You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: "Overview of the Alerts page in Microsoft 365 Lighthouse"
3
+
f1.keywords: NOCSH
4
+
ms.author: sharik
5
+
author: SKjerland
6
+
manager: scotv
7
+
ms.reviewer: algreer
8
+
ms.date: 06/30/2023
9
+
audience: Admin
10
+
ms.topic: article
11
+
ms.service: microsoft-365-lighthouse
12
+
ms.localizationpriority: medium
13
+
ms.collection:
14
+
- Tier1
15
+
- scotvorg
16
+
- M365-subscription-management
17
+
- Adm_O365
18
+
ms.custom:
19
+
- AdminSurgePortfolib
20
+
- M365-Lighthouse
21
+
search.appverid: MET150
22
+
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to view alerts in Lighthouse."
23
+
---
24
+
25
+
# Overview of the Alerts page in Microsoft 365 Lighthouse
26
+
27
+
As an MSP provider, you need to monitor and respond to the security issues of your customers efficiently and effectively. Microsoft 365 Lighthouse introduces alerts, a powerful tool that gives you a consolidated view of all the high priority detections and alerts across your customers. You can see a prioritized list of the most urgent issues that require your attention and take immediate action to resolve them. You can also enable push alerts to your existing support systems and flows, so you never miss a critical alert that needs your intervention.
28
+
29
+
To help you get started, Lighthouse provides a default set of alerting rules based on best practices and recommendations. You can use these rules as they are or modify them according to your preferences and needs. You can also create rules from scratch for more control and flexibility.
30
+
31
+
## Alerts tab
32
+
33
+
The **Alerts** tab provides a consolidated view of potential security issues across all your customers. The tab contains two sections:
34
+
35
+
-**Alert resolution rate** – a graph that displays historical information about alerts and their status over time.
36
+
37
+
-**Alert report** – a table of current alerts that can be filtered by alert type, severity, status, and assigned to.
38
+
39
+
From the table, you can select any alert to see more detailed information, including:
40
+
41
+
- Alert description
42
+
- Affected tenant(s)
43
+
- Rule that triggered the alert
44
+
- Alert type
45
+
- Time stamp (First detected, last updated)
46
+
- Impacted entity
47
+
48
+
You can update the severity and status of the alert and assign the alert to a specific user to resolve. From the **Comments and history** tab, you have a complete history of the alert. You can also add additional comments to the alert as needed.
49
+
50
+
### Alert Types
51
+
52
+
Lighthouse defines six alert types.
53
+
54
+
- Non-compliant
55
+
- Device without antivirus protection
56
+
- Variance detection
57
+
- Risky user
58
+
- Security incident
59
+
- Active threat on device
60
+
61
+
The **Alerts** tab also includes the following options:
62
+
63
+
-**Export:** Select to export alert data to an Excel comma-separated values (.csv) file.
64
+
-**Refresh:** Select to retrieve the most current alert data.
65
+
-**Search:** Enter keywords to locate a specific alert in the list.
66
+
67
+
:::image type="content" source="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-tab.png" alt-text="Screenshot of the Alerts tab in Lighthouse." lightbox="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-tab.png":::
68
+
69
+
## Alert rules tab
70
+
71
+
The **Alert rules** tab lets you create and edit alert rules. Lighthouse provides six default alert rules that are automatically applied to all customers. You can edit existing rules or create your own custom rules. Select **Create alert rule**, and Lighthouse will guide you step by step in creating your first alert rule.
72
+
73
+
The Alert rules tab also includes the following options:
74
+
75
+
-**Create alert rule:** Select to create a new alert.
76
+
-**Edit alert rule:** Select to edit an existing alert rule.
77
+
-**Delete:** Select to delete an alert rule from the list.
78
+
-**Search:** Enter keywords to locate a specific alert rule in the list.
79
+
80
+
:::image type="content" source="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-rules-tab.png" alt-text="Screenshot of alerts rules tab." lightbox="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-rules-tab.png":::
81
+
82
+
## Related content
83
+
84
+
[Create and manage alert rules](m365-lighthouse-alerts-overview.md) (article)\
85
+
[Overview of the Threat management page in Microsoft 365 Lighthouse](m365-lighthouse-threat-management-page-overview.md) (article)\
86
+
[Mitigate threats in Microsoft 365 Lighthouse with Microsoft Defender Antivirus](m365-lighthouse-mitigate-threats.md) (article)\
87
+
[Overview of the Device security page in Microsoft 365 Lighthouse](m365-lighthouse-device-security-overview.md) (article)\
88
+
[Overview of the Vulnerability management page in Microsoft 365 Lighthouse](m365-lighthouse-vulnerability-management-page-overview.md) (article)
title: "Create and manage alert rules in Microsoft 365 Lighthouse"
3
+
f1.keywords: NOCSH
4
+
ms.author: sharik
5
+
author: SKjerland
6
+
manager: scotv
7
+
ms.reviewer: algreer
8
+
ms.date: 06/30/2023
9
+
audience: Admin
10
+
ms.topic: article
11
+
ms.service: microsoft-365-lighthouse
12
+
ms.localizationpriority: medium
13
+
ms.collection:
14
+
- Tier1
15
+
- scotvorg
16
+
- M365-subscription-management
17
+
- Adm_O365
18
+
ms.custom:
19
+
- AdminSurgePortfolib
20
+
- M365-Lighthouse
21
+
search.appverid: MET150
22
+
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to create alert rules."
23
+
---
24
+
25
+
# Create and manage alert rules in Microsoft 365 Lighthouse
26
+
27
+
Alert rules allow you to configure high priority alerts from various data sources, such as Risky Users, Microsoft Defender for Business, Microsoft Defender Antivirus, Device Compliance, and more. Lighthouse supports the creation of six alert types:
28
+
29
+
- Non-compliant
30
+
- Device without antivirus protection
31
+
- Variance detection
32
+
- Risky user
33
+
- Security incident
34
+
- Active threat on device
35
+
36
+
## Before you begin
37
+
38
+
You must be a Global Administrator to create and manage alert rules.
39
+
40
+
## Create a new alert rule
41
+
42
+
1. In the left navigation pane in Lighthouse, select **Alerts**.
43
+
2. On the **Alerts** page, select **Alerts rules** tab.
44
+
3. Select **Create alert rule**. The alert rules wizard opens.
45
+
4. From the **Set up the basics** page, configure the following basic information:
46
+
1. Name of the alert
47
+
2. Alert type
48
+
3. Description of the alert
49
+
5. Select **Next**.
50
+
6. From the **Settings** page, configure alert settings. The number of settings vary based on the alert type you choose.
51
+
7. Select **Next**.
52
+
8. From the **Tenants** page, select which tenants to monitor.
53
+
9. From the **Recipients** page, select who should receive email notification when this alert is triggered. You can send notifications to users, security groups, or ticketing system.
54
+
10. Review the information and then select **Create alert rule**.
55
+
56
+
## Edit an existing alert rule
57
+
58
+
1. In the left navigation pane in Lighthouse, select **Alerts**.
59
+
2. On the **Alerts** page, select **Alerts rules** tab.
60
+
3. From the list, select an alert rule you want to edit.
61
+
4. Select **Edit alert rule**. The alert rules wizard opens.
62
+
5. Step through each page and edit any settings as needed.
63
+
6. Review your changes and then select **Edit alert rule**.
64
+
65
+
## Delete an alert rule
66
+
67
+
1. In the left navigation pane in Lighthouse, select **Alerts**.
68
+
2. On the **Alerts** page, select **Alerts rules** tab.
69
+
3. From the list, select an alert rule you want to delete.
70
+
4. Select **Delete**.
71
+
5. In the confirmation window, select **Delete**.
72
+
73
+
## Related content
74
+
75
+
[Overview of the Alerts page in Microsoft 365 Lighthouse](m365-lighthouse-alerts-overview.md) (article)
Copy file name to clipboardExpand all lines: microsoft-365/lighthouse/m365-lighthouse-manage-mfa.md
+61-26Lines changed: 61 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.author: sharik
5
5
author: SKjerland
6
6
manager: scotv
7
7
ms.reviewer: ragovind
8
-
ms.date: 10/20/2021
8
+
ms.date: 06/30/2023
9
9
audience: Admin
10
10
ms.topic: article
11
11
ms.service: microsoft-365-lighthouse
@@ -24,57 +24,92 @@ description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
24
24
25
25
# Manage multifactor authentication in Microsoft 365 Lighthouse
26
26
27
-
Azure Active Directory (Azure AD) Multi-Factor Authentication (MFA) helps safeguard access to data and applications, providing another layer of security by using a second form of authentication. The Multifactor Authentication page provides detailed information on the status of MFA enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users haven't yet registered for MFA.
27
+
Microsoft 365 Lighthouse allows you to manage multifactor authentication (MFA) settings across all tenants. The Multifactor Authentication page provides detailed information on the status of MFA enablement and the ability to take action on specific users.
28
28
29
-
For small- and medium-sized business (SMB) customers, Microsoft recommends enabling[security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)at a minimum. For more complex scenarios, you can use[Conditional Access](/azure/active-directory/conditional-access/overview)to configure specific policies.
29
+
For small- and medium-sized business (SMB) customers, Microsoft recommends enabling[security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)at a minimum. For more complex scenarios, you can use[Conditional Access](/azure/active-directory/conditional-access/overview)to configure specific policies.
30
30
31
31
## Before you begin
32
32
33
-
The following conditions must be met before a tenant will appear in the list:
33
+
The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Microsoft 365 Lighthouse tenant list overview](m365-lighthouse-tenant-list-overview.md).
34
34
35
-
- The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support MFA, see [Features and licenses for Azure AD Multi-Factor Authentication](/azure/active-directory/authentication/concept-mfa-licensing).
35
+
## Notify users who aren't registered for MFA
36
36
37
-
- The customer tenant must be active within Microsoft 365 Lighthouse. To learn how to determine if a tenant is active, see [Microsoft 365 Lighthouse tenant list overview](/microsoft-365/lighthouse/m365-lighthouse-tenant-list-overview).
37
+
1. In the left navigation pane in Lighthouse, select **Users**\>**Multifactor authentication**.
38
38
39
-
## Enable MFA for a tenant
39
+
2. Select the tenant that contains the user(s) that you want to notify.
40
40
41
-
1. In the left navigation pane in Lighthouse, select **Users** > **Multifactor authentication**.
41
+
3. Select **Users not registered for MFA** tab.
42
42
43
-
2. On the **Multifactor Authentication** page, look for a tenant currently not using MFA, and then select that tenant to open the tenant details pane.
43
+
4. Select the tenant containing the user(s) you want to notify.
44
44
45
-
3. On the **MFA enablement** tab, under **MFA with Security defaults**, select **Enable Security defaults**.
45
+
5. Select **Create email**.
46
46
47
-
4. Select **Save changes**.
47
+
Your default email application creates a sample email addressed to each selected user.
48
48
49
-
To enable MFA through Conditional Access, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](/azure/active-directory/authentication/tutorial-enable-azure-mfa).
49
+
6. Edit the notification email if needed.
50
50
51
-
## Notify users who aren't registered for MFA
51
+
7. Send the email.
52
52
53
-
1. In the left navigation pane in Lighthouse, select **Users** > **Multifactor authentication**.
53
+
> [!TIP]
54
+
> Select the **Admin**, **Guest**, or **Members** counts to filter the list by type. If any user accounts in the list are emergency access or service accounts for which you don't want to require MFA, select those user accounts and then select **Exclude users**. The excluded user accounts will no longer appear in the list of users not registered for MFA.
54
55
55
-
2. On the **Multifactor Authentication** page, look for tenants with users not registered for MFA, and then select the tenant to open the tenant details pane.
56
+
> [!NOTE]
57
+
> Lighthouse opens your default email client and prepopulates the email message with instructions to register for MFA. All the selected users will be included on the BCC line. If you prefer to individually email users, you can select the email icon next to the username.
58
+
>
59
+
> If you want to use a different email account, you can export the list of users to a file. You can also download sample email templates you can customize with your company branding.
60
+
61
+
## Exclude users from MFA registration
62
+
63
+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
64
+
65
+
2. Select the tenant containing the user(s) you want to exclude.
56
66
57
67
3. Select **Users not registered for MFA** tab.
58
68
59
-
4. Select all other users in the list who need to register for MFA, and then select **Create email**.
69
+
4. Select the user(s) that you want to exclude.
60
70
61
-
> [!TIP]
62
-
> Select the **Admin**, **Guest**, or **Members** counts to filter the list by type. If any of the user accounts in the list are emergency access accounts or service accounts for which you don't want to require MFA, select those user accounts, and then select **Exclude users**. The excluded user accounts will no longer appear in the list of users not registered for MFA.
71
+
5. Select **Exclude users**.
72
+
73
+
6. In the **Exclude users** pane, select **Save changes** to save the changes in both Lighthouse and the tenant.
63
74
64
75
> [!NOTE]
65
-
> If any shared mailbox accounts or inactive user accounts appear in the list of users not registered for MFA, we recommend that you block signin for those accounts so they'll no longer appear in this list.
76
+
> Ensure that the **Microsoft 365 Lighthouse - MFA Exclusions** security group is excluded from the tenant’s Conditional Access policies that require MFA and from the applicable deployment tasks in the tenant’s deployment plan in Lighthouse.
77
+
78
+
## Block sign-in for users not registered for MFA
66
79
67
-
Lighthouse opens your default email client and prepopulates the email message with instructions to register for MFA. All the selected users will be included on the BCC line. If you prefer to individually email users, you can select the email icon next to the username.
80
+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
81
+
2. Select the tenant that contains the user(s) you want to block.
82
+
3. Select **Users not registered for MFA** tab.
83
+
4. Select the user(s) that you want to block.
84
+
5. Select **Block sign-in**.
85
+
6. In the **Manage sign-in status** pane, select **Block users from signing in**.
86
+
7. Select **Save**.
87
+
88
+
> [!NOTE]
89
+
> Ensure If any shared mailbox accounts or inactive user accounts appear in the list of users not registered for MFA, we recommend you block sign-in for those accounts to remove them from the list.
68
90
69
-
If you want to use a different email account, you can export the list of users to a file. You can also download sample email templates that you can customize with your company branding.
91
+
Blocking a user prevents anyone from signing in as this user and is a good idea when you think their password or username may be compromised. Blocking a user immediately stops any new sign-ins for that account. The account will be automatically signed out from all Microsoft services within 60 minutes if the account is signed in. This won't stop the account from receiving mail and doesn't delete any account data.
92
+
93
+
## Remove a user from the Excluded users group
94
+
95
+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
96
+
2. Select the tenant that contains the user(s) you want to remove.
97
+
3. Select **Exclude users** tab.
98
+
4. Select the user(s) that you want to remove.
99
+
5. Select **Remove**.
100
+
6. In the confirmation message, select **Remove**.
101
+
102
+
> [!NOTE]
103
+
> The excluded users listed in Lighthouse will reflect the current membership **Microsoft 365 Lighthouse - MFA exclusions** security group but will not confirm that the group has been excluded from the tenant’s Conditional Access policies that require MFA or from the applicable deployment tasks in the tenant’s deployment plan in Lighthouse.
70
104
71
105
## Next steps
72
106
73
-
Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset (SSPR). SSPR gives users the ability to change or reset their password with no administrator or help desk involvement. For more information, see [Manage self-service password reset in Microsoft 365 Lighthouse](m365-lighthouse-manage-sspr.md).
107
+
Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset (SSPR). SSPR allows users to change or reset passwords without administrator or help desk involvement. For more information, see Manage self-service password reset in Microsoft 365 Lighthouse. For more information, see [Manage self-service password reset in Microsoft 365 Lighthouse](m365-lighthouse-manage-sspr.md).
74
108
75
109
## Related content
76
110
77
-
[Plan an Azure Active Directory Multi-Factor Authentication deployment](/azure/active-directory/authentication/howto-mfa-getstarted) (article)\
78
-
[What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) (article)\
79
-
[What is Conditional Access?](/azure/active-directory/conditional-access/overview) (article)\
80
-
[Learn how to convert users from per-user MFA to Conditional Access](/azure/active-directory/authentication/howto-mfa-getstarted#convert-users-from-per-user-mfa-to-conditional-access-based-mfa) (article)
111
+
[Overview of multifactor authentication in Lighthouse](m365-lighthouse-mfa-overview.md) (article)\
112
+
[Plan an Azure Active Directory Multi-Factor Authentication deployment](/azure/active-directory/authentication/howto-mfa-getstarted) (article)\
113
+
[What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) (article)\
114
+
[What is Conditional Access?](/azure/active-directory/conditional-access/overview) (article)\
115
+
[Learn how to convert users from per-user MFA to Conditional Access](/azure/active-directory/authentication/howto-mfa-getstarted#convert-users-from-per-user-mfa-to-conditional-access-based-mfa) (article)
0 commit comments