Skip to content

Commit 9168554

Browse files
Merge pull request #590 from MicrosoftDocs/main
publish main to live 3:30 PM 5/30/24
2 parents 7bcb91d + 88f2543 commit 9168554

File tree

5 files changed

+125
-3
lines changed

5 files changed

+125
-3
lines changed

defender-office-365/submissions-admin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In Microsoft 365 organizations with Exchange Online mailboxes, admins can use th
3939

4040
After an admin submits the message from the **User reported** tab, an entry is also created on the corresponding tab on the **Submissions** page (for example, the **Emails** tab). These types of admin submissions are described in the [Admin options for user reported messages](#admin-options-for-user-reported-messages) section.
4141

42-
When admins submit messages or sends user report to Microsoft for analysis, we do the following checks:
42+
When admins or users submit messages to Microsoft for analysis, we do the following checks:
4343

4444
- **Email authentication check** (email messages only): Whether email authentication passed or failed when it was delivered.
4545
- **Policy hits**: Information about any policies or overrides that might have allowed or blocked the incoming email into the organization, thus overriding our filtering verdicts.
@@ -845,7 +845,7 @@ For email messages, admins can see what users are reporting on the **User report
845845

846846
**Notes**:
847847

848-
- User reported messages that are sent to Microsoft only or to Microsoft and the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) appear on the **User reported** tab. Although these messages have already been reported to Microsoft, admins can resubmit the reported messages.
848+
- User reported messages that are sent to Microsoft only or to Microsoft and the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) appear on the **User reported** tab.
849849
- User reported messages that are sent only to the reporting mailbox appear on the **User reported** tab with the **Result** value **Not Submitted to Microsoft**. Admins should report these messages to Microsoft for analysis.
850850

851851
In organizations with Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5), admins can also see [user reported messages in Microsoft Teams in Defender for Office 365 Plan 2](submissions-teams.md) (currently in Preview).

defender-office-365/submissions-users-report-message-add-in-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ After the add-in is installed and enabled, users see the following icons based o
9393
- Outlook included with Microsoft 365 apps for Enterprise
9494
- Outlook for iOS and Android
9595

96-
- Currently, reporting messages in shared mailboxes or other mailboxes by a delegate using the add-ins isn't supported. Messages aren't sent to the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) or to Microsoft. Built-in reporting in Outlook on the web in shared mailboxes or other mailboxes by a delegate is supported. Messages are sent to the reporting mailbox or to Microsoft.
96+
- Currently, reporting messages in shared mailboxes or other mailboxes by a delegate using the add-ins isn't supported. Messages aren't sent to the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) or to Microsoft. Built-in reporting in Outlook on the web or the new Outlook for Windows in shared mailboxes or other mailboxes by a delegate is supported. Messages are sent according to the reported message destination in user reported settings.
9797

9898
- The add-ins aren't available for on-premises Exchange mailboxes.
9999

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,10 @@ This article describes how admins can manage entries for email senders in the Mi
4545

4646
- Entries for spoofed senders never expire.
4747

48+
- For blocking inbound and outbound email from a domain, any subdomains in that domain, and any email addresses in that domain, create the block entry using the syntax: `*.TLD`, where `TLD` can be any top-level domain, interal domain, or email address domain.
49+
50+
- For blocking inbound and outbound email from a sudomain in a domain and any email addresses in that subdomain, create the block entry using the syntax: `*.SD1.TLD`, `*.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, etc. for internal domains and email address domains.
51+
4852
- For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
4953

5054
- An entry should be active within 5 minutes.

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,8 @@
158158
items:
159159
- name: Overview
160160
href: incident-response-overview.md
161+
- name: Alerts, incidents, and correlation
162+
href: alerts-incidents-correlation.md
161163
- name: Investigate and respond with Microsoft Copilot in Microsoft Defender
162164
items:
163165
- name: Overview
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Alerts, incidents, and correlation in Microsoft Defender XDR
3+
description: Learn how alerts and incidents are correlated in Microsoft Defender XDR.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: yelevin
8+
author: yelevin
9+
ms.localizationpriority: medium
10+
manager: dansimp
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- usx-security
15+
- tier1
16+
ms.topic: conceptual
17+
search.appverid:
18+
- MOE150
19+
- MET150
20+
ms.date: 05/30/2024
21+
appliesto:
22+
- Microsoft Defender XDR
23+
- Microsoft Sentinel in the Microsoft Defender portal
24+
---
25+
26+
# Alerts, incidents, and correlation in Microsoft Defender XDR
27+
28+
In Microsoft Defender XDR, ***alerts*** are signals from a collection of sources that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment. Alerts can often be part of a broader, complex attack story, and related alerts are aggregated and correlated together to form ***incidents*** that represent these attack stories.
29+
30+
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
31+
32+
Here is a summary of the main attributes of incidents and alerts, and the differences between them:
33+
34+
**Incidents:**
35+
36+
- Are the main "unit of measure" of the work of the Security Operations Center (SOC).
37+
- Display the broader context of an attack—the **attack story**.
38+
- Represent "case files" of all the information needed to investigate the threat and the findings of the investigation.
39+
- Are created by Microsoft Defender XDR to contain at least one alert, and in many cases, contain many alerts.
40+
- Trigger automatic series of responses to the threat, using [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules?tabs=onboarded), [attack disruption](automatic-attack-disruption.md), and [playbooks](/azure/sentinel/automation/automate-responses-with-playbooks).
41+
- Record all activity related to the threat and its investigation and resolution.
42+
43+
**Alerts:**
44+
45+
- Represent the individual pieces of the story that are essential to understanding and investigating the incident.
46+
- Are created by many different sources both internal and external to the Defender portal.
47+
- Can be analyzed by themselves to add value when deeper analysis is required.
48+
- Can trigger [automatic investigations and responses](m365d-autoir.md) at the alert level, to minimize the potential threat impact.
49+
50+
## Alert sources
51+
52+
Microsoft Defender XDR alerts can come from many sources:
53+
54+
- Solutions that are part of Microsoft Defender XDR
55+
- Microsoft Defender for Endpoint
56+
- Microsoft Defender for Office 365
57+
- Microsoft Defender for Identity
58+
- Microsoft Defender for Cloud Apps
59+
- The app governance add-on for Microsoft Defender for Cloud Apps
60+
- Microsoft Entra ID Protection
61+
- Microsoft Data Loss Prevention
62+
63+
- Other services that have integrations with the Microsoft Defender security portal
64+
- Microsoft Sentinel
65+
- Microsoft Defender for Cloud
66+
67+
When alerts from different sources are displayed together, each alert's source is indicated by sets of characters prepended to the alert ID. The [**Alert sources**](investigate-alerts.md#alert-sources) table maps the alert sources to the alert ID prefix.
68+
69+
## Incident creation and alert correlation
70+
71+
When alerts are generated by the various detection mechanisms in the Microsoft Defender security portal, Defender XDR places them into new or existing incidents according to the following logic:
72+
73+
| Scenario | Decision |
74+
| -------- | -------- |
75+
| The alert is sufficiently unique across all alert sources within a particular time frame. | Defender XDR creates a new incident and adds the alert to it. |
76+
| The alert is sufficiently related to other alerts—from the same source or across sources—within a particular time frame. | Defender XDR adds the alert to an existing incident. |
77+
78+
The criteria Microsoft Defender uses to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
79+
80+
## Incident correlation and merging
81+
82+
Microsoft Defender XDR’s correlation activities don’t stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident.
83+
84+
### How does Defender XDR make that determination?
85+
86+
Defender XDR’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include:
87+
88+
- Entities—assets like users, devices, mailboxes, and others
89+
- Artifacts—files, processes, email senders, and others
90+
- Time frames
91+
- Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
92+
93+
### When are incidents *not* merged?
94+
95+
Even when the correlation logic indicates that two incidents should be merged, Defender XDR doesn’t merge the incidents under the following circumstances:
96+
97+
- One of the incidents has a status of "Closed". Incidents that are resolved don’t get reopened.
98+
- The two incidents eligible for merging are assigned to two different people.
99+
- Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
100+
- The two incidents contain devices in different device groups as defined by the organization. This criterion is in effect only when enabled.
101+
- One of the incidents was created by a custom detection, and the other was not.
102+
103+
### What happens when incidents are merged?
104+
105+
When two or more incidents are merged, the contents of one incident are migrated into the other incident. A new incident is not created. The incident abandoned in the process is automatically deleted. If the abandoned incident originated in Microsoft Sentinel, it will be closed but not deleted. Any references to the closed or deleted incident are redirected to the consolidated incident. The contents of the incidents are handled in the following ways:
106+
107+
- Alerts contained in the closed incident are moved to the consolidated incident.
108+
- Entities (assets etc.) follow the alerts they’re linked to.
109+
- Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident.
110+
- Comments and activity log entries in the abandoned incident are *not* moved to the new one.
111+
112+
## Manual correlation
113+
114+
While Microsoft Defender XDR already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
115+
116+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)