mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 00:03:45 +00:00
changes to incident naming
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 51 KiB |
Binary file not shown.
After Width: | Height: | Size: 102 KiB |
@ -29,12 +29,20 @@ Managing incidents is an important part of every cybersecurity operation. You ca
|
||||
Selecting an incident from the **Incidents queue** brings up the **Incident management pane** where you can open the incident page for details.
|
||||
|
||||
|
||||

|
||||

|
||||
|
||||
You can assign incidents to yourself, change the status and classification, rename, or comment on them to keep track of their progress.
|
||||
You can assign incidents to yourself, change the status and classification, rename, or comment on them to keep track of their progress.
|
||||
|
||||

|
||||
> [!TIP]
|
||||
> For additional visibility at-a-glance, automatic incident naming, currently in public preview, generates incident names based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories. This allows you to quickly understand the scope of the incident.
|
||||
>
|
||||
> For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
|
||||
>
|
||||
> Incidents that existed prior the rollout of automatic incident naming will not have their name changed.
|
||||
>
|
||||
> Learn more about [turning on preview features](preview.md#turn-on-preview-features).
|
||||
|
||||

|
||||
|
||||
## Assign incidents
|
||||
If an incident has not been assigned yet, you can select **Assign to me** to assign the incident to yourself. Doing so assumes ownership of not just the incident, but also all the alerts associated with it.
|
||||
|
@ -63,6 +63,17 @@ You can choose to limit the list of incidents shown based on their status to see
|
||||
### Data sensitivity
|
||||
Use this filter to show incidents that contain sensitivity labels.
|
||||
|
||||
## Incident naming
|
||||
|
||||
To understand the incident's scope at-a-glance, automatic incident naming, currently in public preview, generates incident names based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
|
||||
|
||||
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
|
||||
|
||||
> [!NOTE]
|
||||
> Incidents that existed prior the rollout of automatic incident naming will not have their name changed.
|
||||
|
||||
Learn more about [turning on preview features](preview.md#turn-on-preview-features).
|
||||
|
||||
## Related topics
|
||||
- [Incidents queue](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue)
|
||||
- [Manage incidents](manage-incidents.md)
|
||||
|
Reference in New Issue
Block a user