|
| 1 | +--- |
| 2 | +title: Alerts, incidents, and correlation in Microsoft Defender XDR |
| 3 | +description: Learn how alerts and incidents are correlated in Microsoft Defender XDR. |
| 4 | +ms.service: defender-xdr |
| 5 | +f1.keywords: |
| 6 | + - NOCSH |
| 7 | +ms.author: yelevin |
| 8 | +author: yelevin |
| 9 | +ms.localizationpriority: medium |
| 10 | +manager: dansimp |
| 11 | +audience: ITPro |
| 12 | +ms.collection: |
| 13 | + - m365-security |
| 14 | + - usx-security |
| 15 | + - tier1 |
| 16 | +ms.topic: conceptual |
| 17 | +search.appverid: |
| 18 | + - MOE150 |
| 19 | + - MET150 |
| 20 | +ms.date: 05/30/2024 |
| 21 | +appliesto: |
| 22 | +- Microsoft Defender XDR |
| 23 | +- Microsoft Sentinel in the Microsoft Defender portal |
| 24 | +--- |
| 25 | + |
| 26 | +# Alerts, incidents, and correlation in Microsoft Defender XDR |
| 27 | + |
| 28 | +In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment. Alerts can often be part of a broader, complex attack story, and related alerts are aggregated and correlated together to form ***incidents*** that represent these attack stories. |
| 29 | + |
| 30 | +[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)] |
| 31 | + |
| 32 | +Here is a summary of the main attributes of incidents and alerts, and the differences between them: |
| 33 | + |
| 34 | +**Incidents:** |
| 35 | + |
| 36 | +- Are the main "unit of measure" of the work of the Security Operations Center (SOC). |
| 37 | +- Display the broader context of an attack—the **attack story**. |
| 38 | +- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation. |
| 39 | +- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts. |
| 40 | +- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks). |
| 41 | +- Record all activity related to the threat and its investigation and resolution. |
| 42 | + |
| 43 | +**Alerts:** |
| 44 | + |
| 45 | +- Represent the individual pieces of the story that are essential to understanding and investigating the incident. |
| 46 | +- Are created by many different sources both internal and external to the Defender portal. |
| 47 | +- Can be analyzed by themselves to add value when deeper analysis is required. |
| 48 | +- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact. |
| 49 | + |
| 50 | +## Alert sources |
| 51 | + |
| 52 | +Microsoft Defender XDR alerts can come from many sources: |
| 53 | + |
| 54 | +- Solutions that are part of Microsoft Defender XDR |
| 55 | + - Microsoft Defender for Endpoint |
| 56 | + - Microsoft Defender for Office 365 |
| 57 | + - Microsoft Defender for Identity |
| 58 | + - Microsoft Defender for Cloud Apps |
| 59 | + - The app governance add-on for Microsoft Defender for Cloud Apps |
| 60 | + - Microsoft Entra ID Protection |
| 61 | + - Microsoft Data Loss Prevention |
| 62 | + |
| 63 | +- Other services that have integrations with the Microsoft Defender security portal |
| 64 | + - Microsoft Sentinel |
| 65 | + - Microsoft Defender for Cloud |
| 66 | + |
| 67 | +When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix. |
| 68 | + |
| 69 | +## Incident creation and alert correlation |
| 70 | + |
| 71 | +When alerts are generated by the various detection mechanisms in the Microsoft Defender security portal, Defender XDR places them into new or existing incidents according to the following logic: |
| 72 | + |
| 73 | +| Scenario | Decision | |
| 74 | +| -------- | -------- | |
| 75 | +| The alert is sufficiently unique across all alert sources within a particular time frame. | Defender XDR creates a new incident and adds the alert to it. | |
| 76 | +| The alert is sufficiently related to other alerts—from the same source or across sources—within a particular time frame. | Defender XDR adds the alert to an existing incident. | |
| 77 | + |
| 78 | +The criteria Microsoft Defender uses to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident. |
| 79 | + |
| 80 | +## Incident correlation and merging |
| 81 | + |
| 82 | +Microsoft Defender XDR’s correlation activities don’t stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident. |
| 83 | + |
| 84 | +### How does Defender XDR make that determination? |
| 85 | + |
| 86 | +Defender XDR’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include: |
| 87 | + |
| 88 | +- Entities—assets like users, devices, mailboxes, and others |
| 89 | +- Artifacts—files, processes, email senders, and others |
| 90 | +- Time frames |
| 91 | +- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection. |
| 92 | + |
| 93 | +### When are incidents *not* merged? |
| 94 | + |
| 95 | +Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn’t merge the incidents under the following circumstances: |
| 96 | + |
| 97 | +- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened. |
| 98 | +- The two incidents eligible for merging are assigned to two different people. |
| 99 | +- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed. |
| 100 | +- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when enabled. |
| 101 | +- One of the incidents was created by a custom detection, and the other was not. |
| 102 | + |
| 103 | +### What happens when incidents are merged? |
| 104 | + |
| 105 | +When two or more incidents are merged, the contents of one incident are migrated into the other incident. A new incident is not created. The incident abandoned in the process is automatically deleted. If the abandoned incident originated in Microsoft Sentinel, it will be closed but not deleted. Any references to the closed or deleted incident are redirected to the consolidated incident. The contents of the incidents are handled in the following ways: |
| 106 | + |
| 107 | +- Alerts contained in the closed incident are moved to the consolidated incident. |
| 108 | +- Entities (assets etc.) follow the alerts they’re linked to. |
| 109 | +- Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident. |
| 110 | +- Comments and activity log entries in the abandoned incident are *not* moved to the new one. |
| 111 | + |
| 112 | +## Manual correlation |
| 113 | + |
| 114 | +While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot. |
| 115 | + |
| 116 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)] |
0 commit comments