This guide will show an administrator how to access the email alert queue where generated malicious or suspicious activity affecting an entity has been detected.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Defender for Email Alert Queue
- Navigate to the Alerts – Microsoft Defender portal. Verify that the Date dropdown is set to 1 week, then locate and select the Add filter button. From the Add Filter dropdown, locate and select the Service/Detection Sources. Set the Status filter to New, In Progress and the Service/Detection Sources to Microsoft Defender for Office 365.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.