Skip to content

Commit 803f172

Browse files
Merge pull request #309987 from limwainstein/alert-violations-clarification
Adding alert violations clarification
2 parents 4ec381a + 794a146 commit 803f172

4 files changed

Lines changed: 53 additions & 20 deletions

File tree

articles/defender-for-iot/organizations/alerts.md

Lines changed: 25 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -34,30 +34,30 @@ While you can view alert details, investigate alert context, and triage and mana
3434
|**OT network sensor consoles** | Alerts generated by that OT sensor | - View the alert's source and destination in the **Device map** <br>- View related events on the **Event timeline** <br>- Forward alerts directly to partner vendors <br>- Create alert comments <br> - Create custom alert rules <br>- Unlearn alerts |
3535
|**Microsoft 365 Defender** | Alerts generated for Enterprise IoT devices detected by Microsoft Defender for Endpoint | - Manage alerts data together with other Microsoft 365 Defender data, including advanced hunting |
3636

37-
> [!TIP]
38-
> Any alerts generated from different sensors in the same zone within a 10-minute timeframe, with the same type, status, alert protocol, and associated devices, are listed as a single, unified alert.
39-
>
40-
> - The 10-minute timeframe is based on the alert's *first detection* time.
41-
> - The single, unified alert lists all of the sensors that detected the alert.
42-
> - Alerts are combined based on the *alert* protocol, and not the device protocol.
43-
>
44-
45-
For more information, see:
46-
47-
- [Alert data retention](references-data-retention.md#alert-data-retention)
48-
- [Accelerating OT alert workflows](#accelerating-ot-alert-workflows)
49-
- [Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options)
50-
- [Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones)
51-
52-
Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
37+
### Alert management considerations
38+
39+
- Any alerts generated from different sensors in the same zone within a 10-minute timeframe, with the same type, status, alert protocol, and associated devices, are listed as a single, unified alert.
40+
- The 10-minute timeframe is based on the alert's *first detection* time.
41+
- The single, unified alert lists all of the sensors that detected the alert.
42+
- Alerts are combined based on the *alert* protocol, and not the device protocol.
43+
- For more information, see:
44+
- [Alert data retention](references-data-retention.md#alert-data-retention)
45+
- [Accelerating OT alert workflows](#accelerating-ot-alert-workflows)
46+
- [Alert statuses and triaging options](alerts.md#alert-statuses-and-triaging-options)
47+
- [Plan OT sites and zones](best-practices/plan-corporate-monitoring.md#plan-ot-sites-and-zones)
48+
- Alert options also differ depending on your location and user role. For more information, see [Azure user roles and permissions](roles-azure.md) and [On-premises users and roles](roles-on-premises.md).
49+
- When you view alerts in the alert list, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
5350

5451
## Aggregating alert violations
5552

5653
Alert fatigue caused by a high number of identical alerts could lead to your team failing to see or remediate vital alerts. Each alert listed in the Alerts page is a result of a network violation, for example the *Unpermitted Usage of Modbus Function Code*. Aggregating violations with the same parameters and remediation requirements into one single alert listing, reduces the number of alerts displayed on the Alerts page. The matching parameters differ depending on the alert type. For example, the *Unpermitted Usage of Modbus Function Code* alert needs to have the same source and destination IP addresses to produce an aggregated alert violation. The aggregated alert could include alerts with different violation codes, such as read and write codes.
5754

5855
You download the aggregated alert violation data, that lists each alert with the relevant parameters and functions, as a CSV file in the **Violations** tab of the alert details. This data can help teams to identify patterns, assess impact and prioritize responses more effectively based on the remediation suggestions in the **Take action** tab. Only alerts that have the same remediation process are aggregated into a single alert. However, individual violation events can still be viewed separately within their respective devices, providing additional clarity.
5956

60-
The alerts that can be aggregated are listed in the [Alert reference](alert-engine-messages.md#policy-engine-alerts) policy engine alerts tables under the **Aggregarted** heading.
57+
> [!NOTE]
58+
> After you learn an alert (with the **Learn** option in the alert's **Take action** tab), the same alert might be triggered again. This can happen if the new alert has different violation parameters than the original alert. To check which violations exist for an alert:
59+
> - In the Azure portal, in the alert's **Violations** tab, select **Export**.
60+
> - In the OT sensor console, in the alert's **Violations** tab, select **Download CSV**.
6161
6262
Alert grouping appears in both the OT sensor console and the Azure portal. For more information, see [remediate aggregated alerts in Sensor console](how-to-view-alerts.md#remediate-aggregated-alert-violations) and [remediate aggregated alerts in Azure portal](how-to-manage-cloud-alerts.md#remediate-aggregated-alert-violations).
6363

@@ -149,6 +149,14 @@ Use learning mode to perform an initial triage on the alerts in your network, *l
149149

150150
For more information, see [Create a learned baseline of OT alerts](ot-deploy/create-learned-baseline.md).
151151

152+
## Alert investigation and remediation
153+
154+
Alert investigation allows you to understand the context of the alert, including the sensor that triggered the alert, the source and destination devices, and related activity on your OT network.
155+
156+
After you triage and investigate an alert, you can take remediation actions to resolve any issues identified during your investigation.
157+
158+
For more information, see [Investigate and respond to an OT network alert](respond-ot-alert.md).
159+
152160
## Next steps
153161

154162
Review alert types and messages to help you understand and plan remediation actions and playbook integrations. For more information, see [OT monitoring alert types and descriptions](alert-engine-messages.md).

articles/defender-for-iot/organizations/how-to-manage-cloud-alerts.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ Microsoft Defender for IoT alerts enhance your network security and operations w
1818

1919
For more information, see [Securing IoT devices in the enterprise](concept-enterprise.md) and the [Alerts queue in Microsoft Defender XDR](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response).
2020

21+
> [!TIP]
22+
> You can use different areas in Defender for IoT to investigate alerts, and drill down into device and network details, violations, and more. For more information, see [Investigate and respond to and OT network alert](respond-ot-alert.md).
23+
2124
## Prerequisites
2225

2326
- **To have alerts in Defender for IoT**, you must have an [OT](onboard-sensors.md) onboarded, and network data streaming into Defender for IoT.
@@ -61,8 +64,10 @@ For more information, see [Azure user roles and permissions for Defender for IoT
6164
| **Category**| The [category](alert-engine-messages.md#supported-alert-categories) associated with the alert, such as *operational issues*, *custom alerts*, or *illegal commands*. |
6265
| **Type**| The internal name of the alert. |
6366

64-
> [!TIP]
65-
> If you're seeing more alerts than expected, you might want to create suppression rules to prevent alerts from being triggered for legitimate network activity. For more information, see [Suppress irrelevant alerts](how-to-accelerate-alert-incident-response.md#suppress-irrelevant-alerts).
67+
### Considerations
68+
69+
- If you're seeing more alerts than expected, you might want to create suppression rules to prevent alerts from being triggered for legitimate network activity. For more information, see [Suppress irrelevant alerts](how-to-accelerate-alert-incident-response.md#suppress-irrelevant-alerts).
70+
- When you view alerts in the alert list, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
6671

6772
### Filter alerts displayed
6873

@@ -165,6 +170,9 @@ To reduce alert fatigue, multiple versions of the same alert violation with iden
165170

166171
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
167172

173+
> [!NOTE]
174+
> After you learn an alert, the same alert might be triggered again if the new alert has different violation parameters. To check why the alert was triggered, review the list of violations in the CSV file you downloaded in step 3.
175+
168176
## Next steps
169177

170178
> [!div class="nextstepaction"]

articles/defender-for-iot/organizations/how-to-view-alerts.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ For more information, see [On-premises users and roles for OT monitoring with De
2626

2727
## View alerts on an OT sensor
2828

29+
> [!NOTE]
30+
> When you view alerts in the Azure portal **Alerts** page, some alerts may not correlate with alerts on specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](respond-ot-alert.md#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
31+
2932
1. Sign into your OT sensor console and select the **Alerts** page on the left.
3033

3134
By default, the following details are shown in the grid:
@@ -196,6 +199,9 @@ To reduce alert fatigue, multiple versions of the same alert violation with iden
196199

197200
1. Select **Learn**, if needed. For more information, see [learning an alert](alerts.md#alert-statuses-and-triaging-options).
198201

202+
> [!NOTE]
203+
> An alert with specific violations does not prevent new alerts with different violations from appearing. After you learn an alert, the same alert might be triggered again if the new alert has different violation parameters. To check why the alert was triggered, review the list of violations in the alert list (for the first 10 alerts) or the CSV file you downloaded in step 3.
204+
199205
## Next steps
200206

201207
> [!div class="nextstepaction"]

articles/defender-for-iot/organizations/respond-ot-alert.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,12 @@ After updating the status, check the alert details page for the following detail
4545

4646
- **Source and destination device details**. Source and destination devices are listed in **Alert details** tab, and also in the **Entities** area below, as Microsoft Sentinel *entities*, with their own [entity pages](iot-advanced-threat-monitoring.md#investigate-further-with-iot-device-entities). In the **Entities** area, you'll use the links in the **Name** column to open the relevant device details pages for [further investigation](#investigate-related-alerts-on-the-azure-portal).
4747

48-
- **Site and/or zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
48+
- **Site and/or zone**. These values help you understand the geographic and network location of the alert and if there are areas of the network that are now more vulnerable to attack.
49+
50+
- **Sensor information**. Review the **Sensor**, **SiteDisplayName**, and other sensor information to provide context about the sensor that triggered the alert.
51+
52+
> [!NOTE]
53+
> In some cases, the alerts displayed in the alert list might not correlate with specific sensors. For more information, see [Investigate alerts that don't correlate with specific sensors](#investigate-alerts-that-dont-correlate-with-a-specific-sensor).
4954
5055
- **MITRE ATT&CK** tactics and techniques. Scroll down in the left pane to view all MITRE ATT&CK details. In addition to descriptions of the tactics and techniques, select the links to the MITRE ATT&CK site to learn more about each one.
5156

@@ -67,6 +72,12 @@ For example, a device that attempted to connect to a malicious IP, together with
6772

6873
:::image type="content" source="media/iot-solution/device-details-alerts.png" alt-text="Screenshot of the Alerts tab on a device details page.":::
6974

75+
## Investigate alerts that don't correlate with a specific sensor
76+
77+
In some cases, alerts in the Azure portal might not correlate with alerts on a specific sensor. The alert may be triggered by a specific sensor's configuration, like a device marked as a scanner in one sensor but not in another. As a result, alerts may only be displayed on the sensor that has the relevant configuration, even if other sensors also see the same traffic.
78+
79+
In this scenario, you can check the **Sensor**, **SiteDisplayName**, and **SensorZone** fields in the alert's **Alert details** tab to identify the sensor that generated the alert. You can then review that sensor's configuration and context to understand why the alert was triggered.
80+
7081
## Investigate alert details on the OT sensor
7182

7283
The OT sensor that triggered the alert will have more details to help your investigation.

0 commit comments

Comments
 (0)