|
1 | 1 | ## Manage investigate alerts
|
2 | 2 |
|
3 |
| -You can manage alerts by selecting an alert in the Alerts queue or the Alerts tab of the Device page for an individual device. Selecting an alert in either of those places brings up the Alert management pane. |
| 3 | +You can manage alerts by selecting an alert in the Alerts queue or the Alerts tab of the Device page for an individual device. Selecting an alert in either of those places brings up the Alert management pane. |
4 | 4 |
|
5 | 5 | :::image type="content" source="../media/alert-queue.png" alt-text="Screenshot of the Microsoft Defender XDR Alerts Queue page." lightbox="../media/alert-queue.png":::
|
6 | 6 |
|
7 | 7 | ## Alert management
|
8 | 8 |
|
9 |
| -You can view and set metadata about the Alert preview or Alert details page. |
| 9 | +You can view and set metadata on the Alert preview or Alert details page. |
10 | 10 |
|
11 | 11 | :::image type="content" source="../media/alert-manage.png" alt-text="Screenshot of the Microsoft Defender XDR Alert details page." lightbox="../media/alert-manage.png":::
|
12 | 12 |
|
13 |
| -The metadata fields include and actions include: |
| 13 | +The metadata fields and actions include: |
14 | 14 |
|
15 | 15 | ### Severity
|
16 | 16 |
|
17 | 17 | - **High (Red)** - Alerts commonly seen associated with advanced persistent threats (APT). These alerts indicate a high risk because of the severity of damage they can inflict on devices. Examples include credential theft tools activities, ransomware activities not associated with any group, tampering with security sensors, or any malicious activities indicative of a human adversary.
|
18 | 18 |
|
19 | 19 | - **Medium (Orange) -** Alerts from endpoint detection and response post-breach behaviors that might be a part of an advanced persistent threat (APT). This includes observed behaviors typical of attack stages, anomalous registry change, execution of suspicious files, and so forth. Although some might be part of internal security testing, it requires investigation as it might also be a part of an advanced attack.
|
20 | 20 |
|
21 |
| -- **Low (Yellow)** - Alerts on threats associated with prevalent malware. For example, hack-tools, non-malware hack tools, such as running exploration commands, clearing logs, etc. often don't indicate an advanced threat targeting the organization. It could also come from an isolated security tool testing by a user in your organization. |
| 21 | +- **Low (Yellow)** - Alerts on threats associated with prevalent malware. For example, hack-tools, nonmalware hack tools, such as running exploration commands, clearing logs, etc. often don't indicate an advanced threat targeting the organization. It could also come from an isolated security tool testing by a user in your organization. |
22 | 22 |
|
23 | 23 | - **Informational (Grey)** - Alerts that might not be considered harmful to the network but can drive organizational security awareness on potential security issues.
|
24 | 24 |
|
25 |
| -Microsoft Defender Antivirus (Microsoft Defender AV) and Defender for Endpoint alert severities are different because they represent different scopes. The Microsoft Defender AV threat severity represents the absolute severity of the detected threat (malware) and is assigned based on the potential risk to the individual device if infected. |
| 25 | +Microsoft Defender Antivirus (Microsoft Defender AV) and Defender for Endpoint alert severities are different because they represent different scopes. The Microsoft Defender AV threat severity represents the absolute severity of the detected threat (malware) and is assigned based on the potential risk to the individual device if infected. |
26 | 26 |
|
27 | 27 | The Defender for Endpoint alert severity represents the severity of the detected behavior, the actual risk to the device, and most importantly, the potential risk to the organization.
|
28 | 28 |
|
@@ -111,7 +111,7 @@ Alternatively, the team leader might assign the alert to the Resolved queue if t
|
111 | 111 |
|
112 | 112 | ### Alert classification
|
113 | 113 |
|
114 |
| -You can choose not to set a classification or specify whether an alert is a true alert or a false alert. It's important to provide the classification of true positive/false positive because it is used to monitor alert quality and make alerts more accurate. The "determination" field defines extra fidelity for a "true positive" classification. |
| 114 | +You can choose not to set a classification or specify whether an alert is a true alert or a false alert. It's important to provide the classification of true positive/false positive because it's used to monitor alert quality and make alerts more accurate. The "determination" field defines extra fidelity for a "true positive" classification. |
115 | 115 |
|
116 | 116 | ### Add comments and view the history of an alert
|
117 | 117 |
|
|
0 commit comments