|
| 1 | +--- |
| 2 | +title: Adjust alert thresholds | Microsoft Defender for Identity |
| 3 | +description: Learn how to configure the number of Microsoft Defender for Identity alerts triggered of specific alert types by adjusting alert thresholds. |
| 4 | +ms.date: 02/11/2024 |
| 5 | +ms.topic: how-to |
| 6 | +#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts. |
| 7 | +--- |
| 8 | + |
| 9 | +# Adjust alert thresholds |
| 10 | + |
| 11 | +This article describes how to configure the number of false positives by adjusting thresholds for specific Microsoft Defender for Identity alerts. |
| 12 | + |
| 13 | +Some Defender for Identity alerts rely on *learning periods* to build a profile of patterns, and then distinguish between legitimate and suspicious activities. Each alert also has specific conditions within the detection logic to help distinguish between legitimate and suspicious activities, such as alert thresholds and filtering for popular activities. |
| 14 | + |
| 15 | +Use the **Adjust alert thresholds** page to customize the threshold level for specific alerts to influence their alert volume. For example, if you're running comprehensive testing, you might want to lower alert thresholds to trigger as many alerts as possible. |
| 16 | + |
| 17 | +Alerts are always triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed. |
| 18 | + |
| 19 | +> [!NOTE] |
| 20 | +> The **Adjust alert thresholds** page was previously named **Advanced settings**. For details about this transition and how any previous settings were retained, see our [What's New announcement](whats-new.md#enhanced-user-experience-for-adjusting-alert-thresholds-preview). |
| 21 | +
|
| 22 | +## Prerequisites |
| 23 | + |
| 24 | +To view the **Adjust alerts thresholds** page in Microsoft Defender XDR, you need access at least as a *Security viewer*. |
| 25 | + |
| 26 | +To make changes on the **Adjust alerts thresholds** page, you need access at least as a *Security administrator*. |
| 27 | + |
| 28 | +## Define alert thresholds |
| 29 | + |
| 30 | +We recommend changing alert thresholds from the default (**High**) only after careful consideration. |
| 31 | + |
| 32 | +For example, if you have NAT or VPN, we recommend that you consider any changes to relevant detections carefully, including *Suspected DCSync attack (replication of directory services)* and *Suspected identity theft* detections. |
| 33 | + |
| 34 | +**To define your alert thresholds**: |
| 35 | + |
| 36 | +1. In [Microsoft Defender XDR](https://security.microsoft.com), go to **Settings** > **Identities** > **Adjust alert thresholds**. |
| 37 | + |
| 38 | + :::image type="content" source="media/whats-new/adjust-alert-thresholds.png" alt-text="Screenshot of the new Adjust alert thresholds page." lightbox="media/whats-new/adjust-alert-thresholds.png"::: |
| 39 | + |
| 40 | +1. Locate the alert where you want to adjust the alert threshold and select the threshold level you want to apply. |
| 41 | + |
| 42 | + - **High** is the default value, and applies standard thresholds to reduce false positives. |
| 43 | + - **Medium** and **Low** thresholds increase the number of alerts generated by Defender for Identity. |
| 44 | + |
| 45 | + When you select **Medium** or **Low**, details are bolded in the **Information** column to help you understand how the change affects the alert behavior. |
| 46 | + |
| 47 | +1. Select **Apply changes** to save changes. |
| 48 | + |
| 49 | +Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost. |
| 50 | + |
| 51 | +## Switch to test mode |
| 52 | + |
| 53 | +The **Recommended test mode** option is designed to help you understand all Defender for Identity alerts, including some related to legitimate traffic and activities so that you can thoroughly evaluate Defender for Identity as efficiently as possible. |
| 54 | + |
| 55 | +If you recently deployed Defender for Identity and want to test it, select the **Recommended test mode** option to switch all alert thresholds to **Low** and increase the number of alerts triggered. |
| 56 | + |
| 57 | +Threshold levels are read-only when the **Recommended test mode** option is selected. When you're finished testing, toggle the **Recommended test mode** option back off to return to your previous settings. |
| 58 | + |
| 59 | +Select **Apply changes** to save changes. |
| 60 | + |
| 61 | +## Supported detections for threshold configurations |
| 62 | + |
| 63 | +The following table describes the types of detections that support adjustments for threshold levels, including the effects of **Medium** and **Low** thresholds. |
| 64 | + |
| 65 | +Cells marked with N/A indicate that the threshold level is not supported for the detection |
| 66 | + |
| 67 | +| Detection | Medium | Low | |
| 68 | +| --- | --- | --- | |
| 69 | +| **[Security principal reconnaissance (LDAP)](credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)** | When set to **Medium**, this detection triggers alerts immediately, without waiting for a learning period, and also disables any filtering for popular queries in the environment.| When set to **Low**, all support for the **Medium** threshold applies, plus a lower threshold for queries, single scope enumeration, and more. | |
| 70 | +| **[Suspicious additions to sensitive groups](persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)** |N/A | When set to **Low**, this detection avoids the sliding window and ignores any previous learnings. | |
| 71 | +| **[Suspected AD FS DKM key read](credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)** | N/A | When set to **Low**, this detection triggers immediately, without waiting for a learning period. | |
| 72 | +| **[Suspected Brute Force attack (Kerberos, NTLM)](credential-access-alerts.md#suspected-brute-force-attack-kerberos-ntlm-external-id-2023)** | When set to **Medium**, this detection ignores any learning done and has a lower threshold for failed passwords. | When set to **Low**, this detection ignores any learning done and has the lowest possible threshold for failed passwords. | |
| 73 | +| **[Suspected DCSync attack (replication of directory services)](credential-access-alerts.md#suspected-dcsync-attack-replication-of-directory-services-external-id-2006)** | When set to **Medium**, this detection triggers immediately, without waiting for a learning period. | When set to **Low**, this detection triggers immediately, without waiting for a learning period, and avoids IP filtering like NAT or VPN. | |
| 74 | +| **[Suspected Golden Ticket usage (forged authorization data)](credential-access-alerts.md#suspected-golden-ticket-usage-forged-authorization-data-external-id-2013)** | N/A| When set to **Low**, this detection triggers immediately, without waiting for a learning period. | |
| 75 | +| **[Suspected Golden Ticket usage (encryption downgrade)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-encryption-downgrade-external-id-2009)** | N/A| When set to **Low**, this detection triggers an alert based on lower confidence resolution of a device. | |
| 76 | +| **[Suspected identity theft (pass-the-ticket)](lateral-movement-alerts.md#suspected-identity-theft-pass-the-ticket-external-id-2018)** | N/A | When set to **Low**, this detection triggers immediately, without waiting for a learning period, and avoids IP filtering like NAT or VPN. | |
| 77 | +| **[User and Group membership reconnaissance (SAMR)](reconnaissance-discovery-alerts.md#user-and-group-membership-reconnaissance-samr-external-id-2021)** | When set to **Medium**, this detection triggers immediately, without waiting for a learning period. | When set to **Low**, this detection triggers immediately and includes a lower alert threshold. | |
| 78 | + |
| 79 | +For more information, see [Security alerts in Microsoft Defender for Identity](alerts-overview.md). |
| 80 | + |
| 81 | +## Next step |
| 82 | + |
| 83 | +For more information, see [Investigate Defender for Identity security alerts in Microsoft Defender XDR](manage-security-alerts.md). |
0 commit comments