You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
28
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
29
-[Microsoft Defender XDR](/defender-xdr)
@@ -31,12 +32,13 @@ ms.date: 06/05/2024
31
32
32
33
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
33
34
34
-
By default, the queue displays incidents seen in the last 6 months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35
+
By default, the queue displays incidents seen in the last six months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35
36
36
37
There are several options you can choose from to customize the Incidents queue view.
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](/defender-xdr/incident-queue#defender-boxed) highlights.
53
+
49
54
## Sort and filter the incidents queue
55
+
50
56
You can apply the following filters to limit the list of incidents and get a more focused view.
High </br>(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on devices.
57
63
Medium </br>(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages.
58
-
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization.
64
+
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that don't necessarily indicate an advanced threat targeting the organization.
59
65
Informational </br>(Grey) | Informational incidents might not be considered harmful to the network but might be good to keep track of.
60
66
61
67
## Assigned to
68
+
62
69
You can choose to filter the list by selecting assigned to anyone or ones that are assigned to you.
63
70
64
71
### Category
72
+
65
73
Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context.
66
74
67
75
### Status
76
+
68
77
You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved.
69
78
70
79
### Data sensitivity
80
+
71
81
Use this filter to show incidents that contain sensitivity labels.
72
82
73
83
## Incident naming
74
84
75
-
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
85
+
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories.
76
86
77
87
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
78
88
79
89
> [!NOTE]
80
-
> Incidents that existed prior the rollout of automatic incident naming will retain their name.
81
-
90
+
> Incidents that existed prior to the rollout of automatic incident naming retains their original name.
Copy file name to clipboardExpand all lines: defender-xdr/incident-queue.md
+28-1Lines changed: 28 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 07/18/2024
21
+
ms.date: 01/06/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -61,6 +61,33 @@ If you onboarded Microsoft Sentinel to the unified security operations platform,
61
61
62
62
We recommend that you avoid using the incident name as a condition for triggering [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules). If the incident name is a condition, and the incident name changes, the rule will not be triggered.
63
63
64
+
### Defender Boxed
65
+
66
+
For a limited time during January and July of each year, **Defender Boxed** automatically appears when you first open the incident queue. Defender Boxed highlights your organization's security success, improvements, and response actions during the previous six months or calendar year.
67
+
68
+
:::image type="content" source="/defender/media/defender-boxed/defender-boxed-recording.gif" alt-text="Defender Boxed as shown in the incident queue.":::
69
+
70
+
> [!NOTE]
71
+
> Defender Boxed is only available to users who performed applicable activities in the Microsoft Defender portal.
72
+
73
+
You can do the following actions in the series of cards that appear in Defender Boxed:
74
+
75
+
- Download a detailed summary of your achievements that can be shared with others in your organization.
76
+
77
+
:::image type="content" source="/defender/media/defender-boxed/defender-boxed-summary-small.png" alt-text="Screenshot of Defender Boxed slide with the download summary option highlighted." lightbox="/defender/media/defender-boxed/defender-boxed-summary.png":::
78
+
79
+
- Change the frequency of how often Defender Boxed will appear. You can choose between once (every January) or twice (every January and July) per year.
80
+
81
+
:::image type="content" source="/defender/media/defender-boxed/defender-boxed-frequency-small.png" alt-text="Screenshot of Defender Boxed slide with the frequency highlighted." lightbox="/defender/media/defender-boxed/defender-boxed-frequency.png":::
82
+
83
+
- Share your achievement to your social media networks, email, and other forums by saving the slide as an image.
84
+
85
+
:::image type="content" source="/defender/media/defender-boxed/defender-boxed-save-small.png" alt-text="Screenshot of Defender Boxed slide with the save option highlighted." lightbox="/defender/media/defender-boxed/defender-boxed-save.png":::
86
+
87
+
To reopen Defender Boxed, go to the Incidents queue and then select **Your Defender Boxed** on the right side of the pane.
88
+
89
+
:::image type="content" source="/defender/media/defender-boxed/defender-boxed-incident-small.png" alt-text="Screenshot of Defender Boxed slide with the save option highlighted." lightbox="/defender/media/defender-boxed/defender-boxed-incident.png":::
90
+
64
91
## Filters <aname="available-filters"></a>
65
92
66
93
The incident queue also provides multiple filtering options, that when applied, enable you to perform a broad sweep of all existing incidents in your environment, or decide to focus on a specific scenario or threat. Applying filters on the incident queue can help determine which incident requires immediate attention.
Copy file name to clipboardExpand all lines: defender-xdr/incidents-overview.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,9 @@ The Microsoft Defender portal includes tools and methods to automate or otherwis
74
74
|**[Proactively hunt with advanced hunting](advanced-hunting-overview.md)**| Use Kusto Query Language (KQL) to proactively inspect events in your network by querying the logs collected in the Defender portal. Advanced hunting supports a guided mode for users looking for the convenience of a query builder. |
75
75
|**[Harness AI with Microsoft Copilot for Security](/defender-xdr/security-copilot-in-microsoft-365-defender)**| Add AI to support analysts with complex and time-consuming daily workflows. For example, Microsoft Copilot for Security can help with end-to-end incident investigation and response by providing clearly described attack stories, step-by-step actionable remediation guidance and incident activity summarized reports, natural language KQL hunting, and expert code analysis—optimizing on SOC efficiency across data from all sources. <br><br>This capability is in addition to the other AI-based functionality that Microsoft Sentinel brings to the unified platform, in the areas of user and entity behavior analytics, anomaly detection, multi-stage threat detection, and more. |
76
76
77
+
> [!TIP]
78
+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
79
+
77
80
## Related items
78
81
79
82
To learn more about alert correlation and incident merging in the Defender portal, see [Alerts, incidents, and correlation in Microsoft Defender XDR](alerts-incidents-correlation.md)
Copy file name to clipboardExpand all lines: defender-xdr/investigate-incidents.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -254,6 +254,9 @@ Some incidents might have similar incidents listed on the **Similar incidents**
254
254
255
255
:::image type="content" source="/defender/media/investigate-incidents/incident-similartab-small.png" alt-text="Screenshot that shows the Similar incidents tab for an incident in the Microsoft Defender portal." lightbox="/defender/media/investigate-incidents/incident-similartab.png":::
256
256
257
+
> [!TIP]
258
+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
Copy file name to clipboardExpand all lines: defender-xdr/manage-incidents.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,6 +56,9 @@ This article shows you how to perform various incident management tasks associat
56
56
- Assess the activity audit and add comments in the [Activity log](#view-the-activity-log-of-an-incident).
57
57
-[Export incident data to PDF](#export-incident-data-to-pdf).
58
58
59
+
> [!TIP]
60
+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
61
+
59
62
## Access the *Manage incident* pane
60
63
61
64
Most of these tasks are accessible from the **Manage incident** pane for an incident. You can reach this pane from any of several locations.
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
93
+
91
94
## Next steps
92
95
93
96
-[Analyze your first incident](respond-first-incident-analyze.md)
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,6 +30,10 @@ For more information on what's new with other Microsoft Defender security produc
30
30
31
31
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
32
32
33
+
## January 2025
34
+
35
+
-**Defender Boxed** is available for a limited time in January and July of each year. This series of slides highlights your organization’s security successes, improvements, and response actions in the Microsoft Defender portal for the past six months/year. To learn how you can share your security operations team’s achievements, see [Defender Boxed](incident-queue.md#defender-boxed).
36
+
33
37
## December 2024
34
38
35
39
- (GA) [Content distribution via tenant groups in multitenant management](mto-tenantgroups.md) is now generally available. Create tenant groups to manage content across tenants in multitenant management in Microsoft Defender XDR.
@@ -75,7 +79,6 @@ You can also get product updates and important notifications through the [messag
75
79
- (Preview) Microsoft Sentinel data is now available with Defender XDR data in Microsoft Defender multitenant management. Only one Microsoft Sentinel workspace per tenant is currently supported in the Microsoft unified security operations platform. So, Microsoft Defender multitenant management shows security information and event management (SIEM) data from one Microsoft Sentinel workspace per tenant. For more information, see [Microsoft Defender multitenant management](mto-overview.md) and [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
76
80
- To ensure a smooth experience while navigating the Microsoft Defender portal, configure your network firewall by adding the appropriate addresses to your allow list. For more information, see [Network firewall configuration for Microsoft Defender XDR](m365d-enable.md#configure-your-network-firewall).
77
81
78
-
79
82
## July 2024
80
83
81
84
- Incidents with alerts where a compromised device communicated with an operational technology (OT) device are now visible in the Microsoft Defender portal through the [Microsoft Defender for IoT license and Defender for Endpoint’s device discovery capabilities](/defender-endpoint/device-discovery#device-discovery-integration). Using Defender for Endpoint data, Defender XDR automatically correlates these new OT alerts to incidents to provide a comprehensive attack story. To filter related incidents, see [Prioritize incidents in the Microsoft Defender portal](incident-queue.md#filters-).
@@ -101,8 +104,6 @@ You can also get product updates and important notifications through the [messag
101
104
102
105
- (GA) You can now **release or move email messages from quarantine** back to the user's inbox directly from [Take actions in advanced hunting](advanced-hunting-take-action.md#take-various-actions-on-emails) and in [custom detections](custom-detection-rules.md#actions-on-emails). This allows security operators to manage false positives more efficiently and without losing context.
103
106
104
-
105
-
106
107
## June 2024
107
108
108
109
- (Preview) **[Content distribution through tenant groups in multitenant management](mto-tenantgroups.md)** is now available. Content distribution helps you manage content at scale across tenants in multitenant management in Microsoft Defender XDR. In content distribution, you can create tenant groups to copy existing content, like custom detection rules, from the source tenant to the target tenants you assign during tenant group creation. The content then runs on the target tenant's devices or device groups that you set in the tenant group scope.
0 commit comments