Skip to content

Commit f35ba1a

Browse files
committed
Edits for arg function
1 parent 4cb06c6 commit f35ba1a

File tree

3 files changed

+7
-89
lines changed

3 files changed

+7
-89
lines changed

defender-xdr/advanced-hunting-defender-results.md

Lines changed: 0 additions & 89 deletions
Original file line numberDiff line numberDiff line change
@@ -44,92 +44,3 @@ You can also right-click on any result value in a row so that you can use it to:
4444

4545
For Microsoft Defender XDR data, you can take further action by selecting the checkboxes to the left of each result row. Select **Link to incident** to link the selected results to an incident (read [Link query results to an incident](advanced-hunting-link-to-incident.md)) or **Take actions** to open the Take actions wizard (read [Take action on advanced hunting query results](advanced-hunting-take-action.md)).
4646

47-
## Link query results to an incident
48-
49-
You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you to easily capture records from advanced hunting activities, which allows you to create a richer timeline or context of events regarding an incident.
50-
51-
### Link results to new or existing incidents
52-
53-
1. In the advanced hunting query pane, enter your query in the query field provided, then select **Run query** to get your results.
54-
:::image type="content" source="/defender/media/advanced-hunting-results-link1.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link1.png":::
55-
56-
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
57-
:::image type="content" source="/defender/media/advanced-hunting-results-link2.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link2.png":::
58-
59-
3. In the **Alert details** section in the Link to incident pane, select **Create new incident** to convert the events to alerts and group them to a new incident:
60-
61-
62-
63-
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.
64-
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
65-
4. For either selection, provide the following details, then select **Next**:
66-
- **Alert title** – a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
67-
- **Severity** – choose the severity applicable to the group of alerts
68-
- **Category** – choose the appropriate threat category for the alerts
69-
- **Description** – give a helpful description of the grouped alerts
70-
- **Recommended actions** – list the recommended remediation actions for the security analysts who are investigating the incident
71-
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
72-
73-
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
74-
75-
There are two sections for which you can select entities:
76-
77-
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
78-
- Account
79-
- Device
80-
- Mailbox
81-
- Cloud application
82-
- Azure resource
83-
- Amazon Web Services resource
84-
- Google Cloud Platform resource
85-
86-
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
87-
- Process
88-
- File
89-
- Registry value
90-
- IP
91-
- OAuth application
92-
- DNS
93-
- Security group
94-
- URL
95-
- Mail cluster
96-
- Mail message
97-
98-
> [!NOTE]
99-
> For queries containing only XDR data, only entity types that are available in XDR tables are shown.
100-
101-
After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
102-
103-
After selecting the identifier, select a column from the query results that contain the selected identifier. You can click on the schema icon to open the schema reference and read the description on every column, to make sure you chose the right column that matches the selected identifier.
104-
105-
:::image type="content" source="/defender/media/advanced-hunting-results-link5.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link5.png":::
106-
107-
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
108-
109-
:::image type="content" source="/defender/media/advanced-hunting-results-link6.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link6.png":::
110-
111-
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
112-
113-
6. Select **Next**.
114-
7. Review the details you've provided in the Summary section.
115-
8. Select **Done**.
116-
117-
### View linked records in the incident
118-
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
119-
120-
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
121-
122-
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
123-
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
124-
125-
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
126-
127-
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
128-
129-
### Filter for events added using advanced hunting
130-
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
131-
132-
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
133-
134-
135-

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ For editable functions, more options are available when you select the vertical
4040
- **Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
4141
- **Delete** – deletes the function
4242

43+
## (Preview) Use arg() function
44+
Preview customers can use the *arg()* operator to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like. Read [Create alerts with Azure REsource Graph and Log Analytics](/azure/governance/resource-graph/alerts-query-quickstart?tabs=azure-resource-graph) for more details.
4345

4446
## Use saved queries
4547

defender-xdr/whats-new.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,11 @@ For more information on what's new with other Microsoft Defender security produc
2929

3030
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3131

32+
33+
## October 2024
34+
35+
- (Preview) Microsoft Defender portal users can now use the *arg()* function to query Azure resources in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#preview-use-arg-function). You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator.
36+
3237
## September 2024
3338

3439
- (GA) The global search for entities in the Microsoft Defender portal is now generally available. The enhanced search results page centralizes the results from all entities. For more information, see [Global search in the Microsoft Defender portal](microsoft-365-defender-portal.md#global-search).

0 commit comments

Comments
 (0)