In Microsoft Defender for Cloud, are you attempting to track modifications to the alert status? This post will walk you through 4 simple methods to figure out who modified an alert's status and why. To keep up with significant occurrences in your environment, learn how to access the audit logs, use the filter and export options, and set up email notifications.
Tracking changes to the alert status in Microsoft Defender for Cloud can be an important part of maintaining the security of your environment. Whether you're a security administrator, a DevOps engineer, or a cybersecurity professional, being able to identify which user changed the status of an alert can help you stay informed about important events and take appropriate action.
In this article, we'll show you how to use the filter and export options, set up email notifications, and access the audit logs to track changes to the alert status in Microsoft Defender for Cloud. We'll also provide some tips and best practices for managing alerts and keeping your environment secure.
By the time you're done reading, you'll know exactly how to figure out which user modified the alert status in Microsoft Defender for Cloud and have the information and tools you need to keep informed about significant occurrences in your environment. now let's get started!
1. Introduction to Alert Status Changes in Microsoft Defender for Cloud

As you probably know, Microsoft Defender for Cloud (formerly known as Azure Security Center) is a cloud-based security management platform that helps you protect your Azure resources and workloads. One of the key features of Defender for Cloud is the ability to detect and respond to security threats in real-time, using advanced machine learning algorithms and security intelligence.
When Defender for Cloud detects a potential security threat, it generates an alert to inform you of the issue. You can then review the alert, assess the risk level, and take appropriate action to address the issue. The status of an alert can be changed to reflect its current state, such as "new," "in progress," or "closed."
2. Why Tracking Alert Status Changes is Important
As a security administrator, you probably receive a lot of alerts from Defender for Cloud. It's important to stay on top of these alerts and respond to them in a timely manner to ensure that your environment remains secure.
But with so many alerts coming in, it can be easy to lose track of which ones have been addressed and which ones are still open. That's where tracking alert status changes comes in. By keeping track of which user changed the status of an alert, you can stay informed about the current state of your environment and take appropriate action as needed.
3. How to Track Alert Status Modifications in Defender for Cloud
Now that you are aware of how crucial it is to keep tabs on Defender for Cloud alert status changes, let's examine several methods for doing so.
3.1 Use the "Filter" and "Export" Options
Using the "Filter" and "Export" options in the "History" part of the alert details page is one of the simplest methods to keep track of changes to an alert's status in Defender for Cloud.
Follow these steps to use the "Filter" option in the "History" area to limit the list of activities to those connected to changes in alert status in Microsoft Defender for Cloud:
- In the Microsoft Defender for Cloud dashboard, navigate to the "Alerts" tab.
- Find the alert that you are interested in and click on its name to open the alert details page.
- Scroll down to the "History" section and click the "Filter" button.
- In the "Filter" panel that appears, choose the "Action" option from the dropdown menu.
- Type "status" into the text field next to the "Action" dropdown menu. This will filter the list of actions to only those that involve changes to the alert status.
- Click the "Apply" button to apply the filter. The list of actions in the "History" section will now be narrowed down to only those related to alert status changes.

To use the "Export" option to download the history data as a CSV file in Microsoft Defender for Cloud, follow these steps:
- In the Microsoft Defender for Cloud dashboard, navigate to the "Alerts" tab.
- Find the alert that you are interested in and click on its name to open the alert details page.
- Scroll down to the "History" section and click the "Export" button.
- In the "Export to CSV" dialog box that appears, choose a location on your computer to save the CSV file, and then click the "Export" button.
You can open the downloaded CSV file using a spreadsheet tool like Microsoft Excel or Google Sheets after it has been downloaded to the location you chose. A list of all activities made in response to the alert, including any modifications to the alert status, will be included in the file. This information can be used to filter and sort the activities as necessary.

3.2 Set Up Email Notifications
Setting up email alerts is another option to remain updated on Defender for Cloud alert status changes. This will enable you to be notified through email anytime an alert's status changes, which can be a useful method to keep track of significant events occurring around you.
To set up email notifications, go to the "Notifications" tab in the Defender for Cloud dashboard and click "Add notification." You can then choose which types of alerts you want to receive notifications for and specify the email address or addresses that should receive the notifications

Example and Resource from: Configure email notifications for Microsoft Defender for Cloud alerts | Microsoft Learn
3.3 Use the Audit Logs
If you need even more detailed information about alert status changes in Defender for Cloud, you can use the "Audit logs" feature. The audit logs contain detailed information about all the actions that have been performed in Defender for Cloud, including any changes to the alert status.
In Microsoft Defender for Cloud (formerly known as Azure Security Center), you can view the alert history to see who changed the status of an alert. To do this, follow these steps:
- In the Microsoft Defender for Cloud dashboard, navigate to the "Alerts" tab.
- Find the alert that you are interested in and click on its name to open the alert details page.
- Scroll down to the "History" section, and you will see a list of all the actions that have been taken on this alert, including any changes to the alert status.
- Each action in the history list includes a timestamp and the name of the user who performed the action. You can use this information to identify which user changed the alert status.
4. Tips and Best Practices for Managing Alerts in Defender for Cloud
Now that you know how to track alert status changes in Defender for Cloud, here are a few tips and best practices to help you manage alerts more effectively:
- Establish a clear process for managing alerts and responding to security threats. This could include assigning specific users or teams to handle different types of alerts, setting up automated responses for certain types of alerts, and regularly reviewing and updating your alert management policies and procedures.
- Use the "Resource Health" feature in Defender for Cloud to monitor the availability and health of your Azure resources. This can help you identify and troubleshoot issues that might affect the security of your environment.
Alternatively, you can try using a reporting tool or event log analysis software to extract a report of alert status changes. This will allow you to see a list of all the changes made to the alert status and identify which user made the change. Some tools that you might consider using for this purpose include:
- Microsoft Power BI
- Microsoft Azure Monitor
- Splunk
- SolarWinds Log Analyzer
You should be aware that some tools might need to be set up and configured in order for them to function properly, so you might need to spend some time getting familiar with them before you can generate a report. Additionally, in order to retrieve the required data, you might need administrative access to your Defender for Cloud environment. By following these tips and best practices, you can effectively manage alerts in Defender for Cloud and keep your environment secure.
Resources:
5. Conclusion
This article explains how to follow changes in alert status in Microsoft Defender for Cloud by using the "Filter" and "Export" options, configuring email notifications, and accessing the audit logs. You may successfully manage and address any challenges that develop in your environment by remaining informed about significant events and taking necessary action.
We've shared some tips and best practices for managing alerts in Defender for Cloud to help you effectively protect your environment and maintain the security of your Azure resources and workloads.
What about you? Have you ever used Microsoft Defender for Cloud to track alert status changes? Do you have any other advice or best practices you would like to provide our readers? Kindly share your opinions in the section below.