Microsoft Security Tech Accelerator
Dec 06 2023, 07:00 AM - 12:00 PM (PST)
Microsoft Tech Community
Improved incident queue in Microsoft 365 Defender
Published Nov 10 2020 06:54 AM 5,566 Views
Microsoft

If you enjoyed working on alerts in the alert queue of Microsoft 365 Defender or Microsoft Defender for Endpoint, we are excited to tell you that we have expanded the features of our incident queue. Now you can benefit from the sophisticated incident correlation logic of the incident queue without losing the capabilities you had in the alert queue.

 

This includes:

  • Nested list of alerts grouped by incident
    Enables you to quickly view which alerts make up each incident and easily drill down to each alert
  • Extended list of filters 
    Improves your ability to analyze incidents using more types of filters including investigation state, device groups, OS platforms, and more
  • Full alignment with Microsoft Defender for Endpoint alert queue

 

The new and improved incident queue now includes all the related alerts within the same queue. This means that right from the incident queue you can view all the associated alerts and open them directly. We also added more valuable columns like investigation status and device groups, filter capabilities that applies on the incidents based on any of the alerts’ attributes including investigation state, alert status, classification and more.

 

This capability can help you quickly assess, narrow down, and prioritize among incidents. For example, you can filter the incidents by device group to immediately see if sensitive devices have been affected--and spend your first few hours of the day analyzing those.

 

123.png

 

2 Comments
Version history
Last update:
‎Nov 10 2020 06:54 AM
Updated by: