Skip to content

Commit 5ca5c18

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-ma-1751348150
2 parents 212a877 + 6a2691b commit 5ca5c18

13 files changed

+118
-13
lines changed

defender-endpoint/isolation-exclusions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/22/2025
17+
ms.date: 07/01/2025
1818
---
1919

2020
# Isolation exclusions (preview)
@@ -57,7 +57,7 @@ There are two steps to using isolation exclusion: defining isolation exclusion r
5757

5858
### Prerequisites
5959

60-
* Isolation exclusion is available on Windows (minimum client version 10.8470) and macOS (minimum client version 101.240902).
60+
* Isolation exclusion is available on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS.
6161
* Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin or Manage Security settings permissions or above. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
6262

6363
:::image type="content" source="./media/isolation-exclusions/enable-exclusions.png" alt-text="Screenshot showing how to enable isolation exclusions." lightbox="./media/isolation-exclusions/enable-exclusions.png":::
15.7 KB
Loading
-1.47 KB
Loading

defender-endpoint/respond-machine-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
8-
ms.date: 04/09/2025
8+
ms.date: 07/01/2025
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -216,7 +216,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216216
- `iptables`
217217
- `ip6tables`
218218
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219-
- Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
219+
- Selective isolation is available for devices running on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
220220
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
221221
- The feature supports VPN connection.
222222
- You must have at least the `Active remediation actions` role assigned. For more information, see [Create and manage roles](user-roles.md).

defender-xdr/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,9 @@
9494
href: investigate-incidents.md
9595
- name: Move alerts to another incident
9696
href: move-alert-to-another-incident.md
97+
- name: Merge incidents manually
98+
href: merge-incidents-manually.md
99+
- name: Alerts
97100
- name: Investigate alerts
98101
href: investigate-alerts.md
99102
- name: Investigate entity pages

defender-xdr/alerts-incidents-correlation.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -37,19 +37,19 @@ When alerts are generated by the various detection mechanisms in the Microsoft D
3737

3838
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
3939

40-
### Alert correlation by workspace
40+
### Alert correlation by Microsoft Sentinel workspace
4141

42-
The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. A primary workspace's alerts are correlated with Microsoft Defender XDR data. So, incidents include alerts from Microsoft Sentinel's primary workspace and Defender XDR in a unified queue. All other onboarded workspaces are considered secondary workspaces. For secondary workspaces, incidents are created based on the workspace’s data and won't include Defender XDR data. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579).
42+
When the Defender portal is configured to include Microsoft Sentinel as a data source, each Microsoft Sentinel workspace is considered its own separate data source. If you have multiple workspaces for Microsoft Sentinel, the Defender portal allows you to configure one of those workspaces as the *primary workspace*. The alerts that come from the primary workspace can be correlated with Microsoft Defender XDR alerts, and they can be included together in incidents. <!-- XDR data? Or data from any other sources in the portal? In other words, are Sentinel alerts from secondary workspaces ON AN ISLAND? They can be correlated amongst themselves, right? --> Any other onboarded Microsoft Sentinel workspaces are considered *secondary workspaces*. Alerts from these secondary workspaces are *not* correlated with alerts from Defender XDR or any other Defender portal data sources, including other Microsoft Sentinel workspaces. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal).
4343

4444
### Manual correlation of alerts
4545

46-
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
46+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
4747

4848
For more information on moving an alert from one incident to another, see [Move alerts from one incident to another in the Microsoft Defender portal](move-alert-to-another-incident.md).
4949

5050
## Incident correlation and merging
5151

52-
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents and alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
52+
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents and alerts across incidents. When multiple incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
5353

5454
### Criteria for merging incidents
5555

@@ -66,7 +66,7 @@ When two or more incidents are merged, a new incident is *not* created to absorb
6666

6767
#### Merge direction
6868

69-
The direction of the incident merge refers to which incident is the source and which is the target. This direction is determined by Microsoft Defender, based on its own internal logic, with the goal of maximizing information retention and access. The user doesn't have any input into this decision.
69+
The direction of the incident merge refers to which incident is the source and which is the target. This direction is determined by Microsoft Defender, based on its own internal logic, with the goal of maximizing information retention and access. The user doesn't have any input into this decision, even when merging incidents manually.
7070

7171
#### Incident contents
7272

@@ -77,20 +77,32 @@ The contents of the incidents are handled in the following ways:
7777
- A **`Redirected`** tag is added to the source incident.
7878
- Entities (assets etc.) follow the alerts they're linked to.
7979
- Analytics rules recorded as involved in the creation of the source incident are added to the rules recorded in the target incident.
80-
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.
81-
82-
To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
80+
- Currently, comments and activity log entries in the source incident are *not* moved to the target incident.<br>To see the source incident's comments and activity history, open the incident in Microsoft Sentinel in the Azure portal. The activity history includes the closing of the incident and the adding and removal of alerts, tags, and other items related to the incident merge. These activities are attributed to the identity *Microsoft Defender XDR - alert correlation*.
8381

8482
### When incidents aren't merged
8583

8684
Even when the correlation logic indicates that two incidents should be merged, Defender doesn't merge the incidents under the following circumstances:
8785

8886
- One of the incidents has a status of "Closed". Incidents that are resolved don't get reopened.
8987
- The source and target incidents are assigned to two different people.
90-
- The source and target incidents have two different classifications (for example, true positive and false positive).
88+
- The source and target incidents have two different classifications (for example, true positive and false positive) or two different determinations (the subcategories of classifications).
9189
- Merging the two incidents would raise the number of entities in the target incident above the allowed maximum.
9290
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
9391

92+
### Manual merging of incidents (Preview)
93+
94+
If two incidents should be merged, but aren't merged for any of the reasons listed in the [previous section](#when-incidents-arent-merged), you can now merge the incidents manually after you fix the underlying reasons.
95+
96+
For example, if the incidents weren't merged because they were assigned to two different people, you can remove the assignment of one of the incidents and then merge the incidents manually.
97+
98+
Merging incidents together is preferable to unlinking alerts from one incident and linking them to another, because all the incident information (for example, the activity log) is preserved.
99+
100+
Currently, five incidents at a time can be merged manually.
101+
102+
Other rules governing manual merging are the same as automatic merging. See [Details of the merge process](#details-of-the-merge-process) above.
103+
104+
For instructions and more information on how to merge incidents manually, see [Merge incidents manually in the Microsoft Defender portal](merge-incidents-manually.md).
105+
94106
## Next steps
95107

96108
To learn more about prioritizing and managing incidents, see the following articles:
168 KB
Loading
191 KB
Loading
51.4 KB
Loading
25.7 KB
Loading

0 commit comments

Comments
 (0)