You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-overview.md
+22-13Lines changed: 22 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,29 @@
1
1
---
2
2
title: Security alerts
3
3
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
4
-
ms.date: 03/23/2023
5
-
ms.topic: conceptual
6
-
ms.reviewer: morRubin
4
+
ms.date: 05/08/2025
5
+
ms.topic: reference
6
+
ms.reviewer: rlitinsky
7
7
---
8
8
9
9
# Security alerts in Microsoft Defender for Identity
10
10
11
+
## What are Microsoft Defender for Identity security alerts?
12
+
13
+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14
+
11
15
> [!NOTE]
12
-
> The experience described in this page can be accessed at <https://security.microsoft.com> as part of Microsoft Defender XDR.
16
+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
17
+
18
+
The Identity alerts page gives you cross-domain signal enrichment and automated identity response capabilities. The benefit of investigating alerts with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender) is that Microsoft Defender for Identity alerts are correlated with information obtained from each of the other products in the suite. These enhanced alerts are consistent with the other Microsoft Defender XDR alert formats originating from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
19
+
20
+
Alerts originating from Defender for Identity trigger [Microsoft Defender XDR automated investigation and response (AIR)](/microsoft-365/security/defender/m365d-autoir) capabilities, including automatically remediating alerts and the mitigation of tools and processes that can contribute to the suspicious activity.
13
21
14
-
Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
22
+
Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal. While the alert views may show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
23
+
24
+
For more information, see [View and manage security alerts](understanding-security-alerts.md).
25
+
26
+
## Alert categories
15
27
16
28
Defender for Identity security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
17
29
@@ -21,14 +33,11 @@ Defender for Identity security alerts are divided into the following categories
21
33
1.[Lateral movement alerts](lateral-movement-alerts.md)
22
34
1.[Other alerts](other-alerts.md)
23
35
24
-
To learn more about the structure and common components of all Defender for Identity security alerts, see [Understanding security alerts](understanding-security-alerts.md).
25
36
26
-
## Security alert name mapping and unique external IDs
37
+
## Map security alerts to unique external ID and MITRE ATT&CK Matrix tactics
27
38
28
39
The following table lists the mapping between alert names, their corresponding unique external IDs, their severity, and their MITRE ATT&CK Matrix™ tactic. When used with scripts or automation, Microsoft recommends use of alert external IDs in place of alert names, as only security alert external IDs are permanent, and not subject to change.
29
40
30
-
### External IDs
31
-
32
41
| Security alert name | Unique external ID | Severity | MITRE ATT&CK Matrix™ |
|[Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030)| 2030 | High | Exfiltration, Lateral movement, Command and control |
68
+
|[Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030)| 2030 | High | Exfiltration, Lateral movement, Command, and control |
60
69
|[Suspicious communication over DNS](other-alerts.md#suspicious-communication-over-dns-external-id-2031)| 2031 | Medium | Exfiltration |
61
70
|[Suspected Golden Ticket usage (ticket anomaly)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-ticket-anomaly-external-id-2032)| 2032 | High | Persistence, Privilege Escalation, Lateral movement |
62
71
|[Suspected Brute Force attack (SMB)](lateral-movement-alerts.md#suspected-brute-force-attack-smb-external-id-2033)| 2033 | Medium | Lateral movement |
@@ -101,10 +110,10 @@ The following table lists the mapping between alert names, their corresponding u
Copy file name to clipboardExpand all lines: ATPDocs/cef-format-sa.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
40
40
The cs3 field identifies the fully qualified domain name of the source computer name.
41
41
42
42
> [!NOTE]
43
-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
43
+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
44
44
45
45
## Sample logs
46
46
47
47
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
48
48
49
49
>[!NOTE]
50
-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
50
+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
51
51
52
52
Priorities:
53
53
@@ -197,7 +197,7 @@ Priorities:
197
197
198
198
## See Also
199
199
200
-
-[Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
200
+
-[Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
0 commit comments