1.8 Cross-Product Incident Correlation
Cross-Product Incident Correlation
Introduction
This subsection is not in Microsoft Learn. It teaches the skill that defines an advanced SOC analyst: tracing an attack across multiple Defender products using KQL and the unified Advanced Hunting schema.
Defender XDR automatically correlates alerts into incidents. But automated correlation has limits — it identifies connections based on shared entities, not on your understanding of the attack. This subsection teaches you to manually correlate across products when the automated correlation misses connections, or when you need to validate and extend what the automation found.
The key skill: using KQL joins and unions from Module 6 against the Advanced Hunting tables to build a complete attack narrative across email, identity, endpoint, and cloud apps.
The cross-product investigation pattern
A phishing attack touches every Defender product in sequence:
- Email (EmailEvents) — phishing email delivered
- Identity (IdentityLogonEvents) — attacker signs in with stolen credentials
- Cloud Apps (CloudAppEvents) — attacker creates inbox rule, accesses mailbox
- Endpoint (DeviceProcessEvents) — if the attacker drops malware
Each step lives in a different table. The entity that connects them is the user: the email recipient is the sign-in user is the inbox rule creator is the device owner.
| |
| Timestamp | Phase | Detail | SourceIP |
|---|---|---|---|
| 08:02 | 1-Email | Phishing from northgate-voicemail.com: New voicemail | 198.51.100.44 |
| 08:14 | 2-Identity | Sign-in to Exchange Online | 198.51.100.44 |
| 08:15 | 3-CloudApp | New-InboxRule in Exchange Online | 198.51.100.44 |
| 08:16 | 3-CloudApp | MailItemsAccessed in Exchange Online | 198.51.100.44 |
When automated correlation is incomplete
XDR correlation groups alerts by shared entities. But it can miss:
- Time-delayed connections — the phishing email arrives Monday, the credential is cracked and used Thursday. XDR may not correlate events 4 days apart.
- Different entity representations — EmailEvents uses RecipientEmailAddress, IdentityLogonEvents uses AccountUpn. If the formats differ slightly, automatic correlation may miss the link.
- Cross-tenant activity — if the attacker uses the stolen credential to access a partner organization, that activity is in a different tenant.
In these cases, your manual KQL correlation fills the gap. The cross-product query above is your template — adapt the time window, the user, and the tables to the specific investigation.
Try it yourself
In a lab environment, you will likely see only IdentityLogonEvents (from your test sign-ins) and possibly CloudAppEvents (if you accessed Exchange or SharePoint). EmailEvents requires email activity. DeviceProcessEvents requires an onboarded device. The query structure is what matters — verify each union branch runs individually, even if it returns no results.
Check your understanding
1. XDR correlates three alerts into an incident: phishing email, suspicious sign-in, and inbox rule creation. You suspect there may also be endpoint activity, but no endpoint alert exists. How do you check?