You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-results.md
+27-26Lines changed: 27 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,80 +53,81 @@ You can use the link to incident feature to add advanced hunting query results t
53
53
1. In the advanced hunting query pane, enter your query in the query field provided, then select **Run query** to get your results.
54
54
:::image type="content" source="/defender/media/advanced-hunting-results-link1.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link1.png":::
55
55
56
-
2. In the Results pane, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
56
+
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
57
57
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
58
58
59
59
3. In the **Alert details** section in the Link to incident pane, select **Create new incident** to convert the events to alerts and group them to a new incident:
60
+
60
61
[IMAGE]
61
62
62
-
You can also select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
63
+
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.
63
64
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
64
65
4. For either selection, provide the following details, then select **Next**:
65
-
- **Alert title**- a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
66
-
- **Severity**- choose the severity applicable to the group of alerts
67
-
- **Category**- choose the appropriate threat category for the alerts
68
-
- **Description**- give a helpful description of the grouped alerts
66
+
- **Alert title**– a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
67
+
- **Severity**– choose the severity applicable to the group of alerts
68
+
- **Category**– choose the appropriate threat category for the alerts
69
+
- **Description**– give a helpful description of the grouped alerts
69
70
- **Recommended actions** – list the recommended remediation actions for the security analysts who are investigating the incident
70
71
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
71
72
72
-
If the projected columns belong to Defender XDR tables, the entities are automatically selected. If the projected columns are Microsoft Sentinel tables, you need to select the entities manually.
73
+
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
73
74
74
-
There are two sections for entities selection:
75
+
There are two sections for which you can select entities:
75
76
76
77
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
77
78
- Account
78
79
- Device
79
80
- Mailbox
80
-
- CloudApplication
81
-
- AzureResource
82
-
- AmazonResource
83
-
- GoogleCloudResource
81
+
- Cloud application
82
+
- Azure resource
83
+
- Amazon Web Services resource
84
+
- Google Cloud Platform resource
84
85
85
-
b. **Related evidence** – nonassets that appear in the selected events can be added in this section. The supported entities’ types are:
86
+
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
86
87
- Process
87
88
- File
88
-
- RegistryValue
89
+
- Registry value
89
90
- IP
90
-
- OAuthApplication
91
+
- OAuth application
91
92
- DNS
92
-
- SecurityGroup
93
+
- Security group
93
94
- URL
94
-
- MailCluster
95
-
- MailMessage
95
+
- Mail cluster
96
+
- Mail message
96
97
97
98
> [!NOTE]
98
99
> For queries containing only XDR data, only entity types that are available in XDR tables are shown.
99
100
100
-
After an entity type is selected, select an identifier type that exists in the selected records and will be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Use the description displayed when hovering on each identifier to better understand it.
101
+
After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
101
102
102
-
After selecting the identifier, select a column from the query results’ that contains the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
103
+
After selecting the identifier, select a column from the query results that contain the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
103
104
104
105
:::image type="content" source="/defender/media/advanced-hunting-results-link5.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link5.png":::
105
106
106
-
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient’s mailbox and recipient’s account are the impacted entities, and the sender’s IP as well as mail message are related evidence.
107
+
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
107
108
108
109
:::image type="content" source="/defender/media/advanced-hunting-results-link6.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link6.png":::
109
110
110
-
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipients mailboxes and recipient object ids combinations, for instance, then three alerts are created and linked to the chosen incident.
111
+
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
111
112
112
113
6. Select **Next**.
113
114
7. Review the details you've provided in the Summary section.
114
115
8. Select **Done**.
115
116
116
117
### View linked records in the incident
117
-
You can click on the generated link from the summary step of the wizard or select the incident name from the incidents’ queue, to view the incident that the events are linked to.
118
+
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
118
119
119
120
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
120
121
121
122
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
122
-
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
123
+
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
123
124
124
-
You can also select the event from the timeline view or from the query results view to open the Inspect record pane.
125
+
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
125
126
126
127
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
127
128
128
129
### Filter for events added using advanced hunting
129
-
You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by Manual detection source
130
+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
130
131
131
132
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
0 commit comments