Skip to content

Commit 88f2543

Browse files
Merge pull request #581 from yelevin/yelevin/incident-correlation
Incident correlation document
2 parents 8b49289 + a9662b3 commit 88f2543

File tree

2 files changed

+118
-0
lines changed

2 files changed

+118
-0
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,8 @@
158158
items:
159159
- name: Overview
160160
href: incident-response-overview.md
161+
- name: Alerts, incidents, and correlation
162+
href: alerts-incidents-correlation.md
161163
- name: Investigate and respond with Microsoft Copilot in Microsoft Defender
162164
items:
163165
- name: Overview
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Alerts, incidents, and correlation in Microsoft Defender XDR
3+
description: Learn how alerts and incidents are correlated in Microsoft Defender XDR.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: yelevin
8+
author: yelevin
9+
ms.localizationpriority: medium
10+
manager: dansimp
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- usx-security
15+
- tier1
16+
ms.topic: conceptual
17+
search.appverid:
18+
- MOE150
19+
- MET150
20+
ms.date: 05/30/2024
21+
appliesto:
22+
- Microsoft Defender XDR
23+
- Microsoft Sentinel in the Microsoft Defender portal
24+
---
25+
26+
# Alerts, incidents, and correlation in Microsoft Defender XDR
27+
28+
In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment. Alerts can often be part of a broader, complex attack story, and related alerts are aggregated and correlated together to form ***incidents*** that represent these attack stories.
29+
30+
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
31+
32+
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
33+
34+
**Incidents:**
35+
36+
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
37+
- Display the broader context of an attack—the **attack story**.
38+
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
39+
- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts.
40+
- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks).
41+
- Record all activity related to the threat and its investigation and resolution.
42+
43+
**Alerts:**
44+
45+
- Represent the individual pieces of the story that are essential to understanding and investigating the incident.
46+
- Are created by many different sources both internal and external to the Defender portal.
47+
- Can be analyzed by themselves to add value when deeper analysis is required.
48+
- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact.
49+
50+
## Alert sources
51+
52+
Microsoft Defender XDR alerts can come from many sources:
53+
54+
- Solutions that are part of Microsoft Defender XDR
55+
- Microsoft Defender for Endpoint
56+
- Microsoft Defender for Office 365
57+
- Microsoft Defender for Identity
58+
- Microsoft Defender for Cloud Apps
59+
- The app governance add-on for Microsoft Defender for Cloud Apps
60+
- Microsoft Entra ID Protection
61+
- Microsoft Data Loss Prevention
62+
63+
- Other services that have integrations with the Microsoft Defender security portal
64+
- Microsoft Sentinel
65+
- Microsoft Defender for Cloud
66+
67+
When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix.
68+
69+
## Incident creation and alert correlation
70+
71+
When alerts are generated by the various detection mechanisms in the Microsoft Defender security portal, Defender XDR places them into new or existing incidents according to the following logic:
72+
73+
| Scenario | Decision |
74+
| -------- | -------- |
75+
| The alert is sufficiently unique across all alert sources within a particular time frame. | Defender XDR creates a new incident and adds the alert to it. |
76+
| The alert is sufficiently related to other alerts—from the same source or across sources—within a particular time frame. | Defender XDR adds the alert to an existing incident. |
77+
78+
The criteria Microsoft Defender uses to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
79+
80+
## Incident correlation and merging
81+
82+
Microsoft Defender XDR’s correlation activities don’t stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident.
83+
84+
### How does Defender XDR make that determination?
85+
86+
Defender XDR’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
87+
88+
- Entities—assets like users, devices, mailboxes, and others
89+
- Artifacts—files, processes, email senders, and others
90+
- Time frames
91+
- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
92+
93+
### When are incidents *not* merged?
94+
95+
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn’t merge the incidents under the following circumstances:
96+
97+
- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened.
98+
- The two incidents eligible for merging are assigned to two different people.
99+
- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
100+
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when enabled.
101+
- One of the incidents was created by a custom detection, and the other was not.
102+
103+
### What happens when incidents are merged?
104+
105+
When two or more incidents are merged, the contents of one incident are migrated into the other incident. A new incident is not created. The incident abandoned in the process is automatically deleted. If the abandoned incident originated in Microsoft Sentinel, it will be closed but not deleted. Any references to the closed or deleted incident are redirected to the consolidated incident. The contents of the incidents are handled in the following ways:
106+
107+
- Alerts contained in the closed incident are moved to the consolidated incident.
108+
- Entities (assets etc.) follow the alerts they’re linked to.
109+
- Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident.
110+
- Comments and activity log entries in the abandoned incident are *not* moved to the new one.
111+
112+
## Manual correlation
113+
114+
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
115+
116+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)