Skip to content

Commit e7577be

Browse files
committed
updated filters for incident and alert queues
1 parent 32edcb3 commit e7577be

File tree

6 files changed

+7
-5
lines changed

6 files changed

+7
-5
lines changed

defender-xdr/incident-queue.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 01/27/2025
21+
ms.date: 06/04/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107107

108108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109109

110-
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110+
:::image type="content" source="/defender/media/incidents-queue/incident-filters-small.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/incident-filters.png":::
111111

112112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113113

@@ -128,7 +128,7 @@ This table lists the filter names that are available.
128128
| **Multiple category** | Specify whether the filter is for more than one category. |
129129
| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
130130
| **Entities** | Specify the name of an asset such as a user, device, mailbox, or application name. |
131-
| **Data sensitivity** | Some attacks focus on targeting to exfiltrate sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information has potentially been compromised and prioritize addressing those incidents. <br><br> This filter displays information only when you've applied [sensitivity labels from Microsoft Purview Information Protection](/Microsoft-365/compliance/sensitivity-labels). |
131+
| **Sensitivity label** | Filter incidents based on the sensitivity label applied on the data. Some attacks focus on exfiltrating sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information is potentially compromised and prioritize addressing those incidents. |
132132
| **Device groups** | Specify a [device group](/windows/security/threat-protection/microsoft-defender-atp/machine-groups) name. |
133133
| **OS platform** | Specify device operating systems. |
134134
| **Classification** | Specify the set of classifications of the related alerts. |

defender-xdr/investigate-alerts.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- met150
21-
ms.date: 1/27/2025
21+
ms.date: 6/04/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -45,7 +45,7 @@ By default, the alerts queue in the Microsoft Defender portal displays the new a
4545

4646
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
4747

48-
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
48+
:::image type="content" source="/defender/media/investigate-alerts/alerts-filters-small.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-filters.png":::
4949

5050
You can filter alerts according to these criteria:
5151

@@ -57,10 +57,12 @@ You can filter alerts according to these criteria:
5757
- Policy/Policy rule
5858
- Alert type
5959
- Product name
60+
- Alert subscription ID
6061
- Entities (the impacted assets)
6162
- Automated investigation state
6263
- Workspace
6364
- Data stream (workload or location)
65+
- Sensitivity label
6466

6567
> [!NOTE]
6668
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
45 KB
Loading
109 KB
Loading
29 KB
Loading
70.8 KB
Loading

0 commit comments

Comments
 (0)