# Alerts in Identity Resilience Source: https://docs.rubrik.com/en-us/saas/identity_resilience/ir_alerts.html --- # Alerts in Identity Resilience The Alerts feature within Rubrik Identity Resilience provides real-time, live tracking of critical events and suspicious activities detected within your Active Directory environment. Important: The system resource utilization could impact performance, and Rubrik cannot be held responsible for any resulting effects. The Alerts page in Rubrik Identity Resilience helps IT administrators to monitor, investigate, and manage suspicious or disruptive activities detected within your identity environment. It provides immediate visibility into these activities, enabling rapid response and mitigation to protect your critical identity systems. The Alerts page is fundamental to Identity Resilience as it offers real-time monitoring capability for critical Active Directory (AD) changes, irrespective of traditional event log collection, enabling customers to: * Identify malicious or disruptive activities: Pinpoint potentially malicious or disruptive activities and respond to them before serious impact occurs. * Gain granular visibility: Access a clear audit trail of significant identity-related changes, whether malicious or benign. RSC generates alerts for specific, high-impact scenarios, focusing on key areas of identity risk: Identity risk | Scenario ---|--- Privilege group membership changes | * User or group addition into a privileged group: RSC triggers alerts when a user account is added to a privileged AD group. This flags potential privilege escalation, a common step in attack chains. * User or group removal from a privileged group: RSC also raises alerts if a user is unexpectedly removed from a privileged group. This could indicate malicious activity, such as an attacker trying to hide tracks, or unauthorized de-provisioning. Group Policy Object (GPO) modifications | Changes to GPOs: Any alteration to a GPO initiates an alert. GPOs are fundamental to AD security and configuration, and unauthorized changes can have widespread implications, making their modification a critical event to monitor. You can filter alerts using the Status, Time Range, and Alert Type filters that RSC provides. *[ > ]: and then