Accelerate alert workflows

This article describes how to accelerate alert workflows using alert comments, alert groups, and custom alert rules for standard protocols and proprietary protocols in Microsoft Defender for IoT. These tools help you

  • Analyze and manage the large volume of alert events detected in your network.

  • Pinpoint and handle specific network activity.

Accelerate incident workflows by using alert comments

Work with alert comments to improve communication between individuals and teams while investigating an alert event.

Use alert comments to improve:

  • Workflow steps: Provide alert mitigation steps.

  • Workflow follow-up: Notify that steps were taken.

  • Workflow guidance: Provide recommendations, insights, or warnings about the event.

The list of available options appears in each alert, and users can select one or several messages.

To add alert comments:

  1. On the side menu, select System Settings > Network Monitoring> Alert Comments.

  2. Enter a description and select Submit.

Accelerate incident workflows by using alert groups

Alert groups let SOC teams view and filter alerts in their SIEM solutions and then manage these alerts based on enterprise security policies and business priorities. For example, alerts about new detections are organized in a discovery group. This group includes alerts that deal with detecting new devices, new VLANs, new user accounts, new MAC addresses, and more.

Alert groups are applied when you create forwarding rules for the following partner solutions:

  • Syslog servers

  • QRadar

  • ArcSight

The relevant alert group appears in partner output solutions.

Requirements

The alert group will appear in supported partner solutions with the following prefixes:

  • cat for QRadar, ArcSight, Syslog CEF, Syslog LEEF

  • Alert Group for Syslog text messages

  • alert_group for Syslog objects

These fields should be configured in the partner solution to display the alert group name. If there's no alert associated with an alert group, the field in the partner solution will display NA.

Default alert groups

The following alert groups are automatically defined:

  • Abnormal communication behavior
  • Custom alerts
  • Remote access
  • Abnormal HTTP communication behavior
  • Discovery
  • Restart and stop commands
  • Authentication
  • Firmware change
  • Scan
  • Unauthorized communication behavior
  • Illegal commands
  • Sensor traffic
  • Bandwidth anomalies
  • Internet access
  • Suspicion of malware
  • Buffer overflow
  • Operation failures
  • Suspicion of malicious activity
  • Command failures
  • Operational issues
  • Configuration changes
  • Programming

Alert groups are predefined. For details about alerts associated with alert groups, and about creating custom alert groups, contact Microsoft Support.

Customize alert rules

Add custom alert rule to pinpoint specific activity needed for your organization such as for particular protocols, source or destination addresses, or a combination of parameters.

For example, you might want to define an alert for an environment running MODBUS to detect any written commands to a memory register on a specific IP address and ethernet destination. Another example would be an alert for any access to a particular IP address.

Use custom alert rule actions to instruct Defender for IT to take specific action when the alert is triggered, such as allowing users to access PCAP files from the alert, assigning alert severity, or generating an event that shows in the event timeline. Alert messages indicate that the alert was generated from a custom alert rule.

To create a custom alert rule:

  1. On the sensor console, select Custom alert rules > + Create rule.

  2. In the Create custom alert rule pane that shows on the right, define the following fields:

    • Alert name. Enter a meaningful name for the alert.

    • Alert protocol. Select the protocol you want to detect. In specific cases, select one of the following protocols:

      • For a database data or structure manipulation event, select TNS or TDS
      • For a file event, select HTTP, DELTAV, SMB, or FTP, depending on the file type
      • For a package download event, select HTTP
      • For an open ports (dropped) event, select TCP or UDP, depending on the port type.

      To create rules that monitor for specific changes in one of your OT protocols, such as S7 or CIP, use any parameters found on that protocol, such as tag or sub-function.

    • Message. Define a message to display when the alert is triggered. Alert messages support alphanumeric characters and any traffic variables detected. For example, you might want to include the detected source and destination addresses. Use curly brackets ({}) to add variables to the alert message.

    • Direction. Enter a source and/or destination IP address where you want to detect traffic.

    • Conditions. Define one or more conditions that must be met to trigger the alert. Select the + sign to create a condition set with multiple conditions that use the AND operator. If you select a MAC address or IP address as a variable, you must convert the value from a dotted-decimal address to decimal format.

    • Detected. Define a date and/or time range for the traffic you want to detect.

    • Action. Define an action you want Defender for IoT to take automatically when the alert is triggered.

To edit a custom alert rule, select the rule and then select the options (...) menu > Edit. Modify the alert rule as needed and save your changes.

Edits made to custom alert rules, such as changing a severity level or protocol, are tracked in the Event timeline page on the sensor console. For more information, see Track sensor activity.

To enable or disable custom alert rules

You can disable custom alert rules to prevent them from running without deleting them altogether.

In the Custom alert rules page, select one or more rules, and then select Enable, Disable, or Delete in the toolbar as needed.

Next steps

For more information, see Manage the alert event.