Skip to content

Commit e42b8c4

Browse files
committed
Images
1 parent 0a89306 commit e42b8c4

9 files changed

+9
-10
lines changed

defender-xdr/advanced-hunting-defender-results.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,16 @@ You can use the link to incident feature to add advanced hunting query results t
5151
### Link results to new or existing incidents
5252

5353
1. In the advanced hunting query pane, enter your query in the query field provided, then select **Run query** to get your results.
54-
[IMAGE]
54+
:::image type="content" source="/defender/media/advanced-hunting-results-link1.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link1.png":::
5555

5656
2. In the Results pane, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
57-
[IMAGE]
57+
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
5858

5959
3. In the **Alert details** section in the Link to incident pane, select **Create new incident** to convert the events to alerts and group them to a new incident:
6060
[IMAGE]
6161

6262
You can also select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
63-
[IMAGE]
63+
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
6464
4. For either selection, provide the following details, then select **Next**:
6565
- **Alert title** - a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
6666
- **Severity** - choose the severity applicable to the group of alerts
@@ -101,11 +101,11 @@ You can use the link to incident feature to add advanced hunting query results t
101101

102102
After selecting the identifier, select a column from the query results’ that contains the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
103103

104-
[IMAGE]
104+
:::image type="content" source="/defender/media/advanced-hunting-results-link5.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link5.png":::
105105

106106
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient’s mailbox and recipient’s account are the impacted entities, and the sender’s IP as well as mail message are related evidence.
107107

108-
[IMAGE]
108+
:::image type="content" source="/defender/media/advanced-hunting-results-link6.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link6.png":::
109109

110110
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipients mailboxes and recipient object ids combinations, for instance, then three alerts are created and linked to the chosen incident.
111111

@@ -116,20 +116,19 @@ You can use the link to incident feature to add advanced hunting query results t
116116
### View linked records in the incident
117117
You can click on the generated link from the summary step of the wizard or select the incident name from the incidents’ queue, to view the incident that the events are linked to.
118118

119-
[IMAGE]
119+
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
120120

121121
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
122122
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
123123

124124
You can also select the event from the timeline view or from the query results view to open the Inspect record pane.
125-
126-
[IMAGE]
125+
126+
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
127127

128128
### Filter for events added using advanced hunting
129129
You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by Manual detection source
130130

131-
[IMAGE]
132-
131+
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
133132

134133

135134

275 KB
Loading
223 KB
Loading
134 KB
Loading
92.5 KB
Loading
123 KB
Loading
87.6 KB
Loading
123 KB
Loading
174 KB
Loading

0 commit comments

Comments
 (0)