Skip to content

Latest commit

 

History

History
114 lines (83 loc) · 6.92 KB

advanced-hunting-link-to-incident.md

File metadata and controls

114 lines (83 loc) · 6.92 KB
title description search.appverid ms.service ms.subservice f1.keywords ms.author author ms.localizationpriority manager audience ms.collection ms.custom ms.topic ms.date
Link query results to an incident
Link query results to an incident
met150
defender-xdr
adv-hunting
NOCSH
maccruz
schmurky
medium
dansimp
ITPro
m365-security
m365initiative-m365-defender
tier1
cx-ti
cx-ah
how-to
11/19/2024

Link query results to an incident

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

  • Microsoft Defender XDR

You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you easily capture records from advanced hunting activities, which enables you to create a richer timeline or context of events regarding an incident.

Link results to new or existing incidents

  1. In the advanced hunting query page, first enter your query in the query field provided then select Run query to get your results.

    :::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1.png":::

  2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select Link to incident.

    :::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1b.png":::

  3. Find the Alert details section in the Link to incident pane, then select Create new incident to convert the events to alerts and group them to a new incident:

    Or select Link to an existing incident to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.

    :::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link4.png":::

  4. For either selection, provide the following details, then select Next:

    • Alert title - Provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
    • Severity - Choose the severity applicable to the group of alerts.
    • Category - Choose the appropriate threat category for the alerts.
    • Description - Give a helpful description for the grouped alerts.
    • Recommended actions - Provide remediation actions.
  5. In the Entities section, you can find which entities are used to correlate other alerts to the linked incident. They also appear in the incident page. You can review the preselected entities categorized as follows:

    a. Impacted assets – Assets impacted by the selected events, can be:

    • Account
    • Device
    • Mailbox
    • Cloud application
    • Azure resource
    • Amazon Web Services resource
    • Google Cloud Platform resource

    b. Related evidence – Non-assets that appear in the selected events. The supported entity types are:

    • Process
    • File
    • Registry value
    • IP
    • OAuth application
    • DNS
    • Security group
    • URL
    • Mail cluster
    • Mail message
  6. After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.

  7. After selecting the identifier, select a column from the query results that contain the selected identifier. You can select Explore query and results to open the advanced hunting context panel. This allows you to explore your query and results to make sure you chose the right column for the selected identifier.
    :::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
    In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.

    :::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::

    A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.

  8. Select Next.

  9. Review the details you've provided in the Summary section.

  10. Select Done.

View linked records in the incident

You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.

:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link7.png":::

In our example, the three alerts, representing the three selected events, were linked successfully to a new incident. In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.

You can also select the event from the timeline view or from the query results view to open the Inspect record pane.

:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link8.png":::

Filter for events added using advanced hunting

You can view which alerts were generated from advanced hunting by filtering incidents and alerts by Manual detection source.

:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link9.png":::