June 30, 2021
Microsoft Security

Microsoft Defender for Office 365: Managing alerts

Microsoft Security logo

This demo introduces the unified Alerts queue in Microsoft 365 Defender and how it helps SecOps manage alerts from multiple detection sources—including Defender for Office 365, Defender for Endpoint, Defender for Identity, and more. It shows using the Detection source column, opening an alert’s details side pane (state, triggering policy, linked incident, automated investigation, impacted entities), and the unified alert page layout with asset cards and an alert story that updates as you select messages or activities. It also highlights pivoting into the new email entity page for richer email analysis (authentication, detection and override details, email/header preview) and detonation insights in Attachments and URL tabs (observed files, IPs, URLs, screenshots, behaviors). Finally, it urges teams to update alert status/classification/determination for tuning—and explains why incidents are the better starting point: Defender correlates alerts into incidents, shows why alerts are linked (message ID, URL, file, user), and makes assignment and resolution faster across all related alerts.

We produced this as a clarity-driven navigation demo: show the alerts experience, then show the smarter habit (start from incidents) and why it reduces alert fatigue. The flow is designed to make the UI feel consistent across sources, with crisp pivots to deeper evidence when needed and a clean wrap on best practices. Final delivery includes closed captions, audio description, and thumbnails.

Microsoft Security logo
Share this video