Skip to content

Commit df951f7

Browse files
authored
Merge branch 'main' into patch-5
2 parents c58829d + f72b6a0 commit df951f7

8 files changed

+99
-4
lines changed

CloudAppSecurityDocs/network-requirements.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ To see which data center you're connecting to, do the following steps:
2828
To use Defender for Cloud Apps in the Microsoft Defender Portal, add **outbound port 443** for the following IP addresses and DNS names to your firewall's allowlist:
2929

3030
```ini
31+
cdn.cloudappsecurity.com
32+
cdn-discovery.cloudappsecurity.com
3133
adaproddiscovery.azureedge.net
3234
*.s-microsoft.com
3335
*.msecnd.net

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,8 @@
150150
items:
151151
- name: Incidents
152152
href: investigate-incidents.md
153+
- name: Unlink alerts from incidents
154+
href: unlink-alert-from-incident.md
153155
- name: Investigate data loss prevention alerts with Microsoft Defender XDR
154156
href: dlp-investigate-alerts-defender.md
155157
- name: Investigate data loss prevention alerts with Microsoft Sentinel

defender-xdr/alerts-incidents-correlation.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,12 @@ When alerts are generated by the various detection mechanisms in the Microsoft D
3737

3838
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
3939

40+
### Manual correlation of alerts
41+
42+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
43+
44+
For instructions, see [Link alerts to another incident in the Microsoft Defender portal](unlink-alert-from-incident.md).
45+
4046
## Incident correlation and merging
4147

4248
The Defender portal's correlation activities don't stop when incidents are created. Defender continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender merges the incidents into a single incident.
@@ -72,10 +78,6 @@ Even when the correlation logic indicates that two incidents should be merged, D
7278
- Merging the two incidents would raise the number of entities in the merged incident above the allowed maximum of 50 entities per incident.
7379
- The two incidents contain devices in different [device groups](/defender-endpoint/machine-groups) as defined by the organization. <br>(This condition is not in effect by default; it must be enabled.)
7480

75-
## Manual correlation
76-
77-
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
78-
7981
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
8082

8183
## Next steps
146 KB
Loading
23.4 KB
Loading
56.4 KB
Loading
17.7 KB
Loading
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
title: Link alerts to another incident in the Microsoft Defender portal
3+
description: Learn how to unlink one or more alerts from an incident in the Microsoft Defender portal, to correct false and/or missed correlations, and link the alerts to another (new or existing) incident, so you can investigate and remediate security threats more effectively.
4+
ms.service: defender-xdr
5+
ms.author: yelevin
6+
author: yelevin
7+
ms.localizationpriority: medium
8+
manager: raynew
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- tier2
13+
- usx-security
14+
- sentinel-only
15+
ms.topic: how-to
16+
ms.date: 11/21/2024
17+
search.appverid: met150
18+
appliesto:
19+
- Microsoft Defender XDR
20+
- Microsoft Sentinel in the Microsoft Defender portal
21+
---
22+
23+
# Link alerts to another incident in the Microsoft Defender portal
24+
25+
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you must link the alert either to another existing incident, or to a new incident that you create on the spot.
26+
27+
This article explains how to unlink alerts from one incident and link them to another.
28+
29+
## Prerequisites
30+
31+
- Users must have permissions to view the incidents queue.
32+
- Users must have read and write permissions on all the alerts they wish to move between incidents.
33+
34+
## Access the panel to unlink alerts
35+
36+
There are many ways to get to this panel. You can access it from anywhere you can select or take action on alerts. For example:
37+
38+
In any of the following locations, select one or more alerts by marking the checkboxes at the beginning of their rows. When one or more alerts are marked, the **Link alerts to another incident** button appears on the toolbar.
39+
40+
- The **Incidents** queue. Expand a given incident to reveal the alerts it contains.
41+
- The **Alerts** tab on the incident details page.
42+
- The **Alerts** queue.
43+
44+
Also, on the details panel on an alert details page, the **Link alerts to another incident** button always appears.
45+
46+
## Select the alert or alerts to unlink
47+
48+
1. Open one of the locations mentioned in the previous section.
49+
50+
1. Select the alert or alerts you want to move by marking the checkboxes at the beginning of their rows in the queue. When one or more alerts are marked, the **Link alerts to another incident** button appears on the toolbar.
51+
52+
:::image type="content" source="media/unlink-alert-from-incident/link-alert-to-another-incident-from-alerts-tab.png" alt-text="Screenshot of selecting alerts from the queue to move to another incident." lightbox="media/unlink-alert-from-incident/link-alert-to-another-incident-from-alerts-tab.png":::
53+
54+
1. Select **Link alerts to another incident** from the toolbar. A flyout panel opens. If you selected only one alert, the panel is labeled **Link alert to another incident**. If you selected two or more alerts, it's labeled **Link multiple alerts to another incident**. In all other respects, it's the same panel.
55+
56+
1. If the alert or alerts belong with another existing incident, select **Link to an existing incident**. Otherwise, select **Create a new incident**. Alerts must belong to an incident.
57+
58+
### Link alert or alerts to an existing incident
59+
60+
1. If you selected **Link to an existing incident**, a new text field, **Incident name or ID**, appears immediately following the selection. Begin typing the name or ID number of the incident you want to link the alert or alerts to. As you type, the list of available incidents is dynamically displayed and filtered by what you type. When you see the one you want in the list, select it.
61+
62+
:::image type="content" source="media/unlink-alert-from-incident/link-alert-to-existing-incident-select.png" alt-text="Screenshot of selecting an existing incident to move an alert to.":::
63+
64+
1. In the **Comment** field, type a comment explaining why you want to move the alerts.
65+
66+
:::image type="content" source="media/unlink-alert-from-incident/link-alert-to-existing-incident-save.png" alt-text="Screenshot of adding a comment explaining why moving an alert.":::
67+
68+
1. Select **Save** at the bottom of the panel to execute the move.
69+
70+
### Link alert or alerts to a new incident
71+
72+
1. If you selected **Create a new incident**, all you need to do then is enter a comment explaining why you want to move the alerts.
73+
74+
1. Select **Save** at the bottom of the panel to execute the move.
75+
76+
:::image type="content" source="media/unlink-alert-from-incident/link-alert-to-new-incident.png" alt-text="Screenshot of selecting a new incident to move an alert to.":::
77+
78+
When the process is completed, a new incident is created with the alert or alerts you moved to it. The incident is given a name automatically based on the name of the alert or alerts.
79+
80+
## Activity log
81+
82+
When an alert is correlated with an incident, a message is written to the incident's activity log, attesting that the alert was correlated with it. This message is written in either of the following circumstances:
83+
84+
- An alert is created and automatically correlated with a new or existing incident.
85+
- An alert is unlinked from one incident and linked to another. The message appears in the log of the destination incident.
86+
87+
## See also
88+
89+
- [Alert correlation and incident merging in the Microsoft Defender portal](alerts-incidents-correlation.md)

0 commit comments

Comments
 (0)