Skip to content

Commit 69edade

Browse files
authored
Merge pull request #2090 from MicrosoftDocs/main
Publish main to live, Tuesday 3:30PM PST, 12/03
2 parents 5211c22 + f8fd668 commit 69edade

14 files changed

+266
-138
lines changed

CloudAppSecurityDocs/cloud-discovery-anomaly-detection-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ A cloud discovery anomaly detection policy enables you to set up and configure c
1414
This article describes how to create and configure a cloud discovery anomaly detection policy in Microsoft Defender for Cloud Apps.
1515

1616
> [!IMPORTANT]
17-
> Starting August 2024, **cloud discovery anomaly** support for Microsoft Defender for Cloud Apps is retired. As such, the legacy procedure presented in this article is provided for informational purposes only. If you want to receive security alerts similar to anomaly detection, complete the steps in [Create app discovery policy](#create-app-discovery-policy).
17+
> Starting August 2024, **cloud discovery anomaly** support for Microsoft Defender for Cloud Apps is retired. As such, the legacy procedure presented in this article is provided for informational purposes only. If you want to receive security alerts similar to anomaly detection, complete the steps in [Create app discovery policy](cloud-discovery-policies.md).
1818
1919
## Create app discovery policy
2020

defender-endpoint/respond-machine-alerts.md

Lines changed: 98 additions & 93 deletions
Large diffs are not rendered by default.

defender-xdr/advanced-hunting-defender-results.md

Lines changed: 84 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom:
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 08/07/2024
26+
ms.date: 11/19/2024
2727
---
2828

2929
# Work with advanced hunting results containing Microsoft Sentinel data
@@ -47,3 +47,86 @@ You can also right-click on any result value in a row so that you can use it to:
4747

4848
For Microsoft Defender XDR data, you can take further action by selecting the checkboxes to the left of each result row. Select **Link to incident** to link the selected results to an incident (read [Link query results to an incident](advanced-hunting-link-to-incident.md)) or **Take actions** to open the Take actions wizard (read [Take action on advanced hunting query results](advanced-hunting-take-action.md)).
4949

50+
## Link query results to an incident
51+
52+
You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you to easily capture records from advanced hunting activities, which allows you to create a richer timeline or context of events regarding an incident.
53+
54+
### Link results to new or existing incidents
55+
56+
1. In the advanced hunting query pane, enter your query in the query field provided, then select **Run query** to get your results.
57+
:::image type="content" source="/defender/media/advanced-hunting-results-link1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link1.png":::
58+
59+
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
60+
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
61+
62+
3. In the **Alert details** section in the Link to incident pane, select **Create new incident** to convert the events to alerts and group them to a new incident:
63+
64+
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.<br>
65+
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
66+
4. For either selection, provide the following details, then select **Next**:
67+
- **Alert title** – a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
68+
- **Severity** – choose the severity applicable to the group of alerts
69+
- **Category** – choose the appropriate threat category for the alerts
70+
- **Description** – give a helpful description of the grouped alerts
71+
- **Recommended actions** – list the recommended remediation actions for the security analysts who are investigating the incident
72+
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
73+
74+
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
75+
76+
There are two sections for which you can select entities:
77+
78+
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
79+
- Account
80+
- Device
81+
- Mailbox
82+
- Cloud application
83+
- Azure resource
84+
- Amazon Web Services resource
85+
- Google Cloud Platform resource
86+
87+
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
88+
- Process
89+
- File
90+
- Registry value
91+
- IP
92+
- OAuth application
93+
- DNS
94+
- Security group
95+
- URL
96+
- Mail cluster
97+
- Mail message
98+
99+
> [!NOTE]
100+
> For queries containing only XDR data, only entity types that are available in XDR tables are shown.
101+
102+
6. After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
103+
7. After selecting the identifier, select a column from the query results that contain the selected identifier. You can select **Explore query and results** to open the advanced hunting context panel. This allows you to explore your query and results to make sure you chose the right column for the selected identifier.
104+
<br>
105+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
106+
<br>
107+
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
108+
109+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
110+
111+
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
112+
113+
6. Select **Next**.
114+
7. Review the details you've provided in the Summary section.
115+
8. Select **Done**.
116+
117+
### View linked records in the incident
118+
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
119+
120+
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
121+
122+
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
123+
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
124+
125+
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
126+
127+
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
128+
129+
### Filter for events added using advanced hunting
130+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
131+
132+
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::

defender-xdr/advanced-hunting-link-to-incident.md

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- cx-ti
2020
- cx-ah
2121
ms.topic: how-to
22-
ms.date: 04/22/2024
22+
ms.date: 11/19/2024
2323
---
2424

2525
# Link query results to an incident
@@ -30,25 +30,25 @@ ms.date: 04/22/2024
3030
**Applies to:**
3131
- Microsoft Defender XDR
3232

33+
3334
You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you easily capture records from advanced hunting activities, which enables you to create a richer timeline or context of events regarding an incident.
3435

3536
## Link results to new or existing incidents
3637

3738
1. In the advanced hunting query page, first enter your query in the query field provided then select **Run query** to get your results.
3839

39-
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="The Query page in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1.png":::
40+
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1.png":::
4041

4142
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
4243

43-
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="The Link to incident option of the Results tab in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1b.png":::
44+
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1b.png":::
4445

4546
3. Find the **Alert details** section in the Link to incident pane, then select **Create new incident** to convert the events to alerts and group them to a new incident:
4647

47-
:::image type="content" source="/defender/media/link-to-incident-3-create-new.png" alt-text="The Alert details section in the Link to incident pane in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-3-create-new.png":::
4848

4949
Or select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
5050

51-
:::image type="content" source="/defender/media/link-to-incident-3-link-to-existing.png" alt-text="The Alert details section in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-3-link-to-existing.png":::
51+
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
5252

5353
4. For either selection, provide the following details, then select **Next**:
5454
- **Alert title** - provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
@@ -57,31 +57,57 @@ You can use the link to incident feature to add advanced hunting query results t
5757
- **Description** - Give a helpful description for the grouped alerts.
5858
- **Recommended actions** - Provide remediation actions.
5959

60-
5. In the **Impacted entities** section, select the main affected or impacted entity. Only the applicable entities based on the query results appear in this section. In our example, we used a query to find events related to a possible email exfiltration incident, therefore the Sender is the impacted entity. If there are four different senders, for instance, four alerts are created and linked to the chosen incident.
61-
62-
:::image type="content" source="/defender/media/link-to-incident-4-impacted-entities.png" alt-text="The impacted entity in the Link to incident section in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-4-impacted-entities.png":::
60+
5. In the **Entities** section, you can find which entities are used to correlate other alerts to the linked incident. They also appear in the incident page. You can review the preselected entities categorized as follows:
61+
62+
a. **Impacted assets** – assets impacted by the selected events, can be:
63+
- Account
64+
- Device
65+
- Mailbox
66+
- Cloud application
67+
- Azure resource
68+
- Amazon Web Services resource
69+
- Google Cloud Platform resource
70+
71+
b. **Related evidence** – non-assets that appear in the selected events. The supported entity types are:
72+
- Process
73+
- File
74+
- Registry value
75+
- IP
76+
- OAuth application
77+
- DNS
78+
- Security group
79+
- URL
80+
- Mail cluster
81+
- Mail message
82+
83+
6. After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
84+
7. After selecting the identifier, select a column from the query results that contain the selected identifier. You can select **Explore query and results** to open the advanced hunting context panel. This allows you to explore your query and results to make sure you chose the right column for the selected identifier.
85+
<br>
86+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
87+
<br>
88+
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
89+
90+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
91+
92+
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
6393

64-
1. Select **Next**.
65-
1. Review the details you've provided in the **Summary** section.
66-
:::image type="content" source="/defender/media/link-to-incident-5-summary.png" alt-text="The results page in the Link to incident section in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-5-summary.png":::
67-
68-
1. Select **Done**.
94+
6. Select **Next**.
95+
7. Review the details you've provided in the Summary section.
96+
8. Select **Done**.
6997

70-
## View linked records in the incident
98+
### View linked records in the incident
99+
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
71100

72-
You can select the incident name to view the incident that the events are linked to.
73-
:::image type="content" source="/defender/media/link-to-incident-6-incident-pg.png" alt-text="The event details screen in the Summary tab in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-6-incident-pg.png":::
101+
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
74102

75-
In our example, the four alerts, representing the four selected events, were linked successfully to a new incident.
103+
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
104+
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
76105

77-
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
78-
:::image type="content" source="/defender/media/link-to-incident-7-alert-story.png" alt-text="The full details of an event in the Timeline tab in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-7-alert-story.png":::
106+
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
79107

80-
You can also select the event to open the **Inspect record** pane.
81-
:::image type="content" source="/defender/media/link-to-incident-7-inspect-record.png" alt-text="The inspect record details of an event in the Timeline tab in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-7-inspect-record.png":::
108+
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
82109

83-
## Filter for events added using advanced hunting
84-
You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by **Manual** detection source.
110+
### Filter for events added using advanced hunting
111+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
85112

86-
:::image type="content" source="/defender/media/link-to-incident-8-filter.png" alt-text="The manual filtering of Incidents and Alerts queue in the Filters page in the Microsoft Defender portal " lightbox="/defender/media/link-to-incident-8-filter.png":::
87-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
113+
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::

0 commit comments

Comments
 (0)