Azure Security Center should be configured to send email notifications

Warning: This rule will be deprecated 18 December 2023 as part of the update to Azure CIS version 2.0.0


This rule enables emailing security alerts to the email subscription owner or other designated security contact.


Enabling security alert emails ensures that security alert emails are received from Microsoft. This ensures that the right people are aware of any potential security issues and are able to mitigate the risk.


From the console

  1. Go to Security Center
  2. Click on Pricing and Settings
  3. Click on the appropriate Management Group, Subscription, or Workspace
  4. Click on Email notifications
  5. Under Notification types, check the check box next to Notify about alerts with the following severity (or higher) and select High from the drop-down menu
  6. Click save using the Azure Command Line Interface
  7. Use the below command to set Send email notification for high severity alerts:
get-access-token --query "{subscription:subscription,accessToken:accessToken}" --out tsv | xargs -L1 bash -c ''curl -X PUT -H "AuthorizationBearer $1" -H "Content-Typeapplication/json"$0/providers/Microsoft.Security/securityContacts/default1?api-version=2017-08-01-preview -d@"input.json"

Where input.json contains the request body JSON data as mentioned below. And replace validEmailAddress with email IDs, CSV for multiple.

{ "id""/subscriptions/<Your_Subscription_Id>/providers/Microsoft.Security/securityContacts/default1", "name""default1", "type""Microsoft.Security/securityContacts", "properties"{ "email""<validEmailAddress>", "alertNotifications""On", "alertsToAdmins""On" } }



Note: Excluding any of the entries in the recommendations block in input.json disables the specific setting by default. Microsoft has recently changed their REST APIs to get and update security contact information. This recommendation is updated accordingly.

CIS Controls

Version 7 3 Continuous Vulnerability Management