You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/incident-queue.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 01/27/2025
21
+
ms.date: 06/04/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107
107
108
108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109
109
110
-
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110
+
:::image type="content" source="/defender/media/incidents-queue/incident-filters-small.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/incident-filters.png":::
111
111
112
112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113
113
@@ -128,7 +128,7 @@ This table lists the filter names that are available.
128
128
|**Multiple category**| Specify whether the filter is for more than one category. |
129
129
|**Categories**| Choose categories to focus on specific tactics, techniques, or attack components seen. |
130
130
|**Entities**| Specify the name of an asset such as a user, device, mailbox, or application name. |
131
-
|**Data sensitivity**| Some attacks focus on targeting to exfiltrate sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information has potentially been compromised and prioritize addressing those incidents. <br><br> This filter displays information only when you've applied [sensitivity labels from Microsoft Purview Information Protection](/Microsoft-365/compliance/sensitivity-labels). |
131
+
|**Sensitivity label**|Filter incidents based on the sensitivity label applied on the data. Some attacks focus on exfiltrating sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information is potentially compromised and prioritize addressing those incidents. |
132
132
|**Device groups**| Specify a [device group](/windows/security/threat-protection/microsoft-defender-atp/machine-groups) name. |
Copy file name to clipboardExpand all lines: defender-xdr/investigate-alerts.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- met150
21
-
ms.date: 1/27/2025
21
+
ms.date: 6/04/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -45,7 +45,7 @@ By default, the alerts queue in the Microsoft Defender portal displays the new a
45
45
46
46
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
47
47
48
-
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
48
+
:::image type="content" source="/defender/media/investigate-alerts/alerts-filters-small.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-filters.png":::
49
49
50
50
You can filter alerts according to these criteria:
51
51
@@ -57,10 +57,12 @@ You can filter alerts according to these criteria:
57
57
- Policy/Policy rule
58
58
- Alert type
59
59
- Product name
60
+
- Alert subscription ID
60
61
- Entities (the impacted assets)
61
62
- Automated investigation state
62
63
- Workspace
63
64
- Data stream (workload or location)
65
+
- Sensitivity label
64
66
65
67
> [!NOTE]
66
68
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
0 commit comments