AI-powered scoring helps SOC teams focus on the most critical threats.
Key Takeaways:
Microsoft is strengthening security operations in Microsoft Defender with AI-powered incident prioritization that cuts through alert noise. The new feature utilizes machine learning–based incident scoring to identify the most critical risks and facilitate faster, more confident responses.
According to Microsoft, security teams are often overwhelmed by a high volume of security incidents, many assigned the same severity and originating from multiple sources. The key challenge is identifying which incidents should be prioritized for investigation across different teams, shifts, and security tools.
Microsoft Defender merges alerts and automated investigations from Defender XDR and Microsoft Sentinel into correlated incidents. This approach offers full visibility across devices, identities, mailboxes, and cloud resources. However, it also creates a backlog in the incident queue.
“To help teams act on that [attack] story quickly, the incident queue includes AI-powered incident prioritization. It applies a machine learning prioritization model to surface the incidents that matter most, assigning each incident a priority score from 0–100 and—crucially—explaining the key factors behind the ranking. That explainability is what turns a score into something analysts can trust and use to drive consistent triage decisions,” the Microsoft Defender team explained.

The prioritization model evaluates various high-impact signals, such as disruption of attacks,
context from threat intelligence, severity of alerts, signal-to-noise ratio, MITRE ATT&CK techniques, asset criticality, alert rarity and type, and indicators of high-profile threats like ransomware or nation-state activity.
Incident scores are color-coded for quick scanning, with red indicating high priority (above 85%), orange representing medium priority (15–85%), and gray marking low priority (below 15%). It helps analysts quickly identify and respond to the most urgent incidents while still monitoring less critical ones.
Security analysts will need to click on an incident to open a summary pane that contains the priority assessment, key factors influencing that score, key incident details, recommended actions, as well as related threat intelligence. They can navigate directly through incidents using up/down arrows, and adjust the viewed time range for different operational needs like shift handovers or campaign reviews.
The ranking model uses principles similar to the BM25 algorithm found in search engines. It allows the model to highlight rare and informative signals over common ones, prevent repetitive alerts from skewing scores, and balance incident size so that large, noisy cases don’t automatically outrank smaller but more critical ones.
In Microsoft Defender, this AI-powered incident prioritization feature speeds up triage by reducing manual sorting and boosts analyst confidence through transparent reasoning, and improves defense outcomes by ensuring that top-priority incidents are addressed first.
Overall, the benefits of AI-driven prioritization extend across organizations of all sizes. For SMBs, it helps compensate for limited security staff by automating triage and reducing manual effort, and enterprises gain efficiency by cutting through alert noise and optimizing resources across large SOC teams. In both cases, the result is a measurable reduction in mean-time-to-investigate (MTTI) and faster containment of high-impact threats that improve overall resilience.