Incidents in Microsoft 365 Defender are powerful tools allowing SecOps to triage, investigate and response to cyber-attacks in one place.
Incidents provide the full attack picture due to advanced signals correlation capabilities. Our algorithms automatically correlate signals from all Microsoft security & compliance solutions, like an experienced analyst would. It gathers related telemetry and other alerts that belong to the same attack. Microsoft 365 Defender also uses AI to continually analyze the vast amount of available data and, if necessary, suggest more evidence for the analyst to add to the incident from a variety of sources such as:
Today, unlike before, all the alerts are part of incidents. Alerts from all these products, are correlated into incidents to help expedite the response time of your SecOps team.
For an even more effective exploration of the incidents queue, we recently added new features that will further streamline your investigations:
New filters in incident queue
Once you identify an incident to research, you can investigate an attack across stages - from
Some of the powerful incident investigation capabilities include:
Play the attack over the incident graph
Learn how Microsoft 365 Defender can help your organization stop attacks with coordinated defenses. Read these blog posts in the Inside Microsoft 365 Defender series:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.