`defender_atp_index` sourcetype="ms365:defender:incident:alerts"
| stats latest(status) AS status latest(severity) AS severity latest(assignedTo) AS assignedTo latest(category) AS category by incidentId
| chart dc(incidentId) over assignedTo by status
| eval Total=New + InProgress + Resolved
| fields assignedTo New InProgress Resolved Total
| addcoltotals
`defender_atp_index` sourcetype="ms365:defender:incident:alerts"
| stats latest(status) AS status latest(severity) AS severity latest(assignedTo) AS assignedTo latest(category) AS category latest(entities{}.entityType) AS entityType by incidentId mitre_technique_id
| chart dc(mitre_technique_id) over entityType by category"
Successful ingestion of below 3 sourcetypes with `Splunk Add-on for Microsoft Security`:
ms:defender:atp:alerts
ms365:defender:incident
ms365:defender:incident:alerts
Installed latest Microsoft 365 app for Splunk