You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alerts-incidents-correlation.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,16 +34,18 @@ Here is a summary of the main attributes of incidents and alerts, and the differ
34
34
**Incidents:**
35
35
36
36
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
37
-
- Display the broader context of an attack.
37
+
- Display the broader context of an attack—the **attack story**.
38
38
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
39
-
- Trigger automatic series of responses to the threat.
39
+
- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts.
40
+
- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks).
40
41
- Record all activity related to the threat and its investigation and resolution.
41
42
42
43
**Alerts:**
43
44
44
-
- Represent the individual pieces of evidence that are essential to understanding and investigating the incident.
45
+
- Represent the individual pieces of the story that are essential to understanding and investigating the incident.
46
+
- Are created by many different sources both internal and external to the Defender portal.
45
47
- Can be analyzed by themselves to add value when deeper analysis is required.
46
-
- Can trigger automatic mini-investigations and responses to minimize the potential threat impact.
48
+
- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact.
47
49
48
50
## Alert sources
49
51
@@ -62,7 +64,7 @@ Microsoft Defender XDR alerts can come from many sources:
62
64
- Microsoft Sentinel
63
65
- Microsoft Defender for Cloud
64
66
65
-
Alerts' sources can be indicated by sets of characters prepended to the alert ID. The table shown [here](link) helps you understand the mapping of alert sources based on the prepended character on the alert.
67
+
When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix.
66
68
67
69
## Incident creation and alert correlation
68
70
@@ -95,7 +97,7 @@ Even when the correlation logic indicates that two incidents should be merged, D
95
97
- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened.
96
98
- The two incidents eligible for merging are assigned to two different people.
97
99
- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
98
-
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when [enabled](link-to-procedure).
100
+
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when enabled.
99
101
- One of the incidents was created by a custom detection, and the other was not.
100
102
101
103
### What happens when incidents are merged?
@@ -104,8 +106,7 @@ When two or more incidents are merged, the contents of one incident are migrated
104
106
105
107
- Alerts contained in the closed incident are moved to the consolidated incident.
106
108
- Entities (assets etc.) follow the alerts they’re linked to.
107
-
- Tags? ***awaiting answer from PM***
108
-
- Other?
109
+
- Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident.
109
110
- Comments and activity log entries in the abandoned incident are *not* moved to the new one.
0 commit comments