Skip to content

Commit 6b76c98

Browse files
committed
Near final draft
1 parent dd03644 commit 6b76c98

File tree

2 files changed

+32
-16
lines changed

2 files changed

+32
-16
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,8 @@
158158
items:
159159
- name: Overview
160160
href: incident-response-overview.md
161+
- name: Alerts, incidents, and correlation
162+
href: alerts-incidents-correlation.md
161163
- name: Investigate and respond with Microsoft Copilot in Microsoft Defender
162164
items:
163165
- name: Overview

defender-xdr/alerts-incidents-correlation.md

Lines changed: 30 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,15 @@ In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources
3232
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
3333

3434
**Incidents:**
35+
3536
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
3637
- Display the broader context of an attack.
3738
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
3839
- Trigger automatic series of responses to the threat.
3940
- Record all activity related to the threat and its investigation and resolution.
4041

4142
**Alerts:**
43+
4244
- Represent the individual pieces of evidence that are essential to understanding and investigating the incident.
4345
- Can be analyzed by themselves to add value when deeper analysis is required.
4446
- Can trigger automatic mini-investigations and responses to minimize the potential threat impact.
@@ -48,17 +50,17 @@ Here is a summary of the main attributes of incidents and alerts, and the differ
4850
Microsoft Defender XDR alerts can come from many sources:
4951

5052
- Solutions that are part of Microsoft Defender XDR
51-
- Microsoft Defender for Endpoint
52-
- Microsoft Defender for Office 365
53-
- Microsoft Defender for Identity
54-
- Microsoft Defender for Cloud Apps
55-
- The app governance add-on for Microsoft Defender for Cloud Apps
56-
- Microsoft Entra ID Protection
57-
- Microsoft Data Loss Prevention.
53+
- Microsoft Defender for Endpoint
54+
- Microsoft Defender for Office 365
55+
- Microsoft Defender for Identity
56+
- Microsoft Defender for Cloud Apps
57+
- The app governance add-on for Microsoft Defender for Cloud Apps
58+
- Microsoft Entra ID Protection
59+
- Microsoft Data Loss Prevention
5860

5961
- Other services that have integrations with the Microsoft Defender security portal
60-
- Microsoft Sentinel
61-
- Microsoft Defender for Cloud
62+
- Microsoft Sentinel
63+
- Microsoft Defender for Cloud
6264

6365
Alerts' sources can be indicated by sets of characters prepended to the alert ID. The table shown [here](link) helps you understand the mapping of alert sources based on the prepended character on the alert.
6466

@@ -81,21 +83,33 @@ Microsoft Defender XDR’s correlation activities don’t stop when incidents ar
8183

8284
Defender XDR’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
8385

84-
- Entities—assets like users, devices, mailboxes, and others
85-
- Artifacts—files, processes, email senders, and others
86-
- Time frames
87-
- Sequences of events that point to multistage attacks
86+
- Entities—assets like users, devices, mailboxes, and others
87+
- Artifacts—files, processes, email senders, and others
88+
- Time frames
89+
- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
8890

8991
### When are incidents *not* merged?
9092

93+
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn’t merge the incidents under the following circumstances:
9194

95+
- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened.
96+
- The two incidents eligible for merging are assigned to two different people.
97+
- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
98+
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when [enabled](link-to-procedure).
99+
- One of the incidents was created by a custom detection, and the other was not.
92100

101+
### What happens when incidents are merged?
93102

103+
When two or more incidents are merged, the contents of one incident are migrated into the other incident. A new incident is not created. The incident abandoned in the process is automatically deleted. If the abandoned incident originated in Microsoft Sentinel, it will be closed but not deleted. Any references to the closed or deleted incident are redirected to the consolidated incident. The contents of the incidents are handled in the following ways:
94104

105+
- Alerts contained in the closed incident are moved to the consolidated incident.
106+
- Entities (assets etc.) follow the alerts they’re linked to.
107+
- Tags? ***awaiting answer from PM***
108+
- Other?
109+
- Comments and activity log entries in the abandoned incident are *not* moved to the new one.
95110

111+
## Manual correlation
96112

97-
98-
99-
113+
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
100114

101115
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)