Skip to content

Commit 9303844

Browse files
authored
Merge pull request #4134 from MicrosoftDocs/diannegali-xdrfilters
updated filters for incident and alert queues
2 parents 4ad1445 + e1d384a commit 9303844

File tree

7 files changed

+10
-6
lines changed

7 files changed

+10
-6
lines changed

defender-xdr/incident-queue.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 01/27/2025
21+
ms.date: 06/04/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107107

108108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109109

110-
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110+
:::image type="content" source="/defender/media/incidents-queue/incident-filters-small.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/incident-filters.png":::
111111

112112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113113

@@ -128,7 +128,7 @@ This table lists the filter names that are available.
128128
| **Multiple category** | Specify whether the filter is for more than one category. |
129129
| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
130130
| **Entities** | Specify the name of an asset such as a user, device, mailbox, or application name. |
131-
| **Data sensitivity** | Some attacks focus on targeting to exfiltrate sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information has potentially been compromised and prioritize addressing those incidents. <br><br> This filter displays information only when you've applied [sensitivity labels from Microsoft Purview Information Protection](/Microsoft-365/compliance/sensitivity-labels). |
131+
| **Sensitivity label** | Filter incidents based on the sensitivity label applied on the data. Some attacks focus on exfiltrating sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information is potentially compromised and prioritize addressing those incidents. |
132132
| **Device groups** | Specify a [device group](/windows/security/threat-protection/microsoft-defender-atp/machine-groups) name. |
133133
| **OS platform** | Specify device operating systems. |
134134
| **Classification** | Specify the set of classifications of the related alerts. |

defender-xdr/investigate-alerts.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: how-to
1818
search.appverid:
1919
- MOE150
2020
- met150
21-
ms.date: 1/27/2025
21+
ms.date: 6/04/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -45,7 +45,7 @@ By default, the alerts queue in the Microsoft Defender portal displays the new a
4545

4646
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
4747

48-
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
48+
:::image type="content" source="/defender/media/investigate-alerts/alert-filters-small.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alert-filters.png":::
4949

5050
You can filter alerts according to these criteria:
5151

@@ -57,10 +57,12 @@ You can filter alerts according to these criteria:
5757
- Policy/Policy rule
5858
- Alert type
5959
- Product name
60+
- Alert subscription ID
6061
- Entities (the impacted assets)
6162
- Automated investigation state
6263
- Workspace
6364
- Data stream (workload or location)
65+
- Sensitivity label
6466

6567
> [!NOTE]
6668
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).

defender-xdr/whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@ You can also get product updates and important notifications through the [messag
4545
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
4646
- You can now view the details pane even for analytics rules.
4747
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
48+
- (GA) The **Sensitivity label** filter is now available in the **Incidents** and **Alerts** queues in the Microsoft Defender portal. This filter lets you filter incidents and alerts based on the sensitivity label assigned to the affected resources. For more information, see [Filters in the incident queue](incident-queue.md#filters-) and [Investigate alerts](investigate-alerts.md).
49+
4850

4951
## July 2025
5052
- (Preview) The [`GraphApiAuditEvents`](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
@@ -55,8 +57,8 @@ You can also get product updates and important notifications through the [messag
5557
- (Preview) Microsoft Copilot now provides suggested prompts as part of incident summaries in the Microsoft Defender portal. Suggested prompts help you get more insights into the specific assets involved in an incident. For more information, see [Summarize incidents with Microsoft Copilot in Microsoft Defender](security-copilot-m365d-incident-summary.md).
5658
- (GA) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you're already in Microsoft Defender.
5759

58-
5960
## May 2025
61+
6062
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
6163
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
6264
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
45 KB
Loading
109 KB
Loading
29 KB
Loading
70.8 KB
Loading

0 commit comments

Comments
 (0)