Hello Lorents,
Thank you for posting your query on Microsoft Q&A.
XDR automatically correlates based on entities like IP addresses, usernames, etc., it can mistakenly group alarms with the same entities into one incident. XDR might have a more granular control over how incidents are correlated based on entities. Depending on the specific configuration of XDR and Sentinel, you may be able to adjust the correlation settings for your custom log table to prevent these alarms from being correlated with other incidents. Check your correlation policies to see if there's an option to exclude alarms from specific sources or types.
You mentioned that you've already tried creating a unique identifier for each alert, but it seems like the correlation rules are still being applied. To make sure this identifier works
Make sure that every alarm has a unique GUID or SIEMAlertID, or any other custom identifier field. Even if the same entities are involved, each alarm should have a unique identity.
When creating an incident, include this custom field Include this identity in the incident when setting up the alert rule. To distinguish it from other alerts, make sure the identification is appended to the IncidentId or AlertId.
https://learn.microsoft.com/en-us/azure/sentinel/relate-alerts-to-incidents
If a unique identifier isn't enough, you can use custom tags or an AlertType to differentiate alarms. For example, tag alerts with AlertSource: CustomSIEM
and modify your KQL queries to filter based on this tag, preventing correlation when it matches.
Check the IncidentCreation
settings in your custom NRT analytics rules. Adjust correlation logic to avoid grouping by common entities (e.g., IP, user) and create exclusion rules to prevent correlation for alerts from your custom log table.
https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules
https://learn.microsoft.com/en-us/defender-xdr/alerts-incidents-correlation
I hope this clarifies things.