Skip to content

Commit a63ef1d

Browse files
committed
updates
1 parent 0f8bdbe commit a63ef1d

15 files changed

+32
-30
lines changed

defender-xdr/incident-queue.md

Lines changed: 30 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -32,35 +32,43 @@ The Microsoft Defender portal applies correlation analytics and aggregates relat
3232

3333
## Incident queue
3434

35-
The **Incident queue** shows a collection of incidents that were created across devices, users, mailboxes, and other resources. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision, a process known as incident triage.
35+
The **Incident queue** shows a queue of incidents that were created across devices, users, mailboxes, and other resources. It helps you triage the incidents, prioritize and create an informed cybersecurity response decision.
3636

37-
You can get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. Here's an example.
37+
Find the incident queue at **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
3838

39-
:::image type="content" source="./media/incidents-queue/incidents-ss-incidents.png" alt-text="Screenshot of the Incidents queue in the Microsoft Defender portal." lightbox="./media/incidents-queue/incidents-ss-incidents.png":::
39+
Select **Most recent incidents and alerts** to toggle a timeline chart of the number of alerts received and incidents created in the last 24 hours.
4040

41-
Select **Most recent incidents and alerts** to toggle the expansion of the top section, which shows a timeline graph of the number of alerts received and incidents created in the last 24 hours.
41+
:::image type="content" source="./media/incidents-queue/most-recent-incidents.png" alt-text="Screenshot of 24-hour incident graph." lightbox="./media/incidents-queue/most-recent-incidents.png":::
4242

43-
:::image type="content" source="./media/incidents-queue/incidents-ss-incidents2.png" alt-text="Screenshot of 24-hour incident graph." lightbox="./media/incidents-queue/incidents-ss-incidents2.png":::
43+
The incident queue includes Defender Queue Assistant that helps security teams cut through alert noise and focus on the incidents that matter most. By leveraging a new AI-based machine learning prioritization algorithm, the Queue Assistant surfaces the highest-priority incidents, explains the reasoning behind each score, and provides intuitive tools for sorting and filtering the incident queue. The priority score to each incident may be based on Microsoft native alerts, custom detections or third-party signals. The algorithm is trained on real-world anonymized data and considers the following data points when calculating the priority score:
44+
+ Attack disruption signals
45+
+ Threat analytics
46+
+ Severity
47+
+ SnR
48+
+ MITRE techniques
49+
+ Asset criticality
50+
+ Alert types and rarity
4451

45-
Below that, the incident queue in the Microsoft Defender portal displays incidents seen in the last six months. You can choose a different time frame by selecting it from the drop-down at the top. Incidents are arranged according to the latest automatic or manual updates made to an incident. You can arrange the incidents by **last update time** column to view incidents according to the latest automatic or manual updates made. You can also find the **total number of incidents** in the queue indicated beside the Search bar. The total number of incidents varies depending on the filters used in the queue.
52+
Incidents are automatically assigned a priority score from 0 to 100, with 100 being the highest priority. Score ranges are color-coded as follows:
53+
+ Red: Top priority (score > 85)
54+
+ Orange: Medium priority (15–85)
55+
+ Gray: Low priority (<15)
4656

47-
The incident queue has customizable columns that give you visibility into different characteristics of the incident or the impacted entities. This filtering helps you make an informed decision regarding the prioritization of incidents for analysis. Select **Customize columns** to perform the following customizations based on your preferred view:
57+
:::image type="content" source="./media/incidents-queue/incidents-page.png" alt-text="Screenshot of the Incidents queue in the Microsoft Defender portal." lightbox="./media/incidents-queue/incidents-page.png":::
4858

49-
- Check/uncheck the columns you want to see in the incident queue.
50-
- Arrange the order of the columns by dragging them.
5159

52-
:::image type="content" source="./media/incidents-queue/incidents-ss-incidents-3.png" alt-text="Screenshot of Incident page filter and column controls." lightbox="./media/incidents-queue/incidents-ss-incidents-3.png":::
60+
By default, the incident queue show incidents created in the last week. Choose a different time frame by selecting time selector drop-down above the queue.
5361

54-
The **Export** feature allows you to export the data in the incident queue that is displayed according to the applied filters and time ranges. It's available in the form of a button named **Export**, as displayed in the following screenshot:
62+
:::image type="content" source="./media/incidents-queue/time-selector.png" alt-text="Screenshot of the time selector for the incident queue." lightbox="./media/incidents-queue/time-selector.png":::
5563

56-
:::image type="content" source="./media/incidents-queue/incidents-queue-with-export-button.png" alt-text="Shows the Export button in the Incidents page of the Microsoft Defender portal":::
5764

58-
When you click the **Export** button, the data is exported to a CSV file. You can apply various filters and time ranges to the incidents queue (not just in the context of exporting the data, but in a generic context). When you select **Export**, whichever filters and/or time ranges are applied to the incidents queue, such data is exported to the CSV file.
65+
The **total number of incidents** in the queue is displayed next to the time selector. The number of incidents varies depending on the filters in use. You can search for incidents by name or incident ID
5966

60-
Once you export the incidents queue-related data onto the CSV file, you can analyze the data and filter it further, based on your requirements.
67+
Select **Customize columns** to select columns displayed in the queue. Check or uncheck the columns you want to see in the incident queue. Arrange the order of the columns by dragging them upa nd down.
6168

62-
> [!NOTE]
63-
> The maximum number of records you can export to a CSV file is 10,000.
69+
:::image type="content" source="./media/incidents-queue/incident-toolbar.png" alt-text="Screenshot of Incident page filter and column controls." lightbox="./media/incidents-queue/incident-toolbar.png":::
70+
71+
The **Export** button allows you to export the filtered data in the incident queue to a CSV file. The maximum number of records you can export to a CSV file is 10,000.
6472

6573
### Incident names
6674

@@ -77,19 +85,17 @@ We recommend that you avoid using the incident name as a condition for triggerin
7785

7886
The incident queue also provides multiple filtering options, that when applied, enable you to perform a broad sweep of all existing incidents in your environment, or decide to focus on a specific scenario or threat. Applying filters on the incident queue can help determine which incident requires immediate attention.
7987

80-
The **Filters** list above the list of incidents shows the currently applied filters.
88+
:::image type="content" source="./media/incidents-queue/incidents-filter-bar.png" alt-text="The incident queue filters list." lightbox="./media/incidents-queue/incidents-filter-bar.png":::
8189

82-
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
90+
The **Filters** list above the incident queue shows the current filters currently applied to the queue. Select **Add filter** to apply additional filters to limit the set of incidents shown.
8391

8492
:::image type="content" source="./media/incidents-queue/incident-filters-small.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal." lightbox="./media/incidents-queue/incident-filters.png":::
8593

86-
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
94+
Select the filters you want to use, then select **Add** The selected filters are shown along with the existing applied filters. Select the new filter to specify its conditions. For example, if you chose the "Service/detection sources" filter, select it to choose the sources by which to filter the list.
8795

88-
Now the filters you selected are shown along with the existing applied filters. Select the new filter to specify its conditions. For example, if you chose the "Service/detection sources" filter, select it to choose the sources by which to filter the list.
96+
You can remove a filter by selecting the **X** on the filter name in the filters list.
8997

90-
You can also see the **Filter** pane by selecting any of the filters in the **Filters** list above the list of incidents.
91-
92-
This table lists the filter names that are available.
98+
The following table lists the available filters.
9399

94100
| Filter name | Description/Conditions |
95101
|:-------|:-----|
@@ -117,7 +123,7 @@ This table lists the filter names that are available.
117123
118124
The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.
119125

120-
You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.
126+
121127

122128
You can also create filter sets within the incidents page by selecting **Saved filter queries > Create filter set**. If no filter sets have been created, select **Save** to create one.
123129

defender-xdr/investigate-incidents.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,9 @@ Within an incident, you analyze the alerts, understand what they mean, and colla
3434

3535
Before diving into the details, take a look at the properties and the entire attack story of the incident.
3636

37-
You can start by selecting the incident from the check mark column. Here's an example.
37+
You can start by selecting the incident from by selecting on the row, but not selecting the incident name. A summary pane opens with key information about the incident, including the priority assessment, the factors influencing the priority score, the incident's details, recommended actions, and related threats. Use the up and down arrows at the top of the pane to navigate to the previous or next incident in the incident queue.
3838

39-
:::image type="content" source="./media/investigate-incidents/incidents-ss-incident-select.png" alt-text="Selecting an incident in the Microsoft Defender portal" lightbox="./media/investigate-incidents/incidents-ss-incident-select.png":::
40-
41-
When you do, a summary pane opens with key information about the incident, like the incident's details, recommended actions, and related threats. Here's an example.
42-
43-
:::image type="content" source="./media/investigate-incidents/incident-pane-small.png" alt-text="The pane that displays the summary details for an incident in the Microsoft Defender portal." lightbox="./media/investigate-incidents/incident-pane.png":::
39+
:::image type="content" source="./media/investigate-incidents/incident-side-panel.png" alt-text="Selecting an incident in the Microsoft Defender portal" lightbox="./media/investigate-incidents/incident-side-panel.png":::
4440

4541
From here, you can select **Open incident page**. This opens the main page for the incident where you'll find the full attack story information and tabs for alerts, devices, users, investigations, and evidence. You can also open the main page for an incident by selecting the incident name from the incident queue.
4642

-23.6 KB
Loading
-71.8 KB
Loading
66 KB
Loading
91.1 KB
Loading
244 KB
Loading
Binary file not shown.
-22.5 KB
Binary file not shown.
-126 KB
Binary file not shown.

0 commit comments

Comments
 (0)