Skip to content

Commit 30a18a9

Browse files
authored
Merge pull request #1897 from MicrosoftDocs/main
Published main to live, Thursday 10:30 AM PST, 11/14
2 parents 588c51b + efc1c96 commit 30a18a9

7 files changed

+78
-260
lines changed

defender-office-365/campaigns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ The available properties and their associated values are described in the follow
183183
|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<[email protected]>` (note the angle brackets).|
184184
|Network Message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|
185185
|Sender IP|Text. Separate multiple values by commas.|
186-
|Attachment SHA256|Text. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|
186+
|Attachment SHA256|Text. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file, run the following command in PowerShell: `Get-FileHash -Path "<Path>\<Filename>" -Algorithm SHA256`.|
187187
|Cluster ID|Text. Separate multiple values by commas.|
188188
|Alert ID|Text. Separate multiple values by commas.|
189189
|Alert Policy ID|Text. Separate multiple values by commas.|

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1224,7 +1224,7 @@ The filterable properties that are available in the **File name** box in the **C
12241224
|Site|Text. Separate multiple values by commas.|||
12251225
|File owner|Text. Separate multiple values by commas.|||
12261226
|Last modified by|Text. Separate multiple values by commas.|||
1227-
|SHA256|Integer. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|||
1227+
|SHA256|Integer. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file, run the following command in PowerShell: `Get-FileHash -Path "<Path>\<Filename>" -Algorithm SHA256`.|||
12281228
|Malware family|Text. Separate multiple values by commas.|||
12291229
|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|||
12301230
|Threat type|Select one or more values: <ul><li>**Block**</li><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|||

defender-xdr/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -133,13 +133,13 @@
133133
- name: Investigate and respond to threats
134134
items:
135135
- name: Overview
136-
href: incident-response-overview.md
137-
- name: Alerts, incidents, and correlation
136+
href: incidents-overview.md
137+
- name: Correlation and merging
138138
href: alerts-incidents-correlation.md
139139
- name: Respond to incidents
140140
items:
141141
- name: Overview
142-
href: incidents-overview.md
142+
href: incident-response-overview.md
143143
- name: Prioritize incidents
144144
href: incident-queue.md
145145
- name: Manage incidents

defender-xdr/alerts-incidents-correlation.md

Lines changed: 27 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Alerts, incidents, and correlation in Microsoft Defender XDR
3-
description: Learn how alerts and incidents are correlated in Microsoft Defender XDR.
2+
title: Alert correlation and incident merging in the Microsoft Defender portal
3+
description: Learn how alerts are correlated, and how and why incidents may be merged, in the Microsoft Defender portal.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -13,6 +13,7 @@ ms.collection:
1313
- m365-security
1414
- usx-security
1515
- tier1
16+
- sentinel-only
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
@@ -23,92 +24,35 @@ appliesto:
2324
- Microsoft Sentinel in the Microsoft Defender portal
2425
---
2526

26-
# Alerts, incidents, and correlation in Microsoft Defender XDR
27+
# Alert correlation and incident merging in the Microsoft Defender portal
2728

28-
In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment. Alerts can often be part of a broader, complex attack story, and related alerts are aggregated and correlated together to form ***incidents*** that represent these attack stories.
29-
30-
***Incidents*** provide the full picture of an attack. Microsoft Defender XDR's algorithms automatically correlate signals (alerts) from all Microsoft security and compliance solutions, as well as from vast numbers of external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. Defender XDR identifies multiple signals as belonging to the same attack story, using AI to continually monitor its telemetry sources and add more evidence to already open incidents.
31-
32-
Incidents also function as "case files," providing you a platform for managing and documenting your investigations. For more information about incidents' functionality in this regard, see [Incident response in the Microsoft Defender portal](incidents-overview.md).
33-
34-
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
35-
36-
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
37-
38-
**Incidents:**
39-
40-
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
41-
- Display the broader context of an attack&mdash;the **attack story**.
42-
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
43-
- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts.
44-
- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks).
45-
- Record all activity related to the threat and its investigation and resolution.
46-
47-
**Alerts:**
48-
49-
- Represent the individual pieces of the story that are essential to understanding and investigating the incident.
50-
- Are created by many different sources both internal and external to the Defender portal.
51-
- Can be analyzed by themselves to add value when deeper analysis is required.
52-
- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact.
53-
54-
## Alert sources
55-
56-
Microsoft Defender XDR alerts are generated by many sources:
57-
58-
- Solutions that are part of Microsoft Defender XDR
59-
- Microsoft Defender for Endpoint
60-
- Microsoft Defender for Office 365
61-
- Microsoft Defender for Identity
62-
- Microsoft Defender for Cloud Apps
63-
- The app governance add-on for Microsoft Defender for Cloud Apps
64-
- Microsoft Entra ID Protection
65-
- Microsoft Data Loss Prevention
66-
67-
- Other services that have integrations with the Microsoft Defender security portal
68-
- Microsoft Sentinel
69-
- Non-Microsoft security solutions that pass their alerts to Microsoft Sentinel
70-
- Microsoft Defender for Cloud
71-
72-
Microsoft Defender XDR itself also creates alerts. With Microsoft Sentinel onboarded to the [unified security operations platform](microsoft-sentinel-onboard.md), Microsoft Defender XDR's correlation engine now has access to all the raw data ingested by Microsoft Sentinel. (You can find this data in **Advanced hunting** tables.) Defender XDR's unique correlation capabilities provide another layer of data analysis and threat detection for all the non-Microsoft solutions in your digital estate. These detections produce Defender XDR alerts, in addition to the alerts already provided by Microsoft Sentinel's analytics rules.
73-
74-
When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix.
29+
This article explains how the Microsoft Defender portal aggregates and correlates the alerts that it collects from all the sources that produce them and send them to the portal. It explains how Defender creates incidents from these alerts, and how it continues to monitor their evolution, merging incidents together if the situation warrants. To learn more about alerts and their sources, and how incidents add value in the Microsoft Defender portal, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).
7530

7631
## Incident creation and alert correlation
7732

78-
When alerts are generated by the various detection mechanisms in the Microsoft Defender security portal, as described in the previous section, Defender XDR places them into new or existing incidents according to the following logic:
33+
When alerts are generated by the various detection mechanisms in the Microsoft Defender portal, as described in [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md), they're placed into new or existing incidents according to the following logic:
7934

80-
| Scenario | Decision |
81-
| -------- | -------- |
82-
| The alert is sufficiently unique across all alert sources within a particular time frame. | Defender XDR creates a new incident and adds the alert to it. |
83-
| The alert is sufficiently related to other alerts&mdash;from the same source or across sources&mdash;within a particular time frame. | Defender XDR adds the alert to an existing incident. |
35+
- If the alert is sufficiently unique across all alert sources within a particular time frame, Defender creates a new incident and adds the alert to it.
36+
- If the alert is sufficiently related to other alerts&mdash;from the same source or across sources&mdash;within a particular time frame, Defender adds the alert to an existing incident.
8437

85-
The criteria Microsoft Defender uses to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
38+
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
8639

8740
## Incident correlation and merging
8841

89-
Microsoft Defender XDR's correlation activities don't stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident.
42+
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
9043

91-
### How does Defender XDR make that determination?
44+
### Criteria for merging incidents
9245

93-
Defender XDR's correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
46+
Defender's correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
9447

9548
- Entities&mdash;assets like users, devices, mailboxes, and others
9649
- Artifacts&mdash;files, processes, email senders, and others
9750
- Time frames
9851
- Sequences of events that point to multistage attacks&mdash;for example, a malicious email click event that follows closely on a phishing email detection.
9952

100-
### When are incidents *not* merged?
53+
### Outcomes of the merge process
10154

102-
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn't merge the incidents under the following circumstances:
103-
104-
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
105-
- The two incidents eligible for merging are assigned to two different people.
106-
- Merging the two incidents would raise the number of entities in the merged incident above the maximum of 50 entities per incident allowed.
107-
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
108-
109-
### What happens when incidents are merged?
110-
111-
When two or more incidents are merged, a new incident is not created to absorb them. Instead, the contents of one incident are migrated into the other incident, and the incident abandoned in the process is automatically closed. The abandoned incident is no longer visible or available in Microsoft Defender XDR, and any reference to it is redirected to the consolidated incident. The abandoned, closed incident remains accessible in Microsoft Sentinel in the Azure portal. The contents of the incidents are handled in the following ways:
55+
When two or more incidents are merged, a new incident is not created to absorb them. Instead, the contents of one incident are migrated into the other incident, and the incident abandoned in the process is automatically closed. The abandoned incident is no longer visible or available in the Defender portal, and any reference to it is redirected to the consolidated incident. The abandoned, closed incident remains accessible in Microsoft Sentinel in the Azure portal. The contents of the incidents are handled in the following ways:
11256

11357
- Alerts contained in the abandoned incident are removed from it and added to the consolidated incident.
11458
- Any tags applied to the abandoned incident are removed from it and added to the consolidated incident.
@@ -119,15 +63,26 @@ When two or more incidents are merged, a new incident is not created to absorb t
11963

12064
To see the abandoned incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
12165

66+
### When incidents aren't merged
67+
68+
Even when the correlation logic indicates that two incidents should be merged, Defender doesn't merge the incidents under the following circumstances:
69+
70+
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
71+
- The two incidents eligible for merging are assigned to two different people.
72+
- Merging the two incidents would raise the number of entities in the merged incident above the allowed maximum of 50 entities per incident.
73+
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
74+
12275
## Manual correlation
12376

124-
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
77+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
12578

12679
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
12780

12881
## Next steps
12982

130-
Read more about incidents, investigation, and response: [Incident response in the Microsoft Defender portal](incidents-overview.md)
83+
To learn more about prioritizing and managing incidents, see the following articles:
84+
85+
- [Manage incidents in Microsoft Defender](manage-incidents.md)
13186

13287
## See also
13388

defender-xdr/incident-response-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ On an ongoing basis, you need to identify the highest priority incidents for ana
3737
- [Prioritizing](incident-queue.md) to determining the highest priority incidents through filtering and sorting of the incident queue. This is also known as triaging.
3838
- [Managing](manage-incidents.md) incidents by modifying their title, assigning them to an analyst, adding tags and comments, and when resolved, classifying them.
3939

40-
For each incident, use your incident response workflow to analyze the incident and its alerts and data to contain the attack, eradicate the threat, recover from the attack, and learn from it. See [this example](incidents-overview.md#example-incident-response-workflow-for-microsoft-365-defender) for Microsoft Defender XDR.
40+
For each incident, use your incident response workflow to analyze the incident and its alerts and data to contain the attack, eradicate the threat, recover from the attack, and learn from it.
4141

4242
## Automated investigation and remediation
4343

0 commit comments

Comments
 (0)