Skip to content

Commit 5da0400

Browse files
Merge pull request #4178 from MicrosoftDocs/main
[AutoPublish] main to live - 06/10 04:28 PDT | 06/10 16:58 IST
2 parents fe18101 + 4063842 commit 5da0400

22 files changed

+333
-325
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,11 @@
10391039
"source_path": "ATPDocs/security-assessment-legacy-protocols.md",
10401040
"redirect_url": "/defender-for-identity/security-assessment",
10411041
"redirect_document_id": false
1042-
}
1042+
},
1043+
{
1044+
"source_path": "ATPDocs/manage-security-alerts.md",
1045+
"redirect_url": "/defender-for-identity/understanding-security-alerts",
1046+
"redirect_document_id": false
1047+
},
10431048
]
10441049
}

ATPDocs/alerts-overview.md

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,29 @@
11
---
22
title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
4-
ms.date: 03/23/2023
5-
ms.topic: conceptual
6-
ms.reviewer: morRubin
4+
ms.date: 05/08/2025
5+
ms.topic: reference
6+
ms.reviewer: rlitinsky
77
---
88

99
# Security alerts in Microsoft Defender for Identity
1010

11+
## What are Microsoft Defender for Identity security alerts?
12+
13+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14+
1115
> [!NOTE]
12-
> The experience described in this page can be accessed at <https://security.microsoft.com> as part of Microsoft Defender XDR.
16+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
17+
18+
The Identity alerts page gives you cross-domain signal enrichment and automated identity response capabilities. The benefit of investigating alerts with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender) is that Microsoft Defender for Identity alerts are correlated with information obtained from each of the other products in the suite. These enhanced alerts are consistent with the other Microsoft Defender XDR alert formats originating from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
19+
20+
Alerts originating from Defender for Identity trigger [Microsoft Defender XDR automated investigation and response (AIR)](/microsoft-365/security/defender/m365d-autoir) capabilities, including automatically remediating alerts and the mitigation of tools and processes that can contribute to the suspicious activity.
1321

14-
Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
22+
Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal. While the alert views may show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
23+
24+
For more information, see [View and manage security alerts](understanding-security-alerts.md).
25+
26+
## Alert categories
1527

1628
Defender for Identity security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
1729

@@ -21,14 +33,11 @@ Defender for Identity security alerts are divided into the following categories
2133
1. [Lateral movement alerts](lateral-movement-alerts.md)
2234
1. [Other alerts](other-alerts.md)
2335

24-
To learn more about the structure and common components of all Defender for Identity security alerts, see [Understanding security alerts](understanding-security-alerts.md).
2536

26-
## Security alert name mapping and unique external IDs
37+
## Map security alerts to unique external ID and MITRE ATT&CK Matrix tactics
2738

2839
The following table lists the mapping between alert names, their corresponding unique external IDs, their severity, and their MITRE ATT&CK Matrix&trade; tactic. When used with scripts or automation, Microsoft recommends use of alert external IDs in place of alert names, as only security alert external IDs are permanent, and not subject to change.
2940

30-
### External IDs
31-
3241
| Security alert name | Unique external ID | Severity | MITRE ATT&CK Matrix™ |
3342
| ------------------------------------------------------------ | ------------------- | -------------------------------------------------------- | ------------------------------------------------------------ |
3443
| [Suspected SID-History injection](persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106) | 1106 | High | Privilege Escalation |
@@ -56,7 +65,7 @@ The following table lists the mapping between alert names, their corresponding u
5665
| [Suspected Golden Ticket usage (nonexistent account)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-nonexistent-account-external-id-2027) | 2027 | High | Persistence, Privilege Escalation, Lateral movement |
5766
| [Suspected DCShadow attack (domain controller promotion)](other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028) | 2028 | High | Defense evasion |
5867
| [Suspected DCShadow attack (domain controller replication request)](other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029) | 2029 | High | Defense evasion |
59-
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command and control |
68+
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command, and control |
6069
| [Suspicious communication over DNS](other-alerts.md#suspicious-communication-over-dns-external-id-2031) | 2031 | Medium | Exfiltration |
6170
| [Suspected Golden Ticket usage (ticket anomaly)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-ticket-anomaly-external-id-2032) | 2032 | High | Persistence, Privilege Escalation, Lateral movement |
6271
| [Suspected Brute Force attack (SMB)](lateral-movement-alerts.md#suspected-brute-force-attack-smb-external-id-2033) | 2033 | Medium | Lateral movement |
@@ -101,10 +110,10 @@ The following table lists the mapping between alert names, their corresponding u
101110
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
102111

103112
> [!NOTE]
104-
> To disable any security alert, contact support.
113+
> Contact support to disable security alerts.
105114
106115
## See Also
107116

108-
- [Working with security alerts](/defender-for-identity/manage-security-alerts)
109-
- [Understanding security alerts](understanding-security-alerts.md)
117+
- [View and manage security alerts](understanding-security-alerts.md)
118+
- [Investigate security alerts](/defender-for-identity/investigate-security-alerts)
110119
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)

ATPDocs/cef-format-sa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
4040
The cs3 field identifies the fully qualified domain name of the source computer name.
4141

4242
> [!NOTE]
43-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
43+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
4444
4545
## Sample logs
4646

4747
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
4848

4949
>[!NOTE]
50-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
50+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
5151
5252
Priorities:
5353

@@ -197,7 +197,7 @@ Priorities:
197197

198198
## See Also
199199

200-
- [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
200+
- [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
201201
- [Configure event collection](deploy/configure-event-collection.md)
202202
- [Configuring Windows event forwarding](deploy/configure-event-forwarding.md)
203203
- [Check out the Defender for Identity forum](https://aka.ms/MDIcommunity)

0 commit comments

Comments
 (0)