Verify that That 'Notify about alerts with the following severity' is Set to 'High'
Last updated: April 9, 2026
Framework Reference: A.5.25 Integration: Azure – Microsoft Defender for Cloud
Why this matters
Enabling security alert notifications ensures that designated security contacts or subscription owners are notified of high-severity threats in real time. This allows your team to quickly respond to incidents, reducing the potential damage from compromised resources or ongoing attacks.
What this check does
Check Logic
Verifies that the security contact settings have:
alertNotificationsset to"On"alertsToAdminsset to"On"minimalSeverityset appropriately (e.g.,High)
Applies to
All Azure subscriptions using Microsoft Defender for Cloud
How to fix it
Azure Portal
Go to Microsoft Defender for Cloud
Under Management, select Environment settings
Click on the appropriate Subscription
Click Email notifications
Check the box Notify about alerts with the following severity (or higher)
Select an appropriate severity level (e.g., High)
Click Save
Repeat for each subscription
Azure CLI
Prepare a file named input.json:
{ "id": "/subscriptions/<subscriptionId>/providers/Microsoft.Security/securityContacts/default", "name": "default", "type": "Microsoft.Security/securityContacts", "properties": { "email": "<validEmailAddress>", "alertNotifications": "On", "alertsToAdmins": "On" } }
Then run:
az account get-access-token --query "{subscription:subscription,accessToken:accessToken}" --out tsv | xargs -L1 bash -c \ 'curl -X PUT -H "Authorization: Bearer $1" -H "Content-Type: application/json" \ https://management.azure.com/subscriptions/<$0>/providers/Microsoft.Security/securityContacts/default?api-version=2017-08-01-preview \ -d@"input.json"'
PowerShell
Not officially documented; CLI or Portal is preferred.
Exceptions
None