Skip to content

Commit 5b0eb16

Browse files
committed
Link to incident
1 parent 3a11502 commit 5b0eb16

File tree

1 file changed

+27
-26
lines changed

1 file changed

+27
-26
lines changed

defender-xdr/advanced-hunting-defender-results.md

Lines changed: 27 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -53,80 +53,81 @@ You can use the link to incident feature to add advanced hunting query results t
5353
1. In the advanced hunting query pane, enter your query in the query field provided, then select **Run query** to get your results.
5454
:::image type="content" source="/defender/media/advanced-hunting-results-link1.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link1.png":::
5555

56-
2. In the Results pane, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
56+
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
5757
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
5858

5959
3. In the **Alert details** section in the Link to incident pane, select **Create new incident** to convert the events to alerts and group them to a new incident:
60+
6061
[IMAGE]
6162

62-
You can also select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
63+
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.
6364
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
6465
4. For either selection, provide the following details, then select **Next**:
65-
- **Alert title** - a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
66-
- **Severity** - choose the severity applicable to the group of alerts
67-
- **Category** - choose the appropriate threat category for the alerts
68-
- **Description** - give a helpful description of the grouped alerts
66+
- **Alert title** a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
67+
- **Severity** choose the severity applicable to the group of alerts
68+
- **Category** choose the appropriate threat category for the alerts
69+
- **Description** give a helpful description of the grouped alerts
6970
- **Recommended actions** – list the recommended remediation actions for the security analysts who are investigating the incident
7071
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
7172

72-
If the projected columns belong to Defender XDR tables, the entities are automatically selected. If the projected columns are Microsoft Sentinel tables, you need to select the entities manually.
73+
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
7374

74-
There are two sections for entities selection:
75+
There are two sections for which you can select entities:
7576

7677
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
7778
- Account
7879
- Device
7980
- Mailbox
80-
- CloudApplication
81-
- AzureResource
82-
- AmazonResource
83-
- GoogleCloudResource
81+
- Cloud application
82+
- Azure resource
83+
- Amazon Web Services resource
84+
- Google Cloud Platform resource
8485

85-
b. **Related evidence** – non assets that appear in the selected events can be added in this section. The supported entities’ types are:
86+
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
8687
- Process
8788
- File
88-
- RegistryValue
89+
- Registry value
8990
- IP
90-
- OAuthApplication
91+
- OAuth application
9192
- DNS
92-
- SecurityGroup
93+
- Security group
9394
- URL
94-
- MailCluster
95-
- MailMessage
95+
- Mail cluster
96+
- Mail message
9697

9798
> [!NOTE]
9899
> For queries containing only XDR data, only entity types that are available in XDR tables are shown.
99100
100-
After an entity type is selected, select an identifier type that exists in the selected records and will be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Use the description displayed when hovering on each identifier to better understand it.
101+
After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
101102

102-
After selecting the identifier, select a column from the query results that contains the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
103+
After selecting the identifier, select a column from the query results that contain the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
103104

104105
:::image type="content" source="/defender/media/advanced-hunting-results-link5.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link5.png":::
105106

106-
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipients mailbox and recipients account are the impacted entities, and the senders IP as well as mail message are related evidence.
107+
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
107108

108109
:::image type="content" source="/defender/media/advanced-hunting-results-link6.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link6.png":::
109110

110-
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipients mailboxes and recipient object ids combinations, for instance, then three alerts are created and linked to the chosen incident.
111+
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
111112

112113
6. Select **Next**.
113114
7. Review the details you've provided in the Summary section.
114115
8. Select **Done**.
115116

116117
### View linked records in the incident
117-
You can click on the generated link from the summary step of the wizard or select the incident name from the incidents’ queue, to view the incident that the events are linked to.
118+
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
118119

119120
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
120121

121122
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
122-
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
123+
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
123124

124-
You can also select the event from the timeline view or from the query results view to open the Inspect record pane.
125+
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
125126

126127
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
127128

128129
### Filter for events added using advanced hunting
129-
You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by Manual detection source
130+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
130131

131132
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
132133

0 commit comments

Comments
 (0)