Alert XX was added to the incident by Microsoft Defender XDR - alert correlation

Horne, Lorents Birkeland 0 Reputation points
2025-02-18T07:01:10.58+00:00

Hey, I am sending alarms/incidents from another SIEM to sentinel for centralization. The goal is that sentinel mirrors the alarms/incidents exactly.

The data is sent to a custom log table, in the log analytics workspace through an API call, and I have a NRT analytics rule that creates an alert pr event, and places it in an incident in sentinel.

But if any of the N next alarms being sent from my other SIEM has the same entities, XDR correlates them into one incident. This breaks my mirroring. I have tried to set an entity with a unique identifier to be created in each alert, but that doesn't work.

Any idea how I can exclude the alarms/incidents created from my custom table from this alert correlation?

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,224 questions
0 comments No comments
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.