Well, I've got one alert. At 22:28, but checking for msft I find the following, which includes some dns.msftncsi.com and some not - but only one (at 22:28) seems to have tripped the alert.
I may need to amend my log to see what the response provided was, but it's a device on my LAN that uses a VPN to connect to another network, so that's likely something....
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:32:34.800465749Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:32:35.773932375Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:36:14.461835367Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:38:45.243577095Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:38:45.403379112Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:42:23.429304852Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:42:23.669020038Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:42:24.287559454Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:45:23.511981516Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:45:24.111180037Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:45:24.53103526Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:48:58.343946879Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:48:58.589256006Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:48:59.216106909Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:51:58.244849692Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:51:58.924605618Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:51:59.146100932Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:51:59.163740819Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:51:59.288974759Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:55:35.781553318Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:55:36.134052039Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:55:36.762385266Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T20:57:08.490411353Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:00:18.387579017Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:00:18.618285266Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:00:19.251379833Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:03:18.318346521Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:03:18.981755412Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:03:19.203895427Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:06:18.349867281Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:07:44.263980495Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:07:45.12183808Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:10:14.999497598Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T21:10:15.822851985Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (www.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T22:28:18.781521721Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (ipv6.msftconnecttest.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T22:28:19.094379914Z"}
{"log":"# DIAB : LOG : INTERNAL query from (10.74.50.14) for (dns.msftncsi.com.) - Allowing.\n","stream":"stdout","time":"2022-02-10T22:28:19.146400813Z"}
pihole.log just shows:
Feb 10 22:28:19 dnsmasq[416]: possible DNS-rebind attack detected: dns.msftncsi.com
pihole "long-term" log shows:
|2022-02-10 22:28:19|DS|msftncsi.com|::|OK (forwarded to 10.74.90.136#9001)|Blacklist|
| --- | --- | --- | --- | --- | --- |
|2022-02-10 22:28:19|A (IPv4)|ipv6.msftconnecttest.com|10.74.50.14|OK (forwarded to 10.74.90.136#9001)|
and one entry which shows the internal (VPN) domain, so I think it's something re: that device's VPN - which should be ok to whitelist - but it would be good if piHole could show the requesting client AND response IP, to cut this down 
(for reference, the blacklist is disabled, and the forward is the one to OpenDNS)