You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alerts-incidents-correlation.md
+30-16Lines changed: 30 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,13 +32,15 @@ In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources
32
32
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
33
33
34
34
**Incidents:**
35
+
35
36
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
36
37
- Display the broader context of an attack.
37
38
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
38
39
- Trigger automatic series of responses to the threat.
39
40
- Record all activity related to the threat and its investigation and resolution.
40
41
41
42
**Alerts:**
43
+
42
44
- Represent the individual pieces of evidence that are essential to understanding and investigating the incident.
43
45
- Can be analyzed by themselves to add value when deeper analysis is required.
44
46
- Can trigger automatic mini-investigations and responses to minimize the potential threat impact.
@@ -48,17 +50,17 @@ Here is a summary of the main attributes of incidents and alerts, and the differ
48
50
Microsoft Defender XDR alerts can come from many sources:
49
51
50
52
- Solutions that are part of Microsoft Defender XDR
51
-
- Microsoft Defender for Endpoint
52
-
- Microsoft Defender for Office 365
53
-
- Microsoft Defender for Identity
54
-
- Microsoft Defender for Cloud Apps
55
-
- The app governance add-on for Microsoft Defender for Cloud Apps
56
-
- Microsoft Entra ID Protection
57
-
- Microsoft Data Loss Prevention.
53
+
- Microsoft Defender for Endpoint
54
+
- Microsoft Defender for Office 365
55
+
- Microsoft Defender for Identity
56
+
- Microsoft Defender for Cloud Apps
57
+
- The app governance add-on for Microsoft Defender for Cloud Apps
58
+
- Microsoft Entra ID Protection
59
+
- Microsoft Data Loss Prevention
58
60
59
61
- Other services that have integrations with the Microsoft Defender security portal
60
-
- Microsoft Sentinel
61
-
- Microsoft Defender for Cloud
62
+
- Microsoft Sentinel
63
+
- Microsoft Defender for Cloud
62
64
63
65
Alerts' sources can be indicated by sets of characters prepended to the alert ID. The table shown [here](link) helps you understand the mapping of alert sources based on the prepended character on the alert.
64
66
@@ -81,21 +83,33 @@ Microsoft Defender XDR’s correlation activities don’t stop when incidents ar
81
83
82
84
Defender XDR’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
83
85
84
-
- Entities—assets like users, devices, mailboxes, and others
85
-
- Artifacts—files, processes, email senders, and others
86
-
- Time frames
87
-
- Sequences of events that point to multistage attacks
86
+
- Entities—assets like users, devices, mailboxes, and others
87
+
- Artifacts—files, processes, email senders, and others
88
+
- Time frames
89
+
- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
88
90
89
91
### When are incidents *not* merged?
90
92
93
+
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn’t merge the incidents under the following circumstances:
91
94
95
+
- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened.
96
+
- The two incidents eligible for merging are assigned to two different people.
97
+
- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
98
+
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when [enabled](link-to-procedure).
99
+
- One of the incidents was created by a custom detection, and the other was not.
92
100
101
+
### What happens when incidents are merged?
93
102
103
+
When two or more incidents are merged, the contents of one incident are migrated into the other incident. A new incident is not created. The incident abandoned in the process is automatically deleted. If the abandoned incident originated in Microsoft Sentinel, it will be closed but not deleted. Any references to the closed or deleted incident are redirected to the consolidated incident. The contents of the incidents are handled in the following ways:
94
104
105
+
- Alerts contained in the closed incident are moved to the consolidated incident.
106
+
- Entities (assets etc.) follow the alerts they’re linked to.
107
+
- Tags? ***awaiting answer from PM***
108
+
- Other?
109
+
- Comments and activity log entries in the abandoned incident are *not* moved to the new one.
95
110
111
+
## Manual correlation
96
112
97
-
98
-
99
-
113
+
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
0 commit comments