Microsoft Defender security portal, as described in the previous section, Defender XDR places them into new or existing incidents according to the following logic:
33
+
When alerts are generated by the various detection mechanisms in the Microsoft Defender portal, as described in [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md), they're placed into new or existing incidents according to the following logic:
79
34
80
-
| Scenario | Decision |
81
-
| -------- | -------- |
82
-
| The alert is sufficiently unique across all alert sources within a particular time frame. | Defender XDR creates a new incident and adds the alert to it. |
83
-
| The alert is sufficiently related to other alerts—from the same source or across sources—within a particular time frame. | Defender XDR adds the alert to an existing incident. |
35
+
- If the alert is sufficiently unique across all alert sources within a particular time frame, Defender creates a new incident and adds the alert to it.
36
+
- If the alert is sufficiently related to other alerts—from the same source or across sources—within a particular time frame, Defender adds the alert to an existing incident.
84
37
85
-
The criteria Microsoft Defender uses to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
38
+
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
86
39
87
40
## Incident correlation and merging
88
41
89
-
Microsoft Defender XDR's correlation activities don't stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident.
42
+
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
90
43
91
-
### How does Defender XDR make that determination?
44
+
### Criteria for merging incidents
92
45
93
-
Defender XDR's correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
46
+
Defender's correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
94
47
95
48
- Entities—assets like users, devices, mailboxes, and others
96
49
- Artifacts—files, processes, email senders, and others
97
50
- Time frames
98
51
- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
99
52
100
-
### When are incidents *not* merged?
53
+
### Outcomes of the merge process
101
54
102
-
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn't merge the incidents under the following circumstances:
103
-
104
-
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
105
-
- The two incidents eligible for merging are assigned to two different people.
106
-
- Merging the two incidents would raise the number of entities in the merged incident above the maximum of 50 entities per incident allowed.
107
-
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
108
-
109
-
### What happens when incidents are merged?
110
-
111
-
When two or more incidents are merged, a new incident is not created to absorb them. Instead, the contents of one incident are migrated into the other incident, and the incident abandoned in the process is automatically closed. The abandoned incident is no longer visible or available in Microsoft Defender XDR, and any reference to it is redirected to the consolidated incident. The abandoned, closed incident remains accessible in Microsoft Sentinel in the Azure portal. The contents of the incidents are handled in the following ways:
55
+
When two or more incidents are merged, a new incident is not created to absorb them. Instead, the contents of one incident are migrated into the other incident, and the incident abandoned in the process is automatically closed. The abandoned incident is no longer visible or available in the Defender portal, and any reference to it is redirected to the consolidated incident. The abandoned, closed incident remains accessible in Microsoft Sentinel in the Azure portal. The contents of the incidents are handled in the following ways:
112
56
113
57
- Alerts contained in the abandoned incident are removed from it and added to the consolidated incident.
114
58
- Any tags applied to the abandoned incident are removed from it and added to the consolidated incident.
@@ -119,15 +63,26 @@ When two or more incidents are merged, a new incident is not created to absorb t
119
63
120
64
To see the abandoned incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
121
65
66
+
### When incidents aren't merged
67
+
68
+
Even when the correlation logic indicates that two incidents should be merged, Defender doesn't merge the incidents under the following circumstances:
69
+
70
+
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
71
+
- The two incidents eligible for merging are assigned to two different people.
72
+
- Merging the two incidents would raise the number of entities in the merged incident above the allowed maximum of 50 entities per incident.
73
+
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
74
+
122
75
## Manual correlation
123
76
124
-
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
77
+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
Copy file name to clipboardExpand all lines: defender-xdr/incident-response-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ On an ongoing basis, you need to identify the highest priority incidents for ana
37
37
-[Prioritizing](incident-queue.md) to determining the highest priority incidents through filtering and sorting of the incident queue. This is also known as triaging.
38
38
-[Managing](manage-incidents.md) incidents by modifying their title, assigning them to an analyst, adding tags and comments, and when resolved, classifying them.
39
39
40
-
For each incident, use your incident response workflow to analyze the incident and its alerts and data to contain the attack, eradicate the threat, recover from the attack, and learn from it. See [this example](incidents-overview.md#example-incident-response-workflow-for-microsoft-365-defender) for Microsoft Defender XDR.
40
+
For each incident, use your incident response workflow to analyze the incident and its alerts and data to contain the attack, eradicate the threat, recover from the attack, and learn from it.
0 commit comments