How to Configure Alert Notifications in Microsoft Defender for Endpoint

Configure email notifications, SIEM integration, and alert rules in Microsoft Defender for Endpoint to ensure timely response to security threats.

8 min readUpdated January 2025

Want us to handle this for you?

Get expert help →

Timely notification of security alerts is critical for effective incident response. Microsoft Defender for Endpoint provides flexible notification options including email alerts, SIEM integration, and Microsoft Teams notifications. This guide covers configuring all notification methods to ensure your security team never misses a critical alert.

Prerequisites

Before configuring notifications, ensure you have:

  • Microsoft Defender portal access with Security Administrator role
  • Email addresses for notification recipients
  • Device groups configured (for targeted notifications)
  • SIEM access (if configuring SIEM integration)
  • Microsoft Teams (optional, for Teams notifications)

Step 1: Access Notification Settings

  1. Sign in to the Microsoft Defender portal
  2. Navigate to Settings > Endpoints > Email notifications
  3. You'll see existing notification rules and options to create new ones

Step 2: Configure Email Notification Rules

Create a New Notification Rule

  1. Click Add notification rule

  2. Configure the General settings:

    • Rule name: Descriptive name (e.g., "Critical Alerts - SOC Team")
    • Include organization name: Check to add your org name to email subject
    • Include device information: Check to include device details in alerts
  3. Configure Notification settings:

    • Email recipients: Add email addresses (separate with semicolons)
    • Alert severity: Select which severities trigger notifications
  4. Configure Device group scope:

    • All devices: Receive alerts from all onboarded devices
    • Selected device groups: Choose specific groups
  5. Click Save

Create separate rules for different scenarios:

Rule NameSeverityRecipientsDevice Groups
Critical Alerts - SOCHigh[email protected]All devices
Server AlertsHigh, Medium[email protected]Servers
Executive DevicesHigh, Medium, Low[email protected]Executive Laptops
All Alerts - ArchiveAll[email protected]All devices

Configure Rule Priority

If a device belongs to multiple groups, notifications follow the first matching rule. Organize rules from most specific to most general:

  1. VIP/Executive devices (highest priority)
  2. Critical infrastructure servers
  3. Specific department devices
  4. General workstation alerts (lowest priority)

Step 3: Configure SIEM Integration

Enable SIEM API Access

  1. In the Defender portal, go to Settings > Endpoints > APIs > SIEM
  2. Click Enable SIEM connector
  3. Note your Application URI and Client ID
  4. Generate a new Client Secret and save it securely

Supported SIEM Platforms

SIEMIntegration MethodDocumentation
Microsoft SentinelNative connectorBuilt-in data connector
SplunkSplunk Add-onMicrosoft Defender Add-on for Splunk
IBM QRadarDSMMicrosoft Defender for Endpoint DSM
ArcSightSmartConnectorMicro Focus connector
GenericREST APIPull alerts via API

Configure Microsoft Sentinel Integration

  1. In Azure Portal, open your Sentinel workspace
  2. Go to Data connectors
  3. Search for Microsoft Defender for Endpoint
  4. Click Open connector page
  5. Click Connect to enable the connector
  6. Alerts will flow automatically within minutes

Configure API-Based SIEM Integration

For SIEMs using the REST API:

API Endpoint:

https://api.securitycenter.microsoft.com/api/alerts

Authentication:

# Get access token
curl -X POST "https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/token" \
  -d "client_id={client_id}" \
  -d "client_secret={client_secret}" \
  -d "scope=https://api.securitycenter.microsoft.com/.default" \
  -d "grant_type=client_credentials"

Fetch Alerts:

curl -X GET "https://api.securitycenter.microsoft.com/api/alerts" \
  -H "Authorization: Bearer {access_token}" \
  -H "Content-Type: application/json"

Configure Event Hub Streaming

For real-time streaming to SIEM:

  1. Go to Settings > Endpoints > APIs > Streaming API
  2. Click Add to create a streaming rule
  3. Configure:
    • Name: Descriptive name
    • Event Hub namespace: Select or create
    • Event Hub name: Create dedicated hub
    • Event types: Select alerts, advanced hunting events, etc.
  4. Click Submit

Step 4: Configure Microsoft Teams Notifications

  1. Go to Power Automate
  2. Create a new Automated cloud flow
  3. Search for Microsoft Defender for Endpoint connector
  4. Select trigger: When an alert is created
  5. Add action: Post message in a chat or channel (Microsoft Teams)
  6. Configure the Teams message:
    • Team: Select your security team
    • Channel: Select alerts channel
    • Message: Use dynamic content to include alert details

Sample Flow Configuration:

Trigger: When an alert is created
  ↓
Condition: Alert severity equals "High" or "Medium"
  ↓
Action: Post to Teams
  - Channel: #security-alerts
  - Message:
    🚨 **Defender Alert**
    **Title:** @{triggerOutputs()?['body/Title']}
    **Severity:** @{triggerOutputs()?['body/Severity']}
    **Device:** @{triggerOutputs()?['body/MachineId']}
    **Description:** @{triggerOutputs()?['body/Description']}
    [View Alert](@{triggerOutputs()?['body/AlertLink']})

Using Logic Apps

For more complex workflows:

  1. Create a new Logic App in Azure Portal
  2. Use the Microsoft Defender for Endpoint connector
  3. Build custom notification logic with conditions, approvals, etc.
  4. Route to Teams, email, ticketing systems, or custom webhooks

Step 5: Configure Alert Suppression Rules

Reduce noise by suppressing known benign alerts:

  1. Go to Settings > Endpoints > Alert suppression
  2. Click Add suppression rule
  3. Configure:
    • Rule name: Descriptive name (e.g., "Suppress IT Admin Tool Alerts")
    • Alert title: Match specific alert titles
    • IOC indicators: Match specific file hashes, IPs, etc.
    • Device groups: Limit suppression scope
    • Expiration: Set end date for rule
  4. Click Save

Warning: Use suppression rules carefully. Over-suppressing can mask real threats. Review suppressed alerts regularly.

Step 6: Test Notification Configuration

Generate a Test Alert

Run the detection test to verify notifications:

Windows:

powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference='silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'

Verify Notification Receipt

  1. Check email inbox within 15-20 minutes
  2. Check Teams channel if configured
  3. Verify SIEM received the alert
  4. Review alert in Defender portal to correlate

Troubleshoot Missing Notifications

If notifications aren't received:

  1. Check notification rule scope: Ensure device is in targeted group
  2. Verify email addresses: Check for typos
  3. Check spam folders: Defender emails may be filtered
  4. Review rule priority: Higher priority rules may be catching alerts
  5. Check suppression rules: Alert may be suppressed
  6. Verify SIEM connectivity: Check API credentials and network access

Best Practices

Notification Strategy

  1. Tiered approach: Route critical alerts to on-call staff, others to queues
  2. Avoid alert fatigue: Don't send all alerts via email; use dashboards for low-severity
  3. Include context: Configure notifications to include device details and alert descriptions
  4. Deduplicate: Use SIEM correlation to group related alerts

Email Notification Tips

  • Use distribution lists rather than individual emails for easier management
  • Create a dedicated security mailbox for alert archiving
  • Consider on-call rotation integration for after-hours alerts

SIEM Integration Tips

  • Configure appropriate polling intervals (5-15 minutes typical)
  • Set up correlation rules to group related alerts
  • Create dashboards for alert trends and metrics
  • Implement automated playbooks for common alert types

Notification Rule Examples

Rule 1: Critical Infrastructure

Name: Critical Infrastructure - Immediate
Severity: High
Device Groups: Domain Controllers, Database Servers, Payment Systems
Recipients: [email protected], [email protected]
Include: Organization name, Device details

Rule 2: Endpoint Alerts

Name: Workstation Alerts - Standard
Severity: High, Medium
Device Groups: All Workstations
Recipients: [email protected]
Include: Organization name, Device details

Rule 3: Compliance Monitoring

Name: PCI Scope Devices
Severity: All
Device Groups: PCI-DSS Scope
Recipients: [email protected], [email protected]
Include: Organization name, Device details

Next Steps

After configuring notifications:


Need help optimizing your security operations? Inventive HQ provides managed detection and response services built on Microsoft Defender for Endpoint. Contact us to improve your security posture.

Frequently Asked Questions

Find answers to common questions

Yes, you can configure multiple email recipients for alert notifications. Add multiple email addresses when creating notification rules, or create separate rules for different severity levels targeting different teams. For example, send critical alerts to your SOC team and medium-severity alerts to IT administrators.

Need Professional IT & Security Help?

Our team of experts is ready to help protect and optimize your technology infrastructure.