Skip to content

Commit f8932cf

Browse files
authored
Merge pull request #2779 from MicrosoftDocs/diannegali-updatesirm
Updates to IRM integration
2 parents e3ca63a + d842ed8 commit f8932cf

File tree

1 file changed

+66
-12
lines changed

1 file changed

+66
-12
lines changed

defender-xdr/irm-investigate-alerts-defender.md

Lines changed: 66 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 01/17/2025
19+
ms.date: 02/17/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2222
- <a href="https://learn.microsoft.com/unified-secops-platform/" target="_blank">Microsoft's unified security operations platform</a>
@@ -58,7 +58,9 @@ To investigate insider risk management alerts in the Microsoft Defender portal,
5858
- Confirm your Microsoft 365 subscription supports insider risk management access. Know more about [subscription and licensing](/purview/insider-risk-management-configure#subscriptions-and-licensing).
5959
- Confirm your access to Microsoft Defender XDR. See [Microsoft Defender XDR licensing requirements](prerequisites.md#licensing-requirements).
6060

61-
Data sharing with other security solutions must be turned on in the **Data sharing** settings in Microsoft Purview Insider Risk Management. Turning on **Share user risk details with other security solutions** in the Microsoft Purview portal enables users with the correct permissions to review user risk details in the user entity pages in the Microsoft Defender portal. See [Share alert severity levels with other Microsoft security solutions](/purview/insider-risk-management-settings-dlp-sync#share-alert-severity-levels-with-other-microsoft-security-solutions) for more information.
61+
Data sharing with other security solutions must be turned on in the **Data sharing** settings in Microsoft Purview Insider Risk Management. Turning on **Share user risk details with other security solutions** in the Microsoft Purview portal enables users with the correct permissions to review user risk details in the user entity pages in the Microsoft Defender portal.
62+
63+
See [Share alert severity levels with other Microsoft security solutions](/purview/insider-risk-management-settings-dlp-sync#share-alert-severity-levels-with-other-microsoft-security-solutions) for more information.
6264

6365
:::image type="content" source="/defender-xdr/media/insider-risk-alerts/irm-toggle-settings-small.png" alt-text="Highlighting the setting in the Microsoft Purview portal required for insider risk alerts to show in Defender XDR.":::
6466

@@ -83,6 +85,22 @@ You must also be a member of one of the following insider risk management role g
8385

8486
For more information on these role groups, see [Enable permissions for insider risk management](/purview/insider-risk-management-configure#step-1-required-enable-permissions-for-insider-risk-management).
8587

88+
### Microsoft Graph API roles
89+
90+
Customers integrating insider risk management alerts with other security information and events management (SIEM) tools using the Microsoft Graph security API must have the following permissions to successfully access the relevant Microsoft Defender data through APIs:
91+
92+
|App permissions|Incidents|Alerts|Behaviors & events|Advanced hunting|
93+
|:---|:---:|:---:|:---:|:---:|
94+
|SecurityIncident.Read.All|Read|Read|Read||
95+
|SecurityIncident.ReadWrite.All|Read/Write|Read/Write|Read||
96+
|SecurityIAlert.Read.All||Read|Read||
97+
|SecurityAlert.ReadWrite.All||Read/Write|Read||
98+
|SecurityEvents.Read.All|||Read||
99+
|SecurityEvents.ReadWrite.All|||Read||
100+
|ThreatHunting.Read.All||||Read|
101+
102+
More information about integrating data using the Microsoft Graph security API in [Integrate insider risk management data with Microsoft Graph security API](#integrate-insider-risk-management-data-with-microsoft-graph-security-api).
103+
86104
## Investigation experience in the Microsoft Defender portal
87105

88106
### Incidents
@@ -101,6 +119,24 @@ Here's an example of an insider risk management alert in the Microsoft Defender
101119

102120
:::image type="content" source="/defender-xdr/media/insider-risk-alerts/xdr-irm-alert-small.png" alt-text="Sample of an insider risk alerts from Microsoft Purview Insider Risk Management." lightbox="/defender-xdr/media/insider-risk-alerts/xdr-irm-alert.png":::
103121

122+
Microsoft Defender XDR and Microsoft Purview Insider Risk Management follow different alert status and classification frameworks. The following alert mapping is used to sync alert statuses between the two solutions:
123+
124+
|Microsoft Defender alert status|Microsoft Purview Insider Risk Management alert status|
125+
|:---|:---|
126+
|New|Needs review|
127+
|In progress|Needs review|
128+
|Resolved|Classification dependent. If classification is not available, the alert status is set to *Dismissed* by default.|
129+
130+
The following alert classification mapping is used to sync the alert classification between the two solutions:
131+
132+
|Microsoft Defender alert classification|Microsoft Purview Insider Risk Management alert classification|
133+
|:---|:---|
134+
|True positive </br> Includes multi-staged attack, phishing, etc.|Confirmed|
135+
|Information, expected activity (benign positive) </br> Includes Ssecurity testing, confirmed activity, etc.|Dismissed|
136+
|False positive </br> Includes not malicious, not enough data to validate, etc.|Dismissed|
137+
138+
For more information about alert statuses and classifications in Microsoft Defender XDR, see [Manage alerts in Microsoft Defender](investigate-alerts.md#manage-alerts).
139+
104140
Any updates made to an insider risk management alert in the Microsoft Purview or the Microsoft Defender portals are automatically reflected in both portals. These updates might include:
105141

106142
- Alert status
@@ -111,6 +147,18 @@ Any updates made to an insider risk management alert in the Microsoft Purview or
111147

112148
The updates are reflected in both portals within 30 minutes of the alert generation or update.
113149

150+
> [!NOTE]
151+
> Alerts created from custom detections or link query results to incidents are not available in the Microsoft Purview portal.
152+
153+
The following insider risk management data are not yet available in this integration:
154+
155+
- Exfiltration through email events
156+
- Risky AI usage events
157+
- Third-party cloud apps events
158+
- Events that occurred before an alert was generated
159+
- Exclusions to events defined by the administrator
160+
- Insider risk management incidents don't contain alerts currently, impacting Microsoft Sentinel users. For more information, see [Impact to Microsoft Sentinel users](#impact-to-microsoft-sentinel-users).
161+
114162
### Advanced hunting
115163

116164
Use advanced hunting to further investigate insider risk events and behaviors. Refer to the table below for a summary of insider risk management data available in advanced hunting.
@@ -126,9 +174,16 @@ In the example below, we use the **DataSecurityEvents** table to investigate pot
126174

127175
:::image type="content" source="/defender-xdr/media/insider-risk-alerts/irm-adv-hunting-small.png" alt-text="Advanced hunting page showing a query using the tables related to insider risk behaviors and events." lightbox="/defender-xdr/media/insider-risk-alerts/irm-adv-hunting.png":::
128176

129-
## Integrate insider risk management data through Graph API
177+
To access insider risk data in advanced hunting, users must have the following Microsoft Purview Insider Risk Management roles:
178+
179+
- Insider Risk Management Analyst
180+
- Insider Risk Management Investigator
181+
182+
## Integrate insider risk management data with Microsoft Graph security API
130183

131-
You can use Microsoft Security Graph API to integrate insider risk management alerts, insights, and indicators with other SIEM tools, data lakes, ticketing systems, and the like.
184+
Use the [Microsoft Graph security API](/graph/api/resources/security-api-overview) to integrate insider risk management alerts, insights, and indicators with other SIEM tools like like Microsoft Sentinel, ServiceNow, or Splunk. You can also use the security API to integrate insider risk management data to data lakes, ticketing systems, and the like.
185+
186+
To learn how to set up the Microsoft Graph API, see [Use the Microsoft Graph API](/graph/use-the-api).
132187

133188
Refer to the table below to find insider risk management data in specific APIs.
134189

@@ -138,21 +193,20 @@ Refer to the table below to find insider risk management data in specific APIs.
138193
|[Alerts](/graph/api/resources/security-alert)|Includes all insider risk alerts shared with Defender XDR unified alert queue|Read/Write|
139194
|[Advanced hunting](/graph/api/security-security-runhuntingquery)|Includes all insider risk management data in advanced hunting including Alerts, Behaviors, and Events|Read|
140195

196+
The insider risk alert metadata is part of the alert resource type in Microsoft Graph security API. See the complete information in [alert resource type](/graph/api/resources/security-alert).
197+
141198
> [!NOTE]
142-
> Insider risk alert information can be accessed in both the Alerts and Advanced hunting graph namespace. Insider risk behaviors and events in advanced hunting can be accessed in the Graph API by [passing KQL queries in the API](/graph/api/security-security-runhuntingquery).
199+
> Insider risk alert information can be accessed in both the Alerts and Advanced hunting graph namespace. The alerts namespace provides more metadata.
200+
>
201+
> Insider risk behaviors and events in advanced hunting can be accessed in the Graph API by [passing KQL queries in the API](/graph/api/security-security-runhuntingquery). Use this method to pull supporting data for specific alerts or investigations.
143202
144203
For customers using [Office 365 Management Activity API](/office/office-365-management-api/office-365-management-activity-api-reference), we recommend migrating to Microsoft Security Graph API to ensure richer metadata and bi-directional support for IRM data.
145204

146205
## Impact to Microsoft Sentinel users
147206

148-
Microsoft Sentinel customers [exporting Microsoft Purview Insider Risk Management alert information](/purview/insider-risk-management-settings-dlp-sync#export-alert-information-to-siem-solutions) to integrate insider risk alert data are advised to migrate to the [Microsoft Defender XDR-Microsoft Sentinel connector](/azure/sentinel/connect-microsoft-365-defender?tabs=MDE).
149-
150-
If the Defender XDR-Microsoft Sentinel connector is turned on, insider risk management alerts are automatically integrated into Microsoft Sentinel. The schema for alerts is the same schema exposed in Graph API. The alert schema exposed through the Defender XDR-Microsoft Sentinel connector covers all existing fields exported and provides additional metadata for insider risk management alerts.
151-
152-
> [!NOTE]
153-
> When the Defender XDR-Microsoft Sentinel connector is turned on, Microsoft Purview Insider Risk Management data becomes accessible in Microsoft Sentinel regardless of role-based access control settings.
207+
We recommend Microsoft Sentinel customers to use the [Microsoft Purview Insider Risk Management – Microsoft Sentinel data connector](/azure/sentinel/connect-services-api-based) to get insider risk management alerts in Microsoft Sentinel.
154208

155-
To integrate additional insider risk management data like behaviors and events into Microsoft Sentinel, we recommend onboarding Microsoft Sentinel to Microsoft Defender to get a unified view of your entire security operations center. Onboarding helps you bring insider risk management alerts and other data from Microsoft Sentinel into Microsoft Defender, allowing cross-table hunting and other powerful workflows. To onboard, see [Connect Microsoft Sentinel to Microsoft Defender](/unified-secops-platform/microsoft-sentinel-onboard).
209+
If you are using automation on Microsoft Sentinel incidents, note that automation risks failure due to insider risk management incidents having no alert content. To mitigate this, [turn off data sharing in insider risk management settings](/purview/insider-risk-management-settings-share-data#use-the-apis-to-review-insider-risk-alert-information).
156210

157211
## Next steps
158212

0 commit comments

Comments
 (0)