Skip to content

Commit 942e121

Browse files
Merge pull request #3882 from MicrosoftDocs/main
[AutoPublish] main to live - 05/23 15:32 PDT | 05/24 04:02 IST
2 parents 84eedad + 6dd0f84 commit 942e121

File tree

2 files changed

+32
-32
lines changed

2 files changed

+32
-32
lines changed

defender-xdr/dlp-investigate-alerts-defender.md

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -16,30 +16,28 @@ ms.topic: how-to
1616
search.appverid:
1717
- MOE150
1818
- met150
19-
ms.date: 11/14/2023
19+
ms.date: 05/23/2025
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
---
2124

2225
# Investigate data loss prevention alerts with Microsoft Defender XDR
2326

2427
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2528

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
30-
You can manage Microsoft Purview Data Loss Prevention (DLP) alerts in the Microsoft Defender portal. Open **Incidents & alerts** \> **Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. From this page, you can:
29+
You can manage and respond to Microsoft Purview Data Loss Prevention (DLP) alerts and incidents in the Microsoft Defender portal. Open **Incidents & alerts** \> **Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. From this page, you can:
3130

3231
- View all your DLP alerts grouped under incidents in the Microsoft Defender XDR incident queue.
33-
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.
34-
- Hunt for compliance logs along with security under Advanced Hunting.
35-
- In-place admin remediation actions on user, file, and device.
32+
- View DLP alerts correlated with other DLP alerts, or with alerts from other solutions (Defender for Endpoint, Defender for Office 365, Microsoft Sentinel, and so on), under a single incident.
33+
- Hunt for security threats, using queries combining compliance logs with security logs, under Advanced Hunting.
34+
- Take remediation actions in-place on users, files, and devices.
3635
- Associate custom tags to DLP incidents and filter by them.
37-
- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.
36+
- Filter the unified incident queue by DLP policy name, tag, date, service source, incident status, and user.
3837

39-
> [!TIP]
40-
> You can also pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation with the Microsoft Defender XDR connector in Microsoft Sentinel.
38+
## Prerequisites
4139

42-
## Licensing requirements
40+
### Licensing requirements
4341

4442
To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft Defender portal, you need a license from one of the following subscriptions:
4543

@@ -51,17 +49,18 @@ To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft
5149
> [!NOTE]
5250
> When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft Defender XDR. If you don't want DLP alerts to flow into Defender, open a support case to disable this feature. If you disable this feature DLP alerts will surface in the Defender portal as Microsoft Defender for Office alerts.
5351
54-
## Roles
52+
### Roles
5553

5654
It's best practice to only grant minimal permissions to alerts in the Microsoft Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
5755

58-
|Permission |Defender Alert Access |
59-
|---------|---------|
60-
|Manage Alerts | DLP + Security |
61-
|View-Only Manage Alerts |DLP + Security |
62-
|Information Protection Analyst |DLP only |
63-
|DLP Compliance Management |DLP only |
64-
|View-Only DLP Compliance Management |DLP only |
56+
| Permission | Defender Alert Access |
57+
| ---------- | --------- |
58+
| Manage Alerts | DLP + Security |
59+
| View-Only Manage Alerts | DLP + Security |
60+
| Information Protection Analyst | DLP only |
61+
| DLP Compliance Management | DLP only |
62+
| View-Only DLP Compliance Management | DLP only |
63+
6564

6665
## Before you start
6766

@@ -70,15 +69,15 @@ It's best practice to only grant minimal permissions to alerts in the Microsoft
7069
> [!NOTE]
7170
> [Administrative units](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units) restrictions flow from data loss prevention (DLP) into the Defender portal. If you are an administrative unit restricted admin, you'll only see the DLP alerts for your administrative unit.
7271
72+
73+
7374
<a name='investigate-dlp-alerts-in-the-microsoft-365-defender-portal'></a>
7475

7576
## Investigate DLP alerts in the Microsoft Defender portal
7677

7778
1. Go to the Microsoft Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
7879

79-
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts. Here's a few examples of the subfilters that are available in preview:
80-
1. by user and device names
81-
1. (in preview) In the **Entities** filter, you can search on file names, user, device names, and file paths.
80+
1. Select **Add filter** on the toolbar, and choose the **Service/detection sources** filter. Then select that filter and choose **Microsoft Data Loss Prevention** to view all incidents with DLP alerts. You can also filter the queue by user and device names (using the **Entities** filter) and by policies, using the **Policy/policy rule** filter, you can search on file names, user, device names, and file paths.
8281
1. (in preview) In the **Incidents** queue > **Alert policies** > Alert policy title. You can search on the DLP policy name.
8382

8483
1. Search for the DLP policy name of the alerts and incidents you're interested in.
@@ -106,7 +105,7 @@ The **CloudAppEvents** table contains all audit logs across all locations like S
106105

107106
If you're new to advanced hunting, you should review [Get started with advanced hunting](advanced-hunting-overview.md).
108107

109-
Before you can use advance hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps) that contains the Microsoft Purview data.
108+
Before you can use advanced hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps) that contains the Microsoft Purview data.
110109

111110
#### Using built in queries
112111

defender-xdr/investigate-alerts.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,12 @@ ms.collection:
1616
ms.custom: admindeeplinkDEFENDER
1717
ms.topic: conceptual
1818
search.appverid:
19-
- MOE150
20-
- met150
21-
ms.date: 3/25/2025
22-
appliesto:
19+
- MOE150
20+
- met150
21+
ms.date: 1/27/2025
22+
appliesto:
2323
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2425
---
2526

2627
# Investigate alerts in Microsoft Defender XDR
@@ -30,11 +31,11 @@ appliesto:
3031
> [!NOTE]
3132
> This article describes security alerts in Microsoft Defender XDR. However, you can use alert policies to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Alert policies in the Microsoft Defender portal](alert-policies.md).
3233
33-
Alerts are the basis of all incidents and indicate the occurrence of malicious or suspicious events in your environment. Alerts are typically part of a broader attack and provide clues about an incident.
34+
Alerts are signals that result from various threat detection activities. These signals are produced by the many security services that reside in the Microsoft Defender portal, and they indicate the occurrence of malicious or suspicious events in your environment.
3435

35-
In Microsoft Defender XDR, related alerts are aggregated together to form [incidents](incidents-overview.md). Incidents will always provide the broader context of an attack, however, analyzing alerts can be valuable when deeper analysis is required.
36+
These suspicious events are typically part of a broader attack story. In the Microsoft Defender portal, alerts represent individual pieces of evidence that Defender XDR correlates together to form [incidents](incidents-overview.md). Incidents tell the whole attack story; however, analyzing alerts can be valuable when deeper analysis is required.
3637

37-
The **Alerts queue** shows the current set of alerts. You get to the alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
38+
The **Alerts queue** shows the current set of alerts. You can view the entire alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139). You can also see the alerts for each incident on the **incidents queue**, and on each individual incident's page, on the **Alerts** tab.
3839

3940
:::image type="content" source="/defender/media/investigate-alerts/alerts-page-defender-small.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-page-defender.png":::
4041

0 commit comments

Comments
 (0)