Skip to content

Commit acc75b8

Browse files
committed
addressed comments
1 parent a46c508 commit acc75b8

File tree

5 files changed

+21
-15
lines changed

5 files changed

+21
-15
lines changed

defender-endpoint/view-incidents-queue.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,15 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 07/01/2024
18+
ms.date: 01/06/2025
1919
---
2020

2121
# View and organize the Microsoft Defender for Endpoint Incidents queue
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

2525
**Applies to:**
26+
2627
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2728
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2829
- [Microsoft Defender XDR](/defender-xdr)
@@ -31,12 +32,13 @@ ms.date: 07/01/2024
3132
3233
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
3334

34-
By default, the queue displays incidents seen in the last 6 months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35+
By default, the queue displays incidents seen in the last six months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
3536

3637
There are several options you can choose from to customize the Incidents queue view.
3738

3839
On the top navigation you can:
39-
- Customize columns to add or remove columns
40+
41+
- Customize columns to add or remove columns
4042
- Modify the number of items to view per page
4143
- Select the items to show per page
4244
- Batch-select the incidents to assign
@@ -47,9 +49,10 @@ On the top navigation you can:
4749
:::image type="content" source="media/atp-incident-queue.png" alt-text="The Incidents queue" lightbox="media/atp-incident-queue.png":::
4850

4951
> [!TIP]
50-
> **Defender Boxed** appears for a limited time during January and July of each year. It's a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year. Learn how you can share your [Defender Boxed](/defender-xdr/incident-queue#defender-boxed) highlights.
52+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
5153
5254
## Sort and filter the incidents queue
55+
5356
You can apply the following filters to limit the list of incidents and get a more focused view.
5457

5558
### Severity
@@ -58,31 +61,36 @@ Incident severity | Description
5861
:---|:---
5962
High </br>(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on devices.
6063
Medium </br>(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages.
61-
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization.
64+
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that don't necessarily indicate an advanced threat targeting the organization.
6265
Informational </br>(Grey) | Informational incidents might not be considered harmful to the network but might be good to keep track of.
6366

6467
## Assigned to
68+
6569
You can choose to filter the list by selecting assigned to anyone or ones that are assigned to you.
6670

6771
### Category
72+
6873
Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context.
6974

7075
### Status
76+
7177
You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved.
7278

7379
### Data sensitivity
80+
7481
Use this filter to show incidents that contain sensitivity labels.
7582

7683
## Incident naming
7784

78-
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
85+
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories.
7986

8087
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
8188

8289
> [!NOTE]
83-
> Incidents that existed prior the rollout of automatic incident naming will retain their name.
90+
> Incidents that existed prior to the rollout of automatic incident naming retains their original name.
8491
8592
## See also
93+
8694
- [Incidents queue](view-incidents-queue.md)
8795
- [Manage incidents](manage-incidents.md)
8896
- [Investigate incidents](investigate-incidents.md)

defender-xdr/incidents-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The Microsoft Defender portal includes tools and methods to automate or otherwis
7575
| **[Harness AI with Microsoft Copilot for Security](/defender-xdr/security-copilot-in-microsoft-365-defender)** | Add AI to support analysts with complex and time-consuming daily workflows. For example, Microsoft Copilot for Security can help with end-to-end incident investigation and response by providing clearly described attack stories, step-by-step actionable remediation guidance and incident activity summarized reports, natural language KQL hunting, and expert code analysis&mdash;optimizing on SOC efficiency across data from all sources. <br><br>This capability is in addition to the other AI-based functionality that Microsoft Sentinel brings to the unified platform, in the areas of user and entity behavior analytics, anomaly detection, multi-stage threat detection, and more. |
7676

7777
> [!TIP]
78-
> **Defender Boxed** appears for a limited time during January and July of each year. It's a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
78+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
7979
8080
## Related items
8181

defender-xdr/investigate-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ Some incidents might have similar incidents listed on the **Similar incidents**
255255
:::image type="content" source="/defender/media/investigate-incidents/incident-similartab-small.png" alt-text="Screenshot that shows the Similar incidents tab for an incident in the Microsoft Defender portal." lightbox="/defender/media/investigate-incidents/incident-similartab.png":::
256256

257257
> [!TIP]
258-
> **Defender Boxed** appears for a limited time during January and July of each year. It's a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
258+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
259259
260260
## Next steps
261261

defender-xdr/manage-incidents.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,17 +50,15 @@ This article shows you how to perform various incident management tasks associat
5050
- [Specify an incident's classification](#specify-the-incidents-classification).
5151
- [Add comments to an incident](#add-comments-to-an-incident).
5252

53-
> [!TIP]
54-
> **Defender Boxed** appears for a limited time during January and July of each year. It's a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
55-
56-
Here are the ways you can manage your incidents:
57-
=======
5853
**[Incident logging and reporting:](#incident-logging-and-reporting)**
5954

6055
- [Edit the incident name](#edit-the-incident-name).
6156
- Assess the activity audit and add comments in the [Activity log](#view-the-activity-log-of-an-incident).
6257
- [Export incident data to PDF](#export-incident-data-to-pdf).
6358

59+
> [!TIP]
60+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
61+
6462
## Access the *Manage incident* pane
6563

6664
Most of these tasks are accessible from the **Manage incident** pane for an incident. You can reach this pane from any of several locations.

defender-xdr/respond-first-incident-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Learn how to classify incidents and alerts through this video:
8989
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4LHJq]
9090
9191
> [!TIP]
92-
> **Defender Boxed** appears for a limited time during January and July of each year. It's a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
92+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
9393
9494
## Next steps
9595

0 commit comments

Comments
 (0)