Skip to content

Commit b18bd0b

Browse files
authored
Merge branch 'main' into docs-editor/mto-troubleshoot-1743674077
2 parents f011443 + 7110ab7 commit b18bd0b

18 files changed

+167
-70
lines changed

defender-xdr/advanced-hunting-devicenetworkinfo-table.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: reference
21-
ms.date: 01/16/2024
21+
ms.date: 04/03/2025
2222
---
2323

2424
# DeviceNetworkInfo
@@ -57,6 +57,8 @@ For information on other tables in the advanced hunting schema, [see the advance
5757
| `IPAddresses` | `string` | JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and IP address space, such as public, private, or link-local |
5858
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
5959
| `NetworkAdapterVendor` | `string` | Name of the manufacturer or vendor of the network adapter |
60+
| `OnboardingStatus` | `string` | Indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or if the device is not supported |
61+
| `NetworkAdapterDnsSuffix` | `string` | Domain suffix assigned to the device’s network adapter, indicating the network environment the network adapter is connected to |
6062

6163
## Related topics
6264
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/alerts-incidents-correlation.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Alert correlation and incident merging in the Microsoft Defender portal
3-
description: Learn how alerts are correlated, and how and why incidents may be merged, in the Microsoft Defender portal.
3+
description: Learn how alerts are correlated, and how and why incidents might be merged, in the Microsoft Defender portal.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 02/02/2025
21+
ms.date: 03/17/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -37,6 +37,10 @@ When alerts are generated by the various detection mechanisms in the Microsoft D
3737

3838
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
3939

40+
### Alert correlation by workspace
41+
42+
The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. A primary workspace's alerts are correlated with Microsoft Defender XDR data. So, incidents include alerts from Microsoft Sentinel's primary workspace and Defender XDR in a unified queue. All other onboarded workspaces are considered secondary workspaces. For secondary workspaces, incidents are created based on the workspace’s data and won't include Defender XDR data. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579).
43+
4044
### Manual correlation of alerts
4145

4246
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.

defender-xdr/whats-new.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ You can also get product updates and important notifications through the [messag
3535

3636
## April 2025
3737
- (Preview) The [OAuthAppInfo](advanced-hunting-oauthappinfo-table.md) table is now available for preview in advanced hunting. The table contains information about Microsoft 365-connected OAuth applications registered with Microsoft Entra ID and available in the Defender for Cloud Apps app governance capability.
38+
- The `OnboardingStatus` and `NetworkAdapterDnsSuffix` columns are now available in the [`DeviceNetworkInfo`](advanced-hunting-devicenetworkinfo-table.md) table in advanced hunting.
39+
40+
3841
## March 2025
3942

4043
- (Preview) The incident description has moved within the incident page. The incident description is now displayed after the incident details. For more information, see [Incident details](investigate-incidents.md#incident-details).
314 KB
Loading
145 KB
Loading
183 KB
Loading
30.3 KB
Loading
395 KB
Loading
-44.6 KB
Loading
346 KB
Loading

0 commit comments

Comments
 (0)