Skip to content

Commit

Permalink
Merge pull request #2471 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
XDR + IRM release
  • Loading branch information
robmazz authored Jan 16, 2025
2 parents 676d481 + 2cf5c96 commit ee8597b
Show file tree
Hide file tree
Showing 12 changed files with 177 additions and 7 deletions.
5 changes: 4 additions & 1 deletion defender-xdr/incident-queue.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ This table lists the filter names that are available.
| **Alert severity<br>Incident severity** | The severity of an alert or incident is indicative of the impact it can have on your assets. The higher the severity, the bigger the impact and typically requires the most immediate attention. Select **High**, **Medium**, **Low**, or **Informational**. |
| **Incident assignment** | Select the assigned user or users. |
| **Multiple service sources** | Specify whether the filter is for more than one service source. |
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<li>Microsoft Purview Insider Risk Management<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
| **Tags** | Select one or multiple tag names from the list. |
| **Multiple category** | Specify whether the filter is for more than one category. |
| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
Expand All @@ -137,6 +137,9 @@ This table lists the filter names that are available.
| **Alert policies** | Specify an alert policy title. |
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |

> [!NOTE]
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.

You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.
Expand Down
6 changes: 5 additions & 1 deletion defender-xdr/investigate-alerts.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ ms.topic: conceptual
search.appverid:
- MOE150
- met150
ms.date: 07/18/2024
ms.date: 1/17/2025
---

# Investigate alerts in Microsoft Defender XDR
Expand Down Expand Up @@ -133,6 +133,10 @@ Microsoft Defender XDR alerts come from solutions like Microsoft Defender for En
| Microsoft Data Loss Prevention | `dl{GUID}` |
| Microsoft Defender for Cloud | `dc{GUID}` |
| Microsoft Sentinel | `sn{GUID}` |
| Microsoft Purview Insider Risk Management | `ir{GUID}` |

> [!NOTE]
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
<a name='configure-aad-ip-alert-service'></a>

Expand Down
5 changes: 4 additions & 1 deletion defender-xdr/investigate-incidents.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ ms.topic: conceptual
search.appverid:
- MOE150
- MET150
ms.date: 11/19/2024
ms.date: 01/17/2025
appliesto:
- Microsoft Defender XDR
- Microsoft Sentinel in the Microsoft Defender portal
Expand Down Expand Up @@ -142,6 +142,9 @@ Here's an example.

Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md).

> [!NOTE]
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
## Assets

Easily view and manage all your assets in one place with the new **Assets** tab. This unified view includes Devices, Users, Mailboxes and Apps.
Expand Down
162 changes: 162 additions & 0 deletions defender-xdr/irm-investigate-alerts-defender.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,162 @@
---
title: Investigate insider risk threats in the Microsoft Defender portal with insights from Microsoft Purview Insider Risk Management
description: Investigate insider risk threats in the Microsoft Defender portal with insights from Microsoft Purview Insider Risk Management.
ms.service: defender-xdr
f1.keywords:
- NOCSH
ms.author: diannegali
author: diannegali
ms.localizationpriority: medium
manager: deniseb
audience: ITPro
ms.collection:
- m365-security
- tier1
ms.topic: conceptual
search.appverid:
- MOE150
- MET150
ms.date: 01/17/2025
appliesto:
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
- <a href="https://learn.microsoft.com/unified-secops-platform/" target="_blank">Microsoft's unified security operations platform</a>
---
# Investigate insider risk threats in the Microsoft Defender portal

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]

> [!IMPORTANT]
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
[Microsoft Purview Insider Risk Management alerts](/purview/insider-risk-management-activities#alert-dashboard) in the Microsoft Defender portal are vital for protecting an organization's sensitive information and maintaining security. These alerts and insights from Microsoft Purview Insider Risk Management help identify and mitigate internal threats like data leaks and intellectual property theft by employees or contractors. Monitoring these alerts allows organizations to address security incidents proactively, ensuring sensitive data remains protected and compliance requirements are met.

One key benefit of monitoring insider risk alerts is the unified view of all alerts related to a user, allowing security operations center (SOC) analysts to correlate alerts from [Microsoft Purview Insider Risk Management](/purview/insider-risk-management-solution-overview) with other Microsoft security solutions. Additionally, having these alerts in the Microsoft Defender portal enables seamless integration with advanced hunting capabilities, enhancing the ability to investigate and respond to incidents effectively.

Another advantage is the automatic synchronization of alert updates between [Microsoft Purview](/purview/purview-portal) and the Defender portals, ensuring real-time visibility and reducing the chances of oversight. This integration strengthens an organization's ability to detect, investigate, and respond to insider threats, thereby enhancing overall security posture.

You can manage insider risk management alerts in the Microsoft Defender portal by navigating to **Incidents & alerts**, where you can:

- View all insider risk alerts grouped under incidents in the Microsoft Defender portal [incident queue](incident-queue.md#incident-queue).
- View insider risk alerts correlated with other Microsoft solutions, like [Microsoft Purview Data Loss Prevention](/purview/dlp-learn-about-dlp) and [Microsoft Entra ID](/entra/fundamentals/whatis), under a single incident.
- View individual insider risk alerts in the [alert queue](investigate-alerts.md).
- Filter by service source on the incident and alert queues.
- Hunt for all activities and all alerts related to the user in the insider risk alert.
- View a user’s insider risk activity summary and risk level in the user entity page.

## Know before you begin

If you’re new to Microsoft Purview and insider risk management, consider reading the following articles:

- [Learn about Microsoft Purview](/purview/purview)
- [Learn about Microsoft Purview Insider Risk Management](/purview/insider-risk-management)
- [Microsoft Purview data security solutions](/purview/purview-security)

## Prerequisites

To investigate insider risk management alerts in the Microsoft Defender portal, you need to do the following:

- Confirm your Microsoft 365 subscription supports insider risk management access. Know more about [subscription and licensing](/purview/insider-risk-management-configure#subscriptions-and-licensing).
- Confirm your access to Microsoft Defender XDR. See [Microsoft Defender XDR licensing requirements](prerequisites.md#licensing-requirements).

Data sharing with other security solutions must be turned on in the **Data sharing** settings in Microsoft Purview Insider Risk Management. Turning on **Share user risk details with other security solutions** in the Microsoft Purview portal enables users with the correct permissions to review user risk details in the user entity pages in the Microsoft Defender portal. See [Share alert severity levels with other Microsoft security solutions](/purview/insider-risk-management-settings-dlp-sync#share-alert-severity-levels-with-other-microsoft-security-solutions) for more information.

:::image type="content" source="/defender-xdr/media/insider-risk-alerts/irm-toggle-settings-small.png" alt-text="Highlighting the setting in the Microsoft Purview portal required for insider risk alerts to show in Defender XDR.":::

## Permissions and roles

### Microsoft Defender XDR roles

The following permissions are essential to access insider risk management alerts in the Microsoft Defender portal:

- Security Operator
- Security Reader

For more information about Microsoft Defender XDR roles, see [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](m365d-permissions.md).

### Microsoft Purview Insider Risk Management roles

You must also be a member of one of the following insider risk management role groups to view and manage insider risk management alerts in the Microsoft Defender portal:

- Insider Risk Management
- Insider Risk Management Analysts
- Insider Risk Management Investigators

For more information on these role groups, see [Enable permissions for insider risk management](/purview/insider-risk-management-configure#step-1-required-enable-permissions-for-insider-risk-management).

## Investigation experience in the Microsoft Defender portal

### Incidents

Insider risk management alerts related to a user are correlated to a single incident to ensure a holistic approach to incident response. This correlation allows SOC analysts to have a unified view of all alerts about a user coming from Microsoft Purview Insider Risk Management and various Defender products. Unifying all alerts also allows SOC analysts to view the details of devices involved in the alerts.

:::image type="content" source="/defender-xdr/media/insider-risk-alerts/xdr-irm-incident-small.png" alt-text="Sample of an incident with insider risk alerts from Microsoft Purview Insider Risk Management." lightbox="/defender-xdr/media/insider-risk-alerts/xdr-irm-incident.png":::

You can filter incidents by choosing Microsoft Purview Insider Risk Management under **Service source**.

### Alerts

All insider risk management alerts are also visible in the Microsoft Defender portal's alert queue. Filter these alerts by choosing Microsoft Purview Insider Risk Management under **Service source**.

Here's an example of an insider risk management alert in the Microsoft Defender portal:

:::image type="content" source="/defender-xdr/media/insider-risk-alerts/xdr-irm-alert-small.png" alt-text="Sample of an insider risk alerts from Microsoft Purview Insider Risk Management." lightbox="/defender-xdr/media/insider-risk-alerts/xdr-irm-alert.png":::

Any updates made to an insider risk management alert in the Microsoft Purview or the Microsoft Defender portals are automatically reflected in both portals. These updates might include:

- Alert status
- Severity
- Activity that generated the alert
- Trigger information
- Classification

The updates are reflected in both portals within 30 minutes of the alert generation or update.

### Advanced hunting

Use advanced hunting to further investigate insider risk events and behaviors. Refer to the table below for a summary of insider risk management data available in advanced hunting.

|Table name|Description|
|:---|:---|
|[AlertInfo](advanced-hunting-alertinfo-table.md)|Insider risk management alerts are available as part the AlertInfo table, which contains information about alerts from various Microsoft security solutions.|
|[AlertEvidence](advanced-hunting-alertevidence-table.md)|Insider risk management alerts are available as part of the AlertEvidence table, which contains information about entities associated with alerts from various Microsoft security solutions.|
|DataSecurityBehaviors|This table contains insights into potentially suspicious user behavior that violates the default or customer-defined policies in Microsoft Purview.|
|DataSecurityEvents|This table contains enriched events about user activities that violate the default or customer-defined policies in Microsoft Purview.|

In the example below, we use the **DataSecurityEvents** table to investigate potentially suspicious user behavior. In this case, the user uploaded a file to Google Drive, which can be viewed as suspicious behavior if a company doesn't support file uploads to Google Drive.

:::image type="content" source="/defender-xdr/media/insider-risk-alerts/irm-adv-hunting-small.png" alt-text="Advanced hunting page showing a query using the tables related to insider risk behaviors and events." lightbox="/defender-xdr/media/insider-risk-alerts/irm-adv-hunting.png":::

## Integrate insider risk management data through Graph API

You can use Microsoft Security Graph API to integrate insider risk management alerts, insights, and indicators with other SIEM tools, data lakes, ticketing systems, and the like.

Refer to the table below to find insider risk management data in specific APIs.

|Table name|Description|Mode|
|:---|:---|:---|
|[Incidents](/graph/api/resources/security-incident)|Includes all insider risk incidents in the Defender XDR unified incident queue|Read/Write|
|[Alerts](/graph/api/resources/security-alert)|Includes all insider risk alerts shared with Defender XDR unified alert queue|Read/Write|
|[Advanced hunting](/graph/api/security-security-runhuntingquery)|Includes all insider risk management data in advanced hunting including Alerts, Behaviors, and Events|Read|

> [!NOTE]
> Insider risk alert information can be accessed in both the Alerts and Advanced hunting graph namespace. Insider risk behaviors and events in advanced hunting can be accessed in the Graph API by [passing KQL queries in the API](/graph/api/security-security-runhuntingquery).
For customers using [Office 365 Management Activity API](/office/office-365-management-api/office-365-management-activity-api-reference), we recommend migrating to Microsoft Security Graph API to ensure richer metadata and bi-directional support for IRM data.

## Impact to Microsoft Sentinel users

Microsoft Sentinel customers [exporting Microsoft Purview Insider Risk Management alert information](/purview/insider-risk-management-settings-dlp-sync#export-alert-information-to-siem-solutions) to integrate insider risk alert data are advised to migrate to the [Microsoft Defender XDR-Microsoft Sentinel connector](/azure/sentinel/connect-microsoft-365-defender?tabs=MDE).

If the Defender XDR-Microsoft Sentinel connector is turned on, insider risk management alerts are automatically integrated into Microsoft Sentinel. The schema for alerts is the same schema exposed in Graph API. The alert schema exposed through the Defender XDR-Microsoft Sentinel connector covers all existing fields exported and provides additional metadata for insider risk management alerts.

> [!NOTE]
> When the Defender XDR-Microsoft Sentinel connector is turned on, Microsoft Purview Insider Risk Management data becomes accessible in Microsoft Sentinel regardless of role-based access control settings.
To integrate additional insider risk management data like behaviors and events into Microsoft Sentinel, we recommend onboarding Microsoft Sentinel to Microsoft Defender to get a unified view of your entire security operations center. Onboarding helps you bring insider risk management alerts and other data from Microsoft Sentinel into Microsoft Defender, allowing cross-table hunting and other powerful workflows. To onboard, see [Connect Microsoft Sentinel to Microsoft Defender](microsoft-sentinel-onboard.md).

## Next steps

After investigating an insider risk incident or alert, you can do any of the following:

- Continue to respond to the alert in the Microsoft Purview portal.
- Use advanced hunting to investigate other insider risk management events in the Microsoft Defender portal.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 2 additions & 4 deletions defender-xdr/whats-new.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ ms.service: defender-xdr
ms.author: diannegali
author: diannegali
ms.localizationpriority: medium
ms.date: 12/03/2024
ms.date: 01/17/2025
manager: dansimp
audience: ITPro
ms.collection:
Expand All @@ -32,6 +32,7 @@ You can also get product updates and important notifications through the [messag

## January 2025

- (Preview) Users with provisioned access to Microsoft Purview Insider Risk Management can now view and manage insider risk management alerts and hunt for insider risk management events and behaviors in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal with insights from Microsoft Purview Insider Risk Management](irm-investigate-alerts-defender.md).
- **Defender Boxed** is available for a limited time in January and July of each year. This series of slides highlights your organization’s security successes, improvements, and response actions in the Microsoft Defender portal for the past six months/year. To learn how you can share your security operations team’s achievements, see [Defender Boxed](incident-queue.md#defender-boxed).
- (GA) **Advanced hunting context panes** are now available in custom detection experiences. This allows you to access the advanced hunting feature without leaving your current workflow.
- For incidents and alerts generated by custom detections, you can select **Run query** to explore the results of the related custom detection.
Expand Down Expand Up @@ -74,9 +75,6 @@ You can also get product updates and important notifications through the [messag
- In the [query resources report](advanced-hunting-limits.md#find-resource-heavy-queries), you can view any of the queries by selecting the three dots on the query row and selecting **Open in query editor**.
- For device entities involved in incidents or alerts, **Go hunt** is also available as one of the options after selecting the three dots on the device side panel.




## August 2024

- (Preview) Microsoft Sentinel data is now available with Defender XDR data in Microsoft Defender multitenant management. Only one Microsoft Sentinel workspace per tenant is currently supported in the Microsoft unified security operations platform. So, Microsoft Defender multitenant management shows security information and event management (SIEM) data from one Microsoft Sentinel workspace per tenant. For more information, see [Microsoft Defender multitenant management](mto-overview.md) and [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
Expand Down

0 comments on commit ee8597b

Please sign in to comment.