|
| 1 | +The Alert dashboard in Microsoft Purview Insider Risk Management helps investigators and analysts view, prioritize, and take action on potentially risky user activity. Each alert is based on policy-defined conditions and provides a summary of the user's actions, associated risks, and relevant context. Effective alert triage ensures that high-risk behavior is addressed quickly, while low-risk activity can be dismissed to reduce noise. |
| 2 | + |
| 3 | +## Overview of the Alert dashboard |
| 4 | + |
| 5 | +The Alert dashboard provides a centralized view of all alerts generated by insider risk policies. Each alert is tied to a single user and includes: |
| 6 | + |
| 7 | +- **Alert summary**: Displays the risk severity level, alert score, activity that triggered the alert, and triggering event. |
| 8 | +- **User details and history**: Shows general user information and past alerts, including unresolved or repeated risk patterns. |
| 9 | +- **Tabs for deeper analysis**: Includes tabs for **All risk factors**, **User activity**, and **Activity explorer** to review specific behavior in detail. |
| 10 | + |
| 11 | +Alerts are automatically categorized by severity (low, medium, high) and can be filtered by status, policy, risk factor, or other criteria. Each new insight related to a user is added to their existing alert instead of generating a new one. |
| 12 | + |
| 13 | +> [!NOTE] |
| 14 | +> Only unrestricted administrators or users with proper role assignments can view alerts, depending on how administrative units are scoped. |
| 15 | +
|
| 16 | +## Filtering and customizing views |
| 17 | + |
| 18 | +When working with a high volume of alerts, filtering and customizing your view can improve efficiency: |
| 19 | + |
| 20 | +- **Add filters** to narrow results by attributes like risk factor, severity, policy, assigned analyst, or triggering event. |
| 21 | +- **Save custom filter views** to quickly return to commonly used alert queues. |
| 22 | +- **Customize columns** to show or hide fields like policy name, time detected, or alert status. |
| 23 | +- **Search by keyword** such as user principal name (UPN), alert ID, or assigned admin. |
| 24 | + |
| 25 | +These tools help reduce investigation time and support consistency across teams. |
| 26 | + |
| 27 | +## Triage and take action on alerts |
| 28 | + |
| 29 | +Once you've identified an alert that needs review, you can triage and take action directly from the Alert details page: |
| 30 | + |
| 31 | +- **Dismiss** the alert if it was triggered by expected or non-risky behavior. |
| 32 | +- **Confirm and create a case** to escalate the alert for deeper investigation. |
| 33 | +- **Assign** the alert to another analyst or investigator. |
| 34 | + |
| 35 | +Each alert is assigned a risk severity score based on multiple factors, including frequency of activity, user history, and the presence of risk indicators. If an alert remains untriaged and more risky behavior occurs, its severity level might increase. |
| 36 | + |
| 37 | +> [!TIP] |
| 38 | +> You can select and dismiss multiple low-priority alerts in bulk using the command bar. Up to 400 alerts can be dismissed at once. |
| 39 | +
|
| 40 | +## Use Copilot to accelerate triage |
| 41 | + |
| 42 | +If enabled, Security Copilot embedded in Microsoft Purview can summarize an alert to help you triage faster. Without opening the alert, you can select **Summarize with Copilot** to generate an overview that includes: |
| 43 | + |
| 44 | +- Policy name and triggering event |
| 45 | +- Activity that generated the alert |
| 46 | +- Key user attributes |
| 47 | +- Top risk factors |
| 48 | + |
| 49 | +Copilot can also suggest questions to help refine your summary, such as: |
| 50 | + |
| 51 | +- What actions did the user perform in the last 10 days? |
| 52 | +- List all sequential activities involving this user. |
| 53 | +- Did the user engage in any unusual behavior? |
| 54 | + |
| 55 | +These insights make it easier to prioritize the most important alerts and dismiss those that don't require follow-up. |
| 56 | + |
| 57 | +## Retention and alert limits |
| 58 | + |
| 59 | +Alerts in a "Needs review" state are retained for 120 days. After this period, they're automatically deleted unless linked to an active case. Active and unresolved cases are retained indefinitely. Organizations can have up to 100 active cases at any given time. |
| 60 | + |
| 61 | +The Alert dashboard is the central hub for reviewing and triaging insider risk alerts in Microsoft Purview. It allows investigators to: |
| 62 | + |
| 63 | +- Quickly assess risk severity and context |
| 64 | +- Filter and organize large volumes of alerts |
| 65 | +- Use Copilot to streamline triage |
| 66 | +- Assign, dismiss, or escalate alerts as needed |
| 67 | + |
| 68 | +By combining automated insights with manual review tools, the Alert dashboard supports efficient, accurate investigation workflows aligned with your organization's risk management goals. |
0 commit comments