Skip to content

Commit 1cb4bef

Browse files
authored
Merge pull request #262884 from ElazarK/WI196311-export-to-SIEM
WI196311 export to siem
2 parents 963848c + 3f73b7f commit 1cb4bef

File tree

3 files changed

+84
-56
lines changed

3 files changed

+84
-56
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -400,7 +400,7 @@
400400
href: alerts-suppression-rules.md
401401
- name: Export alerts and recommendations
402402
items:
403-
- name: Export to a SIEM, SOAR, or ITSM
403+
- name: Stream alerts to monitoring solutions
404404
displayName: continuous, SIEM, SOAR, Splunk, QRadar, ServiceNow, ArcSight,
405405
Monitor, Graph, Sentinel,
406406
href: export-to-siem.md

articles/defender-for-cloud/export-to-siem.md

Lines changed: 81 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1,49 +1,50 @@
11
---
2-
title: Stream your alerts from Microsoft Defender for Cloud to Security Information and Event Management (SIEM) systems and other monitoring solutions
3-
description: Learn how to stream your security alerts to Microsoft Sentinel, third-party SIEMs, SOAR, or ITSM solutions
2+
title: Stream alerts to monitoring solutions
3+
description: Learn how to stream your security alerts to Microsoft Sentinel, SIEMs, SOAR, or ITSM solutions.
44
ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 04/04/2022
7+
ms.date: 01/15/2024
88
---
99

10-
# Stream alerts to a SIEM, SOAR, or IT Service Management solution
10+
# Stream alerts to monitoring solutions
1111

12-
Microsoft Defender for Cloud can stream your security alerts into the most popular Security Information and Event Management (SIEM),
13-
Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions.
14-
Security alerts are notifications that Defender for Cloud generates when it detects threats on your resources.
15-
Defender for Cloud prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem.
16-
Defender for Cloud also provides detailed steps to help you remediate attacks.
17-
Alerts data is retained for 90 days.
12+
Microsoft Defender for Cloud has the ability to stream security alerts into various Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions. Security alerts are generated when threats are detected on your resources. Defender for Cloud prioritizes and lists the alerts on the Alerts page, along with additional information needed to quickly investigate the problem. Detailed steps are provided to assist you to remediate the detected threat. All alerts data is retained for 90 days.
1813

19-
There are built-in Azure tools for ensuring you can view your alert data in all of the most popular solutions in use today, including:
14+
There are built-in Azure tools that are available that ensure you can view your alert data in the following solutions:
2015

2116
- **Microsoft Sentinel**
2217
- **Splunk Enterprise and Splunk Cloud**
23-
- **IBM's QRadar**
24-
- **ServiceNow**
25-
- **ArcSight**
2618
- **Power BI**
19+
- **ServiceNow**
20+
- **IBM's QRadar**
2721
- **Palo Alto Networks**
22+
- **ArcSight**
2823

29-
## Stream alerts to Microsoft Sentinel
24+
## Stream alerts to Defender XDR with the Defender XDR API
3025

31-
Defender for Cloud natively integrates with Microsoft Sentinel, Azure's cloud-native SIEM and SOAR solution.
26+
Defender for Cloud natively integrates with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide) allows you to use Defender XDR's incidents and alerts API to stream alerts and incidents into non-Microsoft solutions. Defender for Cloud customers can access one API for all Microsoft security products and can use this integration as an easier way to export alerts and incidents.
3227

33-
[Learn more about Microsoft Sentinel](../sentinel/overview.md).
28+
Learn how to [integrate SIEM tools with Defender XDR](/microsoft-365/security/defender/configure-siem-defender?view=o365-worldwide).
29+
30+
## Stream alerts to Microsoft Sentinel
31+
32+
Defender for Cloud natively integrates with [Microsoft Sentinel](../sentinel/overview.md) Azure's cloud-native SIEM and SOAR solution.
3433

3534
### Microsoft Sentinel's connectors for Defender for Cloud
3635

37-
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels:
36+
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels.
3837

39-
- [Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md)
40-
- [Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539)
38+
You can:
4139

42-
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. If you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated, but the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
40+
- [Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md).
41+
- [Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539).
4342

44-
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of those Defender for Cloud alerts. So, for example, when a Microsoft Sentinel incident that contains a Defender for Cloud alert is closed, Defender for Cloud automatically closes the corresponding original alert.
43+
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. For example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. When you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated. However,the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
4544

46-
Learn more in [Connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
45+
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of the Defender for Cloud alerts. For example, when a Microsoft Sentinel incident that contains a Defender for Cloud alert is closed, Defender for Cloud automatically closes the corresponding original alert.
46+
47+
Learn how to [connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
4748

4849
> [!NOTE]
4950
> The bi-directional alert synchronization feature isn't available in the Azure Government cloud.
@@ -61,9 +62,7 @@ Another alternative for investigating Defender for Cloud alerts in Microsoft Sen
6162
6263
## Stream alerts to QRadar and Splunk
6364

64-
The export of security alerts to Splunk and QRadar uses Event Hubs and a built-in connector.
65-
You can either use a PowerShell script or the Azure portal to set up the requirements for exporting security alerts for your subscription or tenant.
66-
Then you’ll need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
65+
To export security alerts to Splunk and QRadar, you need to use Event Hubs and a built-in connector. You can either use a PowerShell script or the Azure portal to set up the requirements for exporting security alerts for your subscription or tenant. Once the requirements are in place, you need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
6766

6867
### Prerequisites
6968

@@ -72,41 +71,66 @@ Before you set up the Azure services for exporting alerts, make sure you have:
7271
- Azure subscription ([Create a free account](https://azure.microsoft.com/free/))
7372
- Azure resource group ([Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md))
7473
- **Owner** role on the alerts scope (subscription, management group or tenant), or these specific permissions:
75-
- Write permissions for event hubs and the Event Hub Policy
74+
- Write permissions for event hubs and the Event Hubs Policy
7675
- Create permissions for [Microsoft Entra applications](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app), if you aren't using an existing Microsoft Entra application
7776
- Assign permissions for policies, if you're using the Azure Policy 'DeployIfNotExist'
7877
<!-- - To export to a Log Analytics workspace:
7978
- if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`
8079
- if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action` -->
8180

82-
### Step 1: Set up the Azure services
81+
### Set up the Azure services
8382

8483
You can set up your Azure environment to support continuous export using either:
8584

86-
- A PowerShell script (Recommended)
85+
#### PowerShell script (Recommended)
86+
87+
1. Download and run [the PowerShell script](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Powershell%20scripts/3rd%20party%20SIEM%20integration).
88+
89+
1. Enter the required parameters.
90+
91+
1. Execute the script.
92+
93+
The script performs all of the steps for you. When the script finishes, use the output to install the solution in the SIEM platform.
94+
95+
#### Azure portal
8796

88-
Download and run [the PowerShell script](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Powershell%20scripts/3rd%20party%20SIEM%20integration).
89-
Enter the required parameters and the script performs all of the steps for you.
90-
When the script finishes, it outputs the information you’ll use to install the solution in the SIEM platform.
97+
1. Sign in to the [Azure portal](https://portal.azure.com).
9198

92-
- The Azure portal
99+
1. Search for and select `Event Hubs`.
93100

94-
Here's an overview of the steps you'll do in the Azure portal:
101+
1. [Create an Event Hubs namespace and event hub](../event-hubs/event-hubs-create.md).
95102

96-
1. Create an Event Hubs namespace and event hub.
97-
2. Define a policy for the event hub with “Send” permissions.
98-
3. **If you're streaming alerts to QRadar** - Create an event hub "Listen" policy, then copy and save the connection string of the policy that you’ll use in QRadar.
99-
4. Create a consumer group, then copy and save the name that you’ll use in the SIEM platform.
100-
5. Enable continuous export of security alerts to the defined event hub.
101-
6. **If you're streaming alerts to QRadar** - Create a storage account, then copy and save the connection string to the account that you’ll use in QRadar.
102-
7. **If you're streaming alerts to Splunk**:
103-
1. Create a Microsoft Entra application.
104-
2. Save the Tenant, App ID, and App password.
105-
3. Give permissions to the Microsoft Entra Application to read from the event hub you created before.
103+
1. Define a policy for the event hub with `Send` permissions.
106104

107-
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
105+
**If you're streaming alerts to QRadar**
108106

109-
### Step 2: Connect the event hub to your preferred solution using the built-in connectors
107+
1. Create an event hub `Listen` policy.
108+
109+
1. Copy and save the connection string of the policy to use in QRadar.
110+
111+
1. Create a consumer group.
112+
113+
1. Copy and save the name to use in the SIEM platform.
114+
115+
1. Enable continuous export of security alerts to the defined event hub.
116+
117+
1. Create a storage account.
118+
119+
1. Copy and save the connection string to the account to use in QRadar.
120+
121+
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
122+
123+
**If you're streaming alerts to Splunk**:
124+
125+
1. Create a Microsoft Entra application.
126+
127+
1. Save the Tenant, App ID, and App password.
128+
129+
1. Give permissions to the Microsoft Entra Application to read from the event hub you created before.
130+
131+
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
132+
133+
### Connect the event hub to your preferred solution using the built-in connectors
110134

111135
Each SIEM platform has a tool to enable it to receive alerts from Azure Event Hubs. Install the tool for your platform to start receiving alerts.
112136

@@ -117,14 +141,18 @@ Each SIEM platform has a tool to enable it to receive alerts from Azure Event Hu
117141

118142
## Stream alerts with continuous export
119143

120-
To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions, connect Defender for Cloud using continuous export and Azure Event Hubs:
144+
To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions, connect Defender for Cloud using continuous export and Azure Event Hubs.
121145

122146
> [!NOTE]
123147
> To stream alerts at the tenant level, use this Azure policy and set the scope at the root management group. You'll need permissions for the root management group as explained in [Defender for Cloud permissions](permissions.md): [Deploy export to an event hub for Microsoft Defender for Cloud alerts and recommendations](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fcdfcce10-4578-4ecd-9703-530938e4abcb).
124148
125-
1. Enable [continuous export](continuous-export.md) to stream Defender for Cloud alerts into a dedicated event hub at the subscription level. To do this at the Management Group level using Azure Policy, see [Create continuous export automation configurations at scale](continuous-export.md?tabs=azure-policy#configure-continuous-export-at-scale-using-the-supplied-policies).
149+
**To stream alerts with continuous export**:
150+
151+
1. Enable continuous export:
152+
- At the [subscription level](continuous-export.md).
153+
- At the [Management Group level using Azure Policy](continuous-export.md?tabs=azure-policy#configure-continuous-export-at-scale-using-the-supplied-policies).
126154

127-
2. Connect the event hub to your preferred solution using the built-in connectors:
155+
1. Connect the event hub to your preferred solution using the built-in connectors:
128156

129157
| Tool | Hosted in Azure | Description |
130158
|:---|:---| :---|
@@ -134,15 +162,15 @@ To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhyt
134162
| LogRhythm | No| Instructions to set up LogRhythm to collect logs from an event hub are available [here](https://logrhythm.com/six-tips-for-securing-your-azure-cloud-environment/).
135163
|Logz.io | Yes | For more information, see [Getting started with monitoring and logging using Logz.io for Java apps running on Azure](/azure/developer/java/fundamentals/java-get-started-with-logzio)
136164

137-
3. Optionally, stream the raw logs to the event hub and connect to your preferred solution. Learn more in [Monitoring data available](../azure-monitor/essentials/stream-monitoring-data-event-hubs.md#monitoring-data-available).
165+
1. (Optional) Stream the raw logs to the event hub and connect to your preferred solution. Learn more in [Monitoring data available](../azure-monitor/essentials/stream-monitoring-data-event-hubs.md#monitoring-data-available).
138166

139167
To view the event schemas of the exported data types, visit the [Event Hubs event schemas](https://aka.ms/ASCAutomationSchemas).
140168

141-
## Use the Microsoft Graph Security API to stream alerts to third-party applications
169+
## Use the Microsoft Graph Security API to stream alerts to non-Microsoft applications
142170

143-
As an alternative to Microsoft Sentinel and Azure Monitor, you can use Defender for Cloud's built-in integration with [Microsoft Graph Security API](/graph/security-concept-overview/). No configuration is required.
171+
Defender for Cloud's built-in integration with [Microsoft Graph Security API](/graph/security-concept-overview/) without the need of any further configuration requirements.
144172

145-
You can use this API to stream alerts from your **entire tenant** (and data from many Microsoft Security products) into third-party SIEMs and other popular platforms:
173+
You can use this API to stream alerts from your **entire tenant** (and data from many Microsoft Security products) into non-Microsoft SIEMs and other popular platforms:
146174

147175
- **Splunk Enterprise and Splunk Cloud** - [Use the Microsoft Graph Security API Add-On for Splunk](https://splunkbase.splunk.com/app/4564/)
148176
- **Power BI** - [Connect to the Microsoft Graph Security API in Power BI Desktop](/power-bi/connect-data/desktop-connect-graph-security).

articles/defender-for-cloud/export-to-splunk-or-qradar.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure the required Azure resources in the Azure po
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
7-
ms.date: 04/04/2022
7+
ms.date: 01/14/2024
88
---
99

1010
# Prepare Azure resources for exporting to Splunk and QRadar
@@ -132,4 +132,4 @@ To configure the Azure resources for QRadar and Splunk in the Azure portal:
132132
1. Search for the Microsoft Entra application you created before and select it.
133133
1. Select **Close**.
134134

135-
To continue setting up export of alerts, [install the built-in connectors](export-to-siem.md#step-2-connect-the-event-hub-to-your-preferred-solution-using-the-built-in-connectors) for the SIEM you're using.
135+
To continue setting up export of alerts, [install the built-in connectors](export-to-siem.md#connect-the-event-hub-to-your-preferred-solution-using-the-built-in-connectors) for the SIEM you're using.

0 commit comments

Comments
 (0)