Skip to content

Commit 74f4342

Browse files
authored
Merge pull request #22982 from MicrosoftDocs/main
go hunt links
2 parents 0def193 + 5122db0 commit 74f4342

1 file changed

Lines changed: 39 additions & 10 deletions

File tree

microsoft-365/security/defender/dlp-investigate-alerts-defender.md

Lines changed: 39 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: how-to
1818
search.appverid:
1919
- MOE150
2020
- met150
21-
ms.date: 09/05/2023
21+
ms.date: 10/27/2023
2222
---
2323

2424
# Investigate data loss prevention alerts with Microsoft 365 Defender
@@ -55,7 +55,7 @@ To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft
5555
5656
## Roles
5757

58-
It is best practice to only grant minimal permissions to alerts in the Microsoft 365 Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
58+
It's best practice to only grant minimal permissions to alerts in the Microsoft 365 Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
5959

6060
|Permission |Defender Alert Access |
6161
|---------|---------|
@@ -77,17 +77,48 @@ It is best practice to only grant minimal permissions to alerts in the Microsoft
7777

7878
1. Go to the Microsoft 365 Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
7979

80-
2. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
80+
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
8181

82-
3. Search for the DLP policy name of the alerts and incidents you're interested in.
82+
1. Search for the DLP policy name of the alerts and incidents you're interested in.
8383

84-
4. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
84+
1. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
8585

86-
5. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
86+
1. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
8787

88-
6. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <a href="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles" target="_blank">here</a>).
88+
1. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <a href="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles" target="_blank">here</a>).
8989

90-
You can also use Advanced Hunting to search through audit logs of user, files, and site locations for your investigation. The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
90+
### Extend DLP alert investigation with advanced hunting
91+
92+
Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of audit logs of user, files and site locations to aid in your investigation. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats.
93+
94+
The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
95+
96+
#### Before you begin
97+
98+
If you're new to advanced hunting, you should review [Get started with advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview.md).
99+
100+
Before you can use advance hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/connect-office-365.md) that contains the Microsoft Purview data.
101+
102+
#### Using built in queries
103+
104+
> [!IMPORTANT]
105+
> This feature is in preview. Preview features aren't meant for production use and may have restricted functionality. These features are available before an official release so that customers can get early access and provide feedback.
106+
107+
The Defender portal offers multiple built-in queries you can use to help with your DLP alert investigation.
108+
109+
1. Go to the Microsoft 365 Defender portal, and select **Incidents & alerts** in the left hand navigation menu to open the incidents page. Select **Incidents**.
110+
1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
111+
1. Open a DLP incident.
112+
1. Select on an alert to view its associated events.
113+
1. Select an event.
114+
1. In the event details pane, select the **Go Hunt** control.
115+
1. Defender shows you a list of built-in queries that are relevant to the source location of the event. For example, if the event is from SharePoint you see
116+
1. **File shared with**
117+
1. **File activities**
118+
1. **Site activity**
119+
1. **User DLP violations for last 30 days**
120+
1. You can choose to **Run query** immediately, change the time range, edit or save the query for later use.
121+
1. Once you run the query, view the results on the **Results** tab.
91122

92123
If the alert is for an email message, you can download the message by selecting **Actions** \> **Download email**.
93124

@@ -106,8 +137,6 @@ For Devices DLP alerts, select the device card on the top of the alert page to v
106137

107138
Go to the incident summary page and select **Manage Incident** to add incident tags, assign, or resolve an incident.
108139

109-
110-
111140
## Related articles
112141

113142
- [Incidents overview](incidents-overview.md)

0 commit comments

Comments
 (0)