Skip to Content
SecuritySecurity Alerts

Security Alerts

Monitor and respond to security alerts from Microsoft 365 Defender, Azure AD Identity Protection, and other Microsoft security services. Alerts indicate potential security incidents requiring investigation.

Alert Dashboard

  • 8 — High Severity
  • 23 — Medium Severity
  • 47 — Low Severity
  • 156 — Informational

Alert List

ColumnDescription
SeverityHigh, Medium, Low, Informational
TitleAlert name and brief description
StatusNew, In Progress, Resolved
CategoryAlert category (Malware, Phishing, etc.)
SourceWhich service generated the alert
Affected EntityUser, device, or resource involved
CreatedWhen alert was generated
Assigned ToAnalyst handling the alert

Alert Sources

Microsoft Defender for Endpoint

Alerts from endpoint detection and response. Malware, suspicious behavior, lateral movement, and persistence techniques.

Tags: Malware, Suspicious Activity, Ransomware

Microsoft Defender for Office 365

Email-based threats. Phishing campaigns, malicious attachments, BEC attempts, and Safe Links/Attachments detections.

Tags: Phishing, Malware, BEC

Azure AD Identity Protection

Identity-based risks. Leaked credentials, impossible travel, anonymous IP, malware-linked IPs, and suspicious sign-in patterns.

Tags: Compromised User, Risky Sign-in

Microsoft Defender for Cloud Apps

Cloud app security alerts. Suspicious OAuth apps, mass downloads, impossible travel, and data exfiltration patterns.

Tags: Data Exfiltration, Risky OAuth

Microsoft Defender for Identity

On-premises AD threats. Credential theft, reconnaissance, lateral movement, and domain dominance attempts.

Tags: Pass-the-Hash, Reconnaissance

Alert Severity

  • High — Active threat requiring immediate response. Active malware, confirmed compromise, ongoing attack. Investigate within 1 hour.
  • Medium — Potential threat requiring investigation. Suspicious behavior, policy violations, risky sign-ins. Investigate within 24 hours.
  • Low — Minor issues or noise. May indicate reconnaissance or false positives. Review during normal operations.
  • Informational — Awareness only. Normal activity flagged for visibility. No action typically required.

Alert Investigation

  1. Review Alert Details — Understand what triggered the alert, affected entities, and timeline.
  2. Check Related Alerts — Look for correlated alerts that may indicate broader attack.
  3. Examine Evidence — Review logs, files, processes, and network activity.
  4. Determine Scope — Identify all affected users, devices, and data.
  5. Take Action — Contain threat, remediate, and document findings.

Alert Status

  • New — Alert hasn’t been reviewed yet.
  • In Progress — Alert is being investigated.
  • Resolved — Investigation complete, issue addressed.
  • Dismissed — False positive or not actionable.

Response Actions

Take action directly from alert details:

User Actions

  • Reset password
  • Revoke sessions
  • Block sign-in
  • Require MFA re-registration
  • Mark user as compromised

Device Actions

  • Isolate device
  • Run antivirus scan
  • Collect investigation package
  • Restrict app execution
  • Initiate investigation

API Reference

  • GET /api/security/alerts — List security alerts with filters
  • GET /api/security/alerts/:id — Get alert details
  • PATCH /api/security/alerts/:id — Update alert status
  • POST /api/security/alerts/:id/comments — Add investigation notes
  • GET /api/security/alerts/statistics — Get alert counts by severity/category
Last updated on