{"id":44183,"date":"2021-11-29T17:00:21","date_gmt":"2021-11-29T17:00:21","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=102117"},"modified":"2021-11-29T17:00:21","modified_gmt":"2021-11-29T17:00:21","slug":"how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/","title":{"rendered":"How Red Canary and Microsoft can help reduce your alert fatigue"},"content":{"rendered":"<p><em class=\"x-hidden-focus\">This blog post is part of the Microsoft Intelligent&nbsp;Security Association&nbsp;<a href=\"https:\/\/aka.ms\/MISAGuestBlog\" target=\"_blank\" rel=\"noopener\">guest blog series<\/a>.&nbsp;<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noopener\">Learn more about MISA<\/a>.<\/em><\/p>\n<h2>Security alert fatigue<\/h2>\n<p>Organizations often feel overwhelmed by the number of security alerts they receive. Frustrated by alert fatigue, these organizations want a deeper understanding of security threats and extended coverage to protect themselves. Enterprises typically maintain<strong> 70 security products from 35 different vendors<\/strong><sup>1<\/sup> and burnout from alert fatigue can lead to choices that put a company\u2019s security at risk. Prospective customers have told us they mute security alerts or create rules to ignore or turn off alerts. Some security operations leaders have even said that if a security alert isn\u2019t resolved within a week, it\u2019s automatically deleted from the system.<\/p>\n<p>Security alert fatigue happens when employees become desensitized to alerts and alarms from tools and technology because of their frequency. Since 2019, the number of <strong>security alerts has increased by 34 percent<\/strong>.<sup>2<\/sup> In fact, <strong>44 percent of alerts go uninvestigated<\/strong><sup>1<\/sup> because of the high volume and inadequate staff levels.<\/p>\n<h2>Red Canary is a security ally for customers<\/h2>\n<p>Security alerts lack the context customers need to determine which alerts are a serious threat and which are noise. They also wonder, \u201cIf we were attacked, how fast could we contain a security threat?\u201d Security alerts don\u2019t answer this question. That\u2019s why Red Canary, a cybersecurity software as a service (SaaS) company that provides outcome-focused solutions for security operations teams, developed a security operations platform that powers their Managed Detection and Response (MDR) solutions. Red Canary MDR integrates with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a> to help customers detect and respond to cybersecurity threats in their environment. <a href=\"https:\/\/redcanary.com\/products\/mdr-for-endpoints\/microsoft-defender-for-endpoint\/\" target=\"_blank\" rel=\"noopener\">Red Canary MDR + Microsoft Defender for Endpoint<\/a> is a powerful combination for modern security operations teams to protect their organizations.<\/p>\n<p>Founded in 2014, <a href=\"https:\/\/redcanary.com\/\" target=\"_blank\" rel=\"noopener\">Red Canary<\/a> is a <a href=\"https:\/\/redcanary.com\/products\/security-operations-platform\/\" target=\"_blank\" rel=\"noopener\">security ally for customers<\/a> and an extension of their security teams. Underpinning Red Canary\u2019s MDR solution is its all-day security operations team. These detection engineers provide extended coverage for long-term customer peace of mind. Red Canary is continuously monitoring and reviewing every potential threat\u2014even detections that appear outwardly benign are investigated.<\/p>\n<h2>Red Canary\u2019s approach<\/h2>\n<p>When its MDR solution detects a security threat for one customer, a logic-based detection engine is strengthened and used to detect similar threats for other customers. Thousands of detectors\u2014a number that is growing all the time\u2014trigger investigations on anything suspicious that\u2019s detected.<\/p>\n<p>Red Canary\u2019s solution supercharges the already powerful Microsoft Defender for Endpoint and also now supports <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/identity-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Identity<\/a>, to help security operations teams protect on-premises identities, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/identity-protection\/\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Active Directory (Azure AD) Identity Protection<\/a>, to protect identities and user accounts for Azure AD customers along with recently announced support for publishing confirmed detections into <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">Microsoft Sentinel<\/a>.<\/p>\n<p>The Red Canary technology is only half the story. Customers also benefit from the deep threat detection expertise with detection engineers and incident handlers available around the clock, serving as an extension of a customer\u2019s security team.<\/p>\n<blockquote>\n<p>\u201c<em>We increase the confirmed detections and tune down the noise of security alerts.\u201d<\/em>\u2014Cordell BaanHofman, General Manager, Red Canary + Microsoft Security at Red Canary<\/p>\n<\/blockquote>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-102159\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers.jpg\" alt=\"Red Canary by the numbers: 20,000 endpoints, 51 billion telemetry records, 69,886 tipoffs, 3,943 significant events, 74 detections, and 17 high-severity attacks.\" width=\"1428\" height=\"884\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers.jpg 1428w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers-300x186.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers-1024x634.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers-768x475.jpg 768w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\"><\/p>\n<h2>Bridging the expertise and budget gap<\/h2>\n<p>Besides alert fatigue, companies also struggle with two other big challenges that restrict their ability to respond to cyberthreats: a lack of cybersecurity expertise and a limited budget. Many organizations lack the in-house expertise to review, investigate, and respond to Microsoft Defender for Endpoint security threats. Often, budget prevents them from hiring people with the expertise to operationalize Microsoft Defender for Endpoint or provide all-day coverage.<\/p>\n<p>Red Canary supports these companies by giving them access to a team of cybersecurity experts and all-day coverage. It offers them an \u201ceasy button,\u201d including customizable, automated incident response playbooks which enhance the pre-built automated incident response model of Microsoft Defender for Endpoint. Red Canary\u2019s approach to threat detection continues to effectively protect its customer base from ransomware\u2014like the Conti and REvil families that have been implicated in so many prominent attacks this year\u2014and other high-impact threats.<\/p>\n<p>The company analyzes alerts and raw telemetry through APIs connected to Microsoft Defender for Endpoint. Customers are only notified of confirmed threats\u2014in the middle of the night if it\u2019s a critical threat\u2014and are provided with full threat context to quickly respond to stop it in its tracks. This response is achieved through a combination of automation and incident response experts to neutralize and remove the threat.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-102162\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Flow-chart.jpg\" alt=\"Flow chart from Microsoft Defender for Endpoint to Red Canary security operations center to customer security team and back.\" width=\"1100\" height=\"343\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Flow-chart.jpg 1100w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Flow-chart-300x94.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Flow-chart-1024x319.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Flow-chart-768x239.jpg 768w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\"><\/p>\n<p>After bringing in Red Canary, an IT security leader said they felt positively about their security posture for the first time in their 10-year information security career. A security analyst at a different company said the solution results in every detection being actionable and reliable. The security analyst explained: \u201cRed Canary has taken what used to be a daily workload of hours and brought it down to minutes.\u201d<\/p>\n<h2>MISA membership<\/h2>\n<p>Red Canary is aligned with Microsoft\u2019s security strategy, particularly extended detection and response (XDR) and the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a> approach. Since becoming an inaugural MDR partner in 2019, Red Canary earned IP co-sell incentive status and shared the virtual stage at Microsoft Ignite with Microsoft Corporate Vice President Rob Lefferts during his <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">advanced attack security keynote<\/a>.<\/p>\n<p>Red Canary was one of the early members of the <u><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Microsoft Intelligent Security Association (MISA),<\/a><\/u> joining in January 2019, and has participated in Microsoft webinars, blog posts, and marketing workshops\u2014all made possible by MISA.<\/p>\n<h2>Learn more<\/h2>\n<p>One of the reasons that Red Canary and Microsoft\u2019s relationship is so strong is the two companies share a similar ethos and objective. Red Canary\u2019s mission is to empower organizations worldwide to make their greatest impact without fear of a cyberattack. Microsoft\u2019s mission is to empower every person and every organization on the planet to achieve more. Reach out for a <a href=\"https:\/\/redcanary.com\/products\/mdr-for-endpoints\/microsoft-defender-for-endpoint-demo\/\" target=\"_blank\" rel=\"noopener\">demonstration of Red Canary MDR + Microsoft Defender for Endpoint<\/a>.<\/p>\n<p class=\"x-hidden-focus\">To learn more about the Microsoft Intelligent Security Association (MISA),&nbsp;<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noopener\">visit our website<\/a>&nbsp;where you can learn about the MISA program, product integrations, and find MISA members. Visit the&nbsp;<a href=\"https:\/\/aka.ms\/MISAIntegrationVideos\" target=\"_blank\" rel=\"noopener\">video playlist<\/a>&nbsp;to learn about the strength of member&nbsp;integrations&nbsp;with Microsoft products.<\/p>\n<p class=\"x-hidden-focus\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/17\/6-strategies-to-reduce-cybersecurity-alert-fatigue-in-your-soc\/\" target=\"_blank\" rel=\"noopener\">6 strategies to reduce cybersecurity alert fatigue in your SOC<\/a>, Innocent Wafula, Microsoft. 17 February 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.darkreading.com\/analytics\/soc-teams-burdened-by-alert-fatigue-explore-xdr\" target=\"_blank\" rel=\"noopener\">SOC Teams Burdened by Alert Fatigue Explore XDR<\/a>, Joan Goodchild, Dark Reading. 14 May 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/29\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Red Canary\u2019s security operations platform integrates with Microsoft Defender for Endpoint to help organizations overcome \u201calert fatigue\u201d and identify serious security threats.<br \/>\nThe post How Red Canary and Microsoft can help reduce your alert fatigue appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44184,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,7582,8630],"class_list":["post-44183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa","tag-misa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-29T17:00:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Red Canary and Microsoft can help reduce your alert fatigue\",\"datePublished\":\"2021-11-29T17:00:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/\"},\"wordCount\":1110,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg\",\"keywords\":[\"Cybersecurity\",\"Microsoft Intelligent Security Association (MISA)\",\"MISA\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/\",\"name\":\"How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg\",\"datePublished\":\"2021-11-29T17:00:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg\",\"width\":1428,\"height\":884},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Red Canary and Microsoft can help reduce your alert fatigue\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/","og_locale":"en_US","og_type":"article","og_title":"How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-29T17:00:21+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Red-Canary-Numbers.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Red Canary and Microsoft can help reduce your alert fatigue","datePublished":"2021-11-29T17:00:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/"},"wordCount":1110,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg","keywords":["Cybersecurity","Microsoft Intelligent Security Association (MISA)","MISA"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/","url":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/","name":"How Red Canary and Microsoft can help reduce your alert fatigue 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg","datePublished":"2021-11-29T17:00:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue.jpg","width":1428,"height":884},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-red-canary-and-microsoft-can-help-reduce-your-alert-fatigue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"How Red Canary and Microsoft can help reduce your alert fatigue"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44183"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44183\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44184"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}