Skip to content

Commit 031b29a

Browse files
committed
Cnt M365D add prerq for CH
1 parent 00667ee commit 031b29a

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,15 @@ ms.date: 02/01/2023
99

1010
# Connect data from Microsoft 365 Defender to Microsoft Sentinel
1111

12-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
13-
1412
Microsoft Sentinel's [Microsoft 365 Defender](/microsoft-365/security/mtp/microsoft-threat-protection) connector with incident integration allows you to stream all Microsoft 365 Defender incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services **Microsoft Defender for Endpoint**, **Microsoft Defender for Identity**, **Microsoft Defender for Office 365**, and **Microsoft Defender for Cloud Apps**, as well as alerts from other services such as **Microsoft Purview Data Loss Prevention (DLP)** and **Azure Active Directory Identity Protection (AADIP)**.
1513

1614
The connector also lets you stream **advanced hunting** events from *all* of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
1715

1816
For more information about incident integration and advanced hunting event collection, see [Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
1917

20-
> [!IMPORTANT]
21-
>
22-
> The Microsoft 365 Defender connector is now generally available!
18+
The Microsoft 365 Defender connector is now generally available.
2319

20+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2421
## Prerequisites
2522

2623
- You must have a valid license for Microsoft 365 Defender, as described in [Microsoft 365 Defender prerequisites](/microsoft-365/security/mtp/prerequisites).
@@ -30,6 +27,7 @@ For more information about incident integration and advanced hunting event colle
3027
- Your user must have read and write permissions on your Microsoft Sentinel workspace.
3128

3229
- To make any changes to the connector settings, your user must be a member of the same Azure Active Directory tenant with which your Microsoft Sentinel workspace is associated.
30+
- Install the solution for **Microsoft 365 Defender** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content (Public preview)](sentinel-solutions-deploy.md).
3331

3432
### Prerequisites for Active Directory sync via MDI
3533

0 commit comments

Comments
 (0)