Alert Tuning Quick‐Start Guide (Beginner Edition) - Arkthos/The-Escalation-Protocol GitHub Wiki
Before configuring alert tuning, it’s essential to locate where the tuning options live within Microsoft Defender XDR. Follow these steps:
- Visit https://security.microsoft.com and log in with an account that has at least Security Administrator ermissions.
- In the left-hand navigation panel, click ⚙ Settings, then select Microsoft Defender XDR.
- Under the Rules section, choose Alert tuning. You’ll have two options to start creating a rule
- Create a rule from scratch, defining all criteria manually.
- Create a rule based on an existing alert, which pre-populates some settings. This option is also available from within an alert's detail page under Incidents & Alerts ▶ Alerts.
📌 Tip: If the “Alert Tuning” option isn’t visible, it usually means your account lacks the necessary permissions or licensing.
Action | Minimum Role | Required License |
---|---|---|
View rules | Security Reader | Any Microsoft Defender subscription |
Create/edit rules | Security Operator or Administrator | Defender for Endpoint Plan 2 |
Disable/delete rules | Security Administrator or Global Admin | Defender for Endpoint Plan 2 |
💡 Preview rules or features may require additional licensing aligned with the specific Defender workload.
What Alert Tuning DOES:
Alert Tuning is a feature that helps reduce alert fatigue by learning from repeated, safe patterns and automatically classifying matching alerts. This improves productivity for security teams by allowing them to focus on truly suspicious or harmful behavior.
- Automatically classifies known-good behaviors by hiding or resolving matching alerts.
- Uses evidence from real alerts (e.g., specific file hashes, process names, or IPs).
- Helps enforce alert hygiene and reduce noise in the console.
🚫 What Alert Tuning DOES NOT do:
- Does not change detection logic, alert severity, or threat intelligence.
- Does not apply to alerts retroactively — only works on new alerts after the rule is active.
- Does not replace the need for human investigation.
- Is not officially supported for alerts generated by Custom Detection rules.
Term | Description |
---|---|
Evidence / IOC | The specific object or indicator that triggered the alert |
Condition | A filter that limits the rule to alerts that meet specific evidence values |
Service Source | The Defender workload generating the alert (e.g., Endpoint, Office 365) |
Action | What happens to the alert: Resolve (close) or Hide (remove from queues) |
Action | What It Does | When to Use |
---|---|---|
Resolve | Closes the alert but keeps it in audit logs | When testing or preserving alert history |
Hide | Completely removes alert from dashboards | When confident the alert is noise and safe to hide |
✅ Best Practice: Start every rule in Resolve mode. Monitor for at least one week. If no unexpected matches occur, switch to Hide. Document your justification.
- Autofill uses data directly present in the alert.
- It excludes enriched data from related logs or processes.
- Prevents overfitting — enriched-only fields may cause silent rule failure.
🔍 Add a missing condition only if you're sure the field is directly part of the alert object.
🚧 Microsoft is working on "contextual suppression" to include enriched fields (not available yet).
Let’s walk through a real-world example. Suppose your team runs a trusted administrative script every night that triggers the “Suspicious remote execution (PsExec)” alert. You want to suppress it:
- Go to Incidents & Alerts ▶ Alerts and select the PsExec alert.
- Click Tune Alert ▶ Only this alert type to scope the rule to just this category.
- Use Autofill rule conditions, and verify it includes:
Process name = PsExec.exe
Device group = Servers-Prod
- Choose
Action = Resolve
, and give the rule a descriptive name such as:
LT-Infra-PsExec-Resolve
- Monitor the rule for one week:
- Go to Settings ▶ Alert Tuning ▶ Associated Alerts
- Confirm that only expected alerts are being resolved
- If everything looks good, return to the rule and change the
Action = Hide
to clean up the dashboard.
- Disable a rule: Settings ▶ Alert Tuning ▶ … ▶ Turn off
- Delete a rule: Same menu ▶ Delete
💡 If unsure, switch back to Resolve before deleting for visibility.
- Use clear naming conventions: e.g.,
LT-Network-SMBScan
- Always fill in the Comments field.
- Review rules quarterly.
- Export associated alerts to CSV for analysis.
- Automate Teams notifications when a rule triggers via Power Automate.
Symptom | Likely Cause | Suggested Fix |
---|---|---|
“Alert tuning” not visible | Missing permissions/license | Check role and Defender Plan 2 availability |
Rule saved but alerts still show | Mismatched evidence/condition | Review rule conditions and wildcards |
Hidden alerts too aggressive | Rule action too strict | Switch to Resolve to regain visibility |
📄 Authored by Arkthos - Version 1.3 – April 2025