You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/advanced-settings.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Adjust alert thresholds | Microsoft Defender for Identity
3
3
description: Learn how to configure the number of Microsoft Defender for Identity alerts triggered of specific alert types by adjusting alert thresholds.
4
-
ms.date: 02/11/2024
4
+
ms.date: 08/03/2025
5
5
ms.topic: how-to
6
6
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
7
7
ms.reviewer: rlitinsky
@@ -15,7 +15,7 @@ Some Defender for Identity alerts rely on *learning periods* to build a profile
15
15
16
16
Use the **Adjust alert thresholds** page to customize the threshold level for specific alerts to influence their alert volume. For example, if you're running comprehensive testing, you might want to lower alert thresholds to trigger as many alerts as possible.
17
17
18
-
Alerts are always triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
18
+
Alerts are triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
19
19
20
20
> [!NOTE]
21
21
> The **Adjust alert thresholds** page was previously named **Advanced settings**. For details about this transition and how any previous settings were retained, see our [What's New announcement](whats-new.md#enhanced-user-experience-for-adjusting-alert-thresholds-preview).
@@ -46,24 +46,27 @@ For example, if you have NAT or VPN, we recommend that you consider any changes
46
46
When you select **Medium** or **Low**, details are bolded in the **Information** column to help you understand how the change affects the alert behavior.
47
47
48
48
1. Select **Apply changes** to save changes.
49
+
1. Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
49
50
50
-
Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
51
-
52
-
## Switch to test mode
51
+
## Switch to Recommended test mode
53
52
54
53
The **Recommended test mode** option is designed to help you understand all Defender for Identity alerts, including some related to legitimate traffic and activities so that you can thoroughly evaluate Defender for Identity as efficiently as possible.
55
54
56
55
If you recently deployed Defender for Identity and want to test it, select the **Recommended test mode** option to switch all alert thresholds to **Low** and increase the number of alerts triggered.
57
56
58
-
Threshold levels are read-only when the **Recommended test mode** option is selected. When you're finished testing, toggle the **Recommended test mode** option back off to return to your previous settings.
57
+
Threshold levels are read-only when the **Recommended test mode** option is selected.
58
+
59
+
> [!NOTE]
60
+
> Test mode is time-limited to a maximum of 60 days.
61
+
> When turning on Recommended test mode, you must specify an end time. The selected end time is displayed next to the toggle for as long as test mode is enabled.
59
62
60
-
Select **Apply changes** to save changes.
63
+
When you're finished testing, toggle the Recommended test mode option back off to return to your previous settings. Select **Apply changes** to save changes.
61
64
62
65
## Supported detections for threshold configurations
63
66
64
67
The following table describes the types of detections that support adjustments for threshold levels, including the effects of **Medium** and **Low** thresholds.
65
68
66
-
Cells marked with N/A indicate that the threshold level is not supported for the detection
69
+
Cells marked with N/A indicate that the threshold level isn't supported for the detection.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,14 @@ Improved detection logic to include scenarios where accounts were locked during
36
36
37
37
## July 2025
38
38
39
+
**Expanded coverage in ITDR deployment health widget**
40
+
41
+
The ITDR deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Entra Connect servers—making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
42
+
43
+
**Time limit added to Recommended test mode**
44
+
45
+
Recommended test mode now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already had Recommended test mode enabled, a 60-day expiration was automatically applied.
46
+
39
47
### Identity scoping is now available in Governance environments
40
48
41
49
Scoping is now supported in government (GOV) environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
| Date range | 30 days for Defender XDR data unless streamed through Microsoft Sentinel | Every query | Each query can look up Defender XDR data from up to the past 30 days, or longer if streamed through Microsoft Sentinel |
42
-
| Result set |30,000 rows | Every query | Each query can return up to 30,000 records. |
42
+
| Result set |100,000 rows | Every query | Each query can return up to 100,000 records. |
43
43
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it doesn't complete within 10 minutes, the service displays an error.
44
44
| CPU resources | Based on tenant size | Every 15 minutes | The portal displays a warning whenever a query runs and the tenant consumes over 10% of allocated resources. [Queries are blocked](advanced-hunting-errors.md) if the tenant reaches 100% until after the next 15-minute cycle. |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-query-results.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
6
6
ms.subservice: adv-hunting
7
7
f1.keywords:
8
8
- NOCSH
9
-
ms.author: maccruz
10
-
author: schmurky
9
+
ms.author: pauloliveria
10
+
author: poliveria
11
11
ms.localizationpriority: medium
12
-
manager: dansimp
12
+
manager: orspodek
13
13
audience: ITPro
14
14
ms.collection:
15
15
- m365-security
@@ -18,7 +18,7 @@ ms.custom:
18
18
- cx-ti
19
19
- cx-ah
20
20
ms.topic: how-to
21
-
ms.date: 10/18/2024
21
+
ms.date: 07/28/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -52,6 +52,9 @@ By default, advanced hunting displays query results as tabular data. You can als
52
52
|**Stacked area chart**| Plots numeric values for a series of unique items and stacks the filled sections below the plotted values |
53
53
|**Time chart**| Plots values by count on a linear time scale |
54
54
55
+
>[!IMPORTANT]
56
+
>Microsoft Defender portal displays up to 100,000 advanced hunting query results only. [Learn more about advanced hunting quotas and usage parameters](advanced-hunting-limits.md#understand-advanced-hunting-quotas-and-usage-parameters)
57
+
55
58
### Construct queries for effective charts
56
59
57
60
When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,8 @@ You can also get product updates and important notifications through the [messag
40
40
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
41
41
- You can now view the details pane even for analytics rules.
42
42
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
43
+
- (Preview) In advanced hunting, the number of [query results](advanced-hunting-query-results.md) displayed in the Microsoft Defender portal has been increased to 100,000.
44
+
43
45
## July 2025
44
46
- (Preview) The [`GraphApiAuditEvents`](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
0 commit comments