Skip to content

Commit 128115f

Browse files
committed
Upd instructions based on UI changes
1 parent 575b384 commit 128115f

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,16 @@ The Microsoft Defender XDR connector for Microsoft Sentinel allows you to stream
2020

2121
Before you begin, you must have the appropriate licensing, access, and configured resources described in this section.
2222

23-
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
23+
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
24+
- Your user account must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
25+
- You must have read and write permissions on your Microsoft Sentinel workspace.
2426
- To make any changes to the connector settings, your account must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
2527
- Install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
2628
- Grant access to Microsoft Sentinel as appropriate for your organization. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
2729

2830
For on-premises Active Directory sync via Microsoft Defender for Identity:
2931

3032
- Your tenant must be onboarded to Microsoft Defender for Identity.
31-
3233
- You must have the Microsoft Defender for Identity sensor installed.
3334

3435
## Connect to Microsoft Defender XDR
@@ -102,13 +103,13 @@ If you want to collect advanced hunting events from Microsoft Defender for Endpo
102103
| **[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)** | Microsoft 365 email events, including email delivery and blocking events |
103104
| **[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)** | Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox |
104105
| **[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)** | Information about URLs on emails |
106+
|**[UrlClickEvents](/defender-xdr/advanced-hunting-urlclickevents-table)**|Events involving URLs clicked, selected, or requested on Microsoft Defender for Office 365|
105107

106108
# [Defender for Identity](#tab/MDI)
107109

108110
| Table name | Events type |
109111
|-|-|
110112
| **[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)** | Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
111-
| **[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)** | Information about user accounts obtained from various services, including Microsoft Entra ID |
112113
| **[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)** | Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
113114
| **[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)** | Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
114115

@@ -122,14 +123,14 @@ If you want to collect advanced hunting events from Microsoft Defender for Endpo
122123

123124
| Table name | Events type |
124125
|-|-|
125-
| **[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)** | Information about alerts from Microsoft Defender XDR components |
126-
| **[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)** | Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft Defender XDR components |
126+
| **[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)** | Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Cloud App Security, and Microsoft Defender for Identity, including severity information and threat categorization|
127+
| **[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)** | Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft Defender XDR components|
127128

128129
---
129130

130131
1. Select **Apply Changes**.
131132

132-
1. To query the advanced hunting tables in Log Analytics, enter the table name in the query window.
133+
To run a query in the advanced hunting tables in Log Analytics, enter the table name in the query window.
133134

134135
## Verify data ingestion
135136

0 commit comments

Comments
 (0)