You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/AutoPublish.yml
+4-2Lines changed: 4 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,23 @@ name: (Scheduled) Publish to live
3
3
permissions:
4
4
contents: write
5
5
pull-requests: write
6
+
checks: read
6
7
7
8
on:
8
9
schedule:
9
-
- cron: "25 5,11,17,22 * * *"# Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10
+
- cron: "25 2,5,8,11,14,17,20,22 * * *"# Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
Copy file name to clipboardExpand all lines: ATPDocs/alerts-overview.md
+22-14Lines changed: 22 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,29 @@
1
1
---
2
2
title: Security alerts
3
3
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
4
-
ms.date: 03/23/2023
5
-
ms.topic: conceptual
6
-
ms.reviewer: morRubin
4
+
ms.date: 05/08/2025
5
+
ms.topic: reference
6
+
ms.reviewer: rlitinsky
7
7
---
8
8
9
9
# Security alerts in Microsoft Defender for Identity
10
10
11
+
## What are Microsoft Defender for Identity security alerts?
12
+
13
+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14
+
11
15
> [!NOTE]
12
-
> The experience described in this page can be accessed at <https://security.microsoft.com> as part of Microsoft Defender XDR.
16
+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
17
+
18
+
The Identity alerts page gives you cross-domain signal enrichment and automated identity response capabilities. The benefit of investigating alerts with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender) is that Microsoft Defender for Identity alerts are correlated with information obtained from each of the other products in the suite. These enhanced alerts are consistent with the other Microsoft Defender XDR alert formats originating from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
19
+
20
+
Alerts originating from Defender for Identity trigger [Microsoft Defender XDR automated investigation and response (AIR)](/microsoft-365/security/defender/m365d-autoir) capabilities, including automatically remediating alerts and the mitigation of tools and processes that can contribute to the suspicious activity.
13
21
14
-
Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
22
+
Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal. While the alert views may show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
23
+
24
+
For more information, see [View and manage security alerts](understanding-security-alerts.md).
25
+
26
+
## Alert categories
15
27
16
28
Defender for Identity security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
17
29
@@ -21,14 +33,11 @@ Defender for Identity security alerts are divided into the following categories
21
33
1.[Lateral movement alerts](lateral-movement-alerts.md)
22
34
1.[Other alerts](other-alerts.md)
23
35
24
-
To learn more about the structure and common components of all Defender for Identity security alerts, see [Understanding security alerts](understanding-security-alerts.md).
25
36
26
-
## Security alert name mapping and unique external IDs
37
+
## Map security alerts to unique external ID and MITRE ATT&CK Matrix tactics
27
38
28
39
The following table lists the mapping between alert names, their corresponding unique external IDs, their severity, and their MITRE ATT&CK Matrix™ tactic. When used with scripts or automation, Microsoft recommends use of alert external IDs in place of alert names, as only security alert external IDs are permanent, and not subject to change.
29
40
30
-
### External IDs
31
-
32
41
| Security alert name | Unique external ID | Severity | MITRE ATT&CK Matrix™ |
|[Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030)| 2030 | High | Exfiltration, Lateral movement, Command and control |
68
+
|[Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030)| 2030 | High | Exfiltration, Lateral movement, Command, and control |
60
69
|[Suspicious communication over DNS](other-alerts.md#suspicious-communication-over-dns-external-id-2031)| 2031 | Medium | Exfiltration |
61
70
|[Suspected Golden Ticket usage (ticket anomaly)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-ticket-anomaly-external-id-2032)| 2032 | High | Persistence, Privilege Escalation, Lateral movement |
62
71
|[Suspected Brute Force attack (SMB)](lateral-movement-alerts.md#suspected-brute-force-attack-smb-external-id-2033)| 2033 | Medium | Lateral movement |
@@ -98,14 +107,13 @@ The following table lists the mapping between alert names, their corresponding u
98
107
|[Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435)| 2435 | Medium | Privilege escalation |
Copy file name to clipboardExpand all lines: ATPDocs/automated-response-exclusions.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,27 +18,30 @@ For example, an incident involving Attack Disruption, where response actions are
18
18
19
19
## How to add automated response exclusions
20
20
21
-
1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings** and then **Identities**.
22
21
23
-

22
+
1. In the [Microsoft Defender XDR](https://security.microsoft.com/) portal, go to **Settings** and then **Microsoft Defender XDR**.
24
23
25
-
1. You'll then see **Automated responseexclusions** in the left-hand menu.
24
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-settings1.png" alt-text="Go to Settings, then Microsoft Defender XDR.":::
2. You'll see **Automated response > Identities** in the left-side menu.
28
28
29
-
1. To exclude specific users, select **Exclude Users**.
29
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-automated-response.png" alt-text="Go to Automated response then Identities.":::
30
+
31
+
3. To exclude specific users, select **Add User Exclusion**.
30
32
31
-
:::image type="content" source="media/exclude-users.png" alt-text="Exclude specific users.":::
32
-
33
-
1. Search for the users to exclude and select the **Exclude Users** button.
33
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-add-exclusion.png" alt-text="Exclude specific users.":::
34
+
35
+
4. Search for the users to exclude and select the **Exclude Users** button.
34
36
35
37
:::image type="content" source="media/exclude-specific-users.png" alt-text="Choose which users to exclude.":::
38
+
39
+
5. To remove excluded users, select the relevant users from the list and select the **Remove** button.
36
40
37
-
1. To remove excluded users, select the relevant users from the list and select the **Remove** button.
0 commit comments