Skip to content

Commit 95fa0e7

Browse files
committed
Update investigate-alerts.md
1 parent 010fb4d commit 95fa0e7

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

defender-xdr/investigate-alerts.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -160,12 +160,10 @@ To configure alert service settings in Microsoft Defender XDR:
160160
1. From the list, select **Alert service settings**, and then configure the alert settings for the service.
161161

162162
> [!IMPORTANT]
163-
> Starting December 11, 2025, Microsoft Defender XDR is rolling out enhanced risk-based configuration options for Entra ID Protection alerts. These updates give you more granular control over risk-based alerting. The new default setting is **High-risk detections only**. Change the default setting to **High + Medium** or **All detections** based on your organization’s needs.
163+
> Starting December 11, 2025, Microsoft Defender XDR is rolling out enhanced configuration options for Entra ID Protection alerts. These updates give you more granular control over risk-based alerting. The new default setting is **High-risk detections only**. Change the default setting to **High + Medium** or **All detections** based on your organization’s needs.
164164
165165
:::image type="content" source="/defender/media/investigate-alerts/alert-service-settings-entra.png" alt-text="Screenshot of Microsoft Entra ID Protection alerts setting in the Microsoft Defender portal." lightbox="/defender/media/investigate-alerts/alert-service-settings-entra.png":::
166166

167-
By default, only the most relevant alerts for the security operation center are enabled. If you want to get all Microsoft Entra IP risk detections, you can change it in the **Alert service settings** section.
168-
169167
You can also access **Alert service settings** directly from the **Incidents** page in the Microsoft Defender portal.
170168

171169
> [!IMPORTANT]

0 commit comments

Comments
 (0)