Events, Alerts, and Detections

Summary

This note explains the difference between raw events, detection logic, and alerts. The goal is to stop these terms from blending together and to make investigations more structured.

Microsoft Sentinel incidents view from official documentation

Official Microsoft Sentinel incidents view showing how detections are surfaced to analysts as alert-driven investigation starting points.

Why this matters

  • blue-team work depends on reading signals correctly
  • a lot of confusion comes from mixing up “what happened” with “what was detected”
  • understanding this flow makes SIEM tuning and alert triage much easier

Environment / Scope

ItemValue
Topicevent-to-alert flow
Best use for this noteunderstanding detection pipeline basics
Main focusevent, rule, alert
Safe to practise?yes

Key concepts

  • Event - a single recorded activity, such as a log entry or telemetry record
  • Detection - logic that evaluates events and decides whether they are suspicious enough to flag
  • Alert - the resulting signal raised by that logic
  • Noise - alerts that fire often but do not help investigation

Mental model

Think about the flow like this:

raw event -> detection logic -> alert -> triage decision

This means:

  • not every event becomes an alert
  • the quality of the alert depends on both the event and the detection logic
  • a noisy alert does not always mean the event source is bad; sometimes the rule is weak

Everyday examples

ExampleEventDetectionAlert
Failed login activityfailed authentication logsthreshold or pattern matchpossible brute-force alert
PowerShell executionprocess creation eventsuspicious command-line rulesuspicious PowerShell alert
Port scan behaviourmany connection attemptsscan detection logicpotential recon alert

Common misunderstandings

MisunderstandingBetter explanation
”The alert is the evidence”the alert points you towards the evidence; the underlying events still matter
”If a log exists, it should always alert”events need logic and context before they become useful alerts
”A false positive means the source is useless”often it means the detection needs tuning
”One alert equals one incident”alerts can be weak signals, duplicates, or part of a bigger story

Verification

CheckExpected result
Events are visibleraw telemetry exists in the platform
Detection fires when expectedtest event matches the rule
Alert contains contextenough detail exists for triage
Tuning improves qualitysignal-to-noise gets better over time

Pitfalls / Troubleshooting

ProblemLikely causeWhat to check
No alert from expected testmissing log, parser issue, or rule mismatchtelemetry, rule logic, field names
Too many alertsrule too broadthresholds, exclusions, event volume
Alert lacks useful detailpoor enrichment or weak fieldsevent contents, mappings
Investigation feels randomevent, alert, and detection roles are not clearly separatedpipeline mental model

Key takeaways

  • events are the raw facts
  • detections are the logic applied to those facts
  • alerts are the resulting signals that humans still need to evaluate