You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alert-policies.md
+24-3Lines changed: 24 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,9 +97,9 @@ You can also define user tags as a condition of an alert policy. This definition
97
97
98
98

99
99
100
-
If you select the setting based on unusual activity, Microsoft establishes a baseline value that defines the normal frequency for the selected activity. It takes up to seven days to establish this baseline, during which alerts aren't generated. After the baseline is established, an alert is triggered when the frequency of the activity tracked by the alert policy greatly exceeds the baseline value. For auditing-related activities (such as file and folder activities), you can establish a baseline based on a single user or based on all users in your organization; for malware-related activities, you can establish a baseline based on a single malware family, a single recipient, or all messages in your organization.
100
+
If you select the setting based on unusual activity, Microsoft establishes a baseline value that defines the normal frequency for the selected activity. It takes up to seven days to establish this baseline, during which alerts aren't generated. After the baseline is established, an alert is triggered when the frequency of the activity tracked by the alert policy greatly exceeds the baseline value. For auditing-related activities (such as file and folder activities), you can establish a baseline based on a single user or based on all users in your organization; for malware-related activities, you can establish a baseline based on a single malware family, a single recipient, or all messages in your organization.
101
101
102
-
> [!NOTE]
102
+
> [!NOTE]
103
103
> The ability to configure alert policies based on a threshold or based on unusual activity requires an E5/G5 subscription, or an E1/F1/G1 or E3/F3/G3 subscription with a Microsoft Defender for Office 365 P2, Microsoft 365 E5 Compliance, or Microsoft 365 eDiscovery and Audit add-on subscription. Organizations with an E1/F1/G1 and E3/F3/G3 subscription can only create alert policies where an alert is triggered every time that an activity occurs.
104
104
105
105
-**Alert category**. To help with tracking and managing the alerts generated by a policy, you can assign one of the following categories to a policy.
@@ -344,4 +344,25 @@ Here are some tasks you can perform to manage alerts.
344
344
- The name (and link) of the corresponding alert policy.
345
345
- The incident where the alert is aggregated.
346
346
347
-
- [**Tune an alert**](investigate-alerts.md#tune-an-alert): You can set properties, conditions, and actions to hide or resolve an alert.
347
+
- **[Tune an alert](investigate-alerts.md#tune-an-alert)**: You can set properties, conditions, and actions to hide or resolve an alert.
348
+
- **Change the severity level for an alert policy**
349
+
350
+
1. Sign in to the [Microsoft Purview portal ](https://security.microsoft.com/)using credentials for an admin account in your Microsoft 365 organization.
351
+
1. In the **Microsoft Defender portal**, navigate to the **Email & Collaboration** section.
352
+
353
+
1. From the left-hand navigation pane, select **Policies & rules**.
354
+
355
+
1. Open the **Alerts policy** page.
356
+
1. Select the checkbox for the communication compliance policy you want to update, and then click **Edit** under the **Actions** menu.
357
+
358
+
1. In the **Edit Policy** window:
359
+
360
+
- Use the **Severity** dropdown to adjust the alert level as needed.
361
+
362
+
- Modify the **trigger settings** if applicable.
363
+
364
+
- Click **Next** to proceed through the steps.
365
+
366
+
1. **Submit** to apply the new changes to the policy.
0 commit comments