Defender Alert Report

This guide will show an administrator how to access the alert queue where you will be able to see any generated malicious or suspicious activity that could be affecting network tied resources.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Security

Handbook Reference

Package: TBD

Domain: TBD

Modifies: TBD

Defender Alert Queue

  1. Navigate to the Alerts – Microsoft Defender portal, here you will see a list of alerts that were flagged in your network. If you are looking for a specific event based on a classification such as a date, severity, categories, service sources, etc. you can utilize the provided filters as desired to return the results you need to investigate.

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.