Skip to content

Commit eb2e08c

Browse files
committed
Adding removed sections from incident overview
1 parent 803cc08 commit eb2e08c

File tree

3 files changed

+96
-2
lines changed

3 files changed

+96
-2
lines changed

defender-xdr/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,15 +79,17 @@
7979
- name: Investigate and respond to threats
8080
items:
8181
- name: Overview
82-
href: incidents-overview.md
82+
href: incidents-overview.md
8383
- name: Correlation and merging
8484
href: alerts-incidents-correlation.md
8585
- name: Prioritize incidents
8686
href: incident-queue.md
8787
- name: Manage incidents
8888
href: manage-incidents.md
89-
- name: Investigate incidents
89+
- name: Investigate and respond to incidents
9090
items:
91+
- name: Plan incident response
92+
href: plan-incident-response.md
9193
- name: Incidents
9294
href: investigate-incidents.md
9395
- name: Move alerts to another incident

defender-xdr/manage-incidents.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,16 @@ To generate the PDF, perform the following steps:
342342

343343
The report is cached for a couple of minutes. The system provides the previously generated PDF if you try to export the same incident again within a short time frame. To generate a newer version of the PDF, wait for a few minutes for the cache to expire.
344344

345+
## Set up email notifications for incidents
346+
347+
You can set up the Microsoft Defender portal to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
348+
349+
- Alert severity
350+
- Alert sources
351+
- Device group
352+
353+
To set up email notifications for incidents, see [get email notifications on incidents](m365d-notifications-incidents.md).
354+
345355
## Next steps
346356

347357
For new and in-process incidents, continue your [incident investigation](investigate-incidents.md).
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Incidents and alerts in the Microsoft Defender portal
3+
description: An introduction to incidents and alerts, and the differences between them, in the Microsoft Defender portal.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: yelevin
8+
author: yelevin
9+
ms.localizationpriority: medium
10+
manager: raynew
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- usx-security
16+
- sentinel-only
17+
ms.custom: admindeeplinkDEFENDER
18+
ms.topic: conceptual
19+
search.appverid:
20+
- MOE150
21+
- MET150
22+
ms.date: 11/14/2024
23+
appliesto:
24+
- Microsoft Defender XDR
25+
- Microsoft Sentinel in the Microsoft Defender portal
26+
---
27+
28+
# Plan an incident response workflow in the Microsoft Defender portal
29+
30+
In the Microsoft Defender portal, you can respond to security incidents that are automatically created from alerts. These incidents are collections of related alerts that tell the full story of an attack. The alerts in a single incident might come from all Microsoft security and compliance solutions, as well as from vast numbers of external solutions collected through Microsoft Sentinel and Microsoft Defender for Cloud.
31+
32+
## Incident response workflow example in the Microsoft Defender portal
33+
34+
Here's a workflow example for responding to incidents in Microsoft 365 with the Microsoft Defender portal.
35+
36+
:::image type="content" source="/defender/media/incidents-overview/incidents-example-workflow.png" alt-text="An example of an incident response workflow for the Microsoft Defender portal." lightbox="/defender/media/incidents-overview/incidents-example-workflow.png":::
37+
38+
On an ongoing basis, identify the highest priority incidents for analysis and resolution in the incident queue and get them ready for response. This is a combination of:
39+
40+
- [Triage](incident-queue.md) to determining the highest priority incidents through filtering and sorting of the incident queue.
41+
- [Manage](manage-incidents.md) incidents by modifying their title, assigning them to an analyst, and adding tags and comments.
42+
43+
You can use Microsoft Sentinel automation rules to automatically triage and manage (and even respond to) some incidents as they're created, removing the easiest-to-handle incidents from taking up space in your queue.
44+
45+
Consider these steps for your own incident response workflow:
46+
47+
| Stage | Steps |
48+
| ----- | ----- |
49+
| For each incident, begin an [attack and alert investigation and analysis](investigate-incidents.md). | - View the attack story of the incident to understand its scope, severity, detection source, and which asset entities are affected.<br>- Begin analyzing the alerts to understand their origin, scope, and severity with the alert story within the incident.<br>- As needed, gather information on impacted devices, users, and mailboxes with the graph. Select any entity to open a flyout with all the details. Follow through to the entity page for more insights.<br>- See how Microsoft Defender XDR has [automatically resolved some alerts](m365d-autoir.md) with the **Investigations** tab.<br>- As needed, use information in the data set for the incident for more information with the **Evidence and Response** tab. |
50+
| After or during your analysis, perform containment to reduce any additional impact of the attack and eradication of the security threat. | For example,- Disable compromised users<br>- Isolate impacted devices<br>- Block hostile IP addresses. |
51+
| As much as possible, recover from the attack by restoring your tenant resources to the state they were in before the incident.||
52+
| [Resolve](manage-incidents.md#resolve-an-incident) the incident and document your findings. | Take time for post-incident learning to: - Understand the type of the attack and its impact.<br>- Research the attack in [Threat Analytics](threat-analytics.md) and the security community for a security attack trend.<br>- Recall the workflow you used to resolve the incident and update your standard workflows, processes, policies, and playbooks as needed.<br>- Determine whether changes in your security configuration are needed and implement them. |
53+
54+
If you're new to security analysis, see the [introduction to responding to your first incident](incidents-overview.md) for additional information and to step through an example incident.
55+
56+
For more information about incident response across Microsoft products, see [incident response overview](/security/operations/incident-response-overview).
57+
58+
## Plan initial incident management tasks
59+
60+
### Experience level
61+
62+
Follow this table for your level of experience with security analysis and incident response.
63+
64+
| Level | Steps |
65+
|:-------|:-----|
66+
| **New** | - See the [Respond to your first incident walkthrough](respond-first-incident-365-defender.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review in the Microsoft Defender portal with an example attack. <br>- See which incidents should be [prioritized](incident-queue.md) based on severity and other factors.<br>- [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. |
67+
| **Experienced** | - Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: <br>- See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. <br>- [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. <br>- Perform [investigations](investigate-incidents.md) of incidents. <br>- Track and respond to emerging threats with [threat analytics](threat-analytics.md). <br>- Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). <br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
68+
69+
### Security team role
70+
71+
Follow this table based on your security team role.
72+
73+
| Role | Steps |
74+
|---|---|
75+
| Incident responder (Tier 1) | Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: - See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. <br>- [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. |
76+
| Security investigator or analyst (Tier 2) | - Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft Defender portal.<br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
77+
| Advanced security analyst or threat hunter (Tier 3) | - Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft Defender portal. <br>- Track and respond to emerging threats with [threat analytics](threat-analytics.md). <br>- Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). <br>- See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
78+
| SOC manager | See how to [integrate Microsoft Defender XDR into your Security Operations Center (SOC)](integrate-microsoft-365-defender-secops.md). |
79+
80+
## Related items
81+
82+
To learn more about alert correlation and incident merging in the Defender portal, see [Alerts, incidents, and correlation in Microsoft Defender XDR](alerts-incidents-correlation.md)

0 commit comments

Comments
 (0)