What’s New: Improved Incident Closing Experience is now Available!
Published Apr 03 2020 09:52 AM 7,892 Views

This installment is part of a broader series to keep you up to date with the latest features in Azure Sentinel. The installments will be bite-sized to allow you to easily digest the new content.

 

While the primary function of a SOC is providing situational awareness through the detection, containment, and management of security threats; this is coupled with the responsibility to track metrics to measure performance and to make changes to increase SOC efficiency.

 

From our Microsoft CDOC, we have learned that the metrics you choose to measure has a significant effect on the behaviors and outcomes of security operations. Focusing on the right measurements will help drive continuous improvement in the right areas that meaningfully reduce risk.

 

Today, we are happy to release the improved incident closing experience!

 

This feature is meant to help customers track more detailed information on why incidents are closed. Being able to measure these metrics can allow you to enforce alert quality across your SOC, tune out false positives, and adjust processes to improve prioritization and focus.

 

Today, incident’s status can be either New, In Progress or Close. When changing a status to 'Close' you have an option of specifying whether the incident was a False Positive or a True Positive.

 

In order to collect more information on the incident closing, we made this a mandatory field and provided a set of closing reasons that are based on researchers and customer references:

 

  • True Positive, suspicious activity
  • Benign Positive, suspicious but expected
  • False Positive, incorrect alert logic
  • False Positive, inaccurate data
  • Undetermined

 

incidentclosing.gif

 

We hope this feature will help customers better tune their rules and measure their SOC’s performance and will help us get more detailed information on our own detection's.

 

Get started today!

 

We encourage you to use the improved incident closing experience in your environment.

Note – The official documentation will be available in 1-2 weeks.

 

Try it out, and let us know what you think!

4 Comments
Silver Contributor

Please add a link on the Sentinel News & Guides blade to articles like this.  Also, the MCAS team has a very nice approach to tracking changes, see https://docs.microsoft.com/en-us/cloud-app-security/release-notes. It would be great if all of the security related teams used consistent methods of keeping us informed. 

Copper Contributor

Is there any documentation explaining the difference between the below

 

 

  • False Positive, incorrect alert logic
  • False Positive, inaccurate data

 

Deleted
Not applicable

"a set of closing reasons"

could you give more explanation how each choice affects the Sentinel engine behavior or is it only a feedback about the incident rules quality?

Which reason has the meaning "that's totally OK, there's a support ticket for this action"? I guess "suspicious but expected" should be OK, but I would like to be sure ;)

Copper Contributor

Hi Cristhofer,

 

Can you help me to figure out what is the difference between below two:

  • False Positive, incorrect alert logic
  • False Positive, inaccurate data

Also If we can more details about all the set of closing reasons .

 

Thank you

Version history
Last update:
‎Jun 24 2020 10:06 AM
Updated by: