- Sittadel Knowledge Base
- Management Guides
- Microsoft Defender
Defender Alert Report
This guide will show an administrator how to access the alert queue where you will be able to see any generated malicious or suspicious activity that could be affecting network tied resources.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Defender Alert Queue
- Navigate to the Alerts – Microsoft Defender portal, here you will see a list of alerts that were flagged in your network. If you are looking for a specific event based on a classification such as a date, severity, categories, service sources, etc. you can utilize the provided filters as desired to return the results you need to investigate.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.