Managed Sentinel – Alert 202
| Alert ID | MS-A202 |
| Alert Name | Silent log source monitoring - Windows Security |
| Description | This alert is triggered when Sentinel can no long detect Security Event log entries from a Windows log source (in the last 1 hour). |
| Severity Level | Informational |
| Threat Indicator | System monitoring impact |
| MITRE ATT&CK Tactics | Execution |
| Log sources | Windows |
| False Positives | Windows server has been decommissioned (planned change) |
| Recommendations | 1. Customer needs to investigate on the Windows server if Microsoft Monitoring Agent is stopped or misconfigured 2. Notify MSSP provider to this server from Azure Sentinel monitoring scope ( applicable if server has been decommissioned) |
