The Office 365 intrusion detection team uses graphs to link alerts and incorporate low-fidelity observations without overwhelming our analysts. In this talk, we describe how we represent alerts in the graph, how we use the structure of the graph to determine which alerts should be reviewed by our analysts, and how we rank subgraphs to ensure that the most important activity is reviewed first. We also discuss approaches we are investigating next to get even more value out of our alert graph.