You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/export-to-siem.md
+81-53Lines changed: 81 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,49 +1,50 @@
1
1
---
2
-
title: Stream your alerts from Microsoft Defender for Cloud to Security Information and Event Management (SIEM) systems and other monitoring solutions
3
-
description: Learn how to stream your security alerts to Microsoft Sentinel, third-party SIEMs, SOAR, or ITSM solutions
2
+
title: Stream alerts to monitoring solutions
3
+
description: Learn how to stream your security alerts to Microsoft Sentinel, SIEMs, SOAR, or ITSM solutions.
4
4
ms.topic: how-to
5
5
ms.author: dacurwin
6
6
author: dcurwin
7
-
ms.date: 04/04/2022
7
+
ms.date: 01/15/2024
8
8
---
9
9
10
-
# Stream alerts to a SIEM, SOAR, or IT Service Management solution
10
+
# Stream alerts to monitoring solutions
11
11
12
-
Microsoft Defender for Cloud can stream your security alerts into the most popular Security Information and Event Management (SIEM),
13
-
Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions.
14
-
Security alerts are notifications that Defender for Cloud generates when it detects threats on your resources.
15
-
Defender for Cloud prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem.
16
-
Defender for Cloud also provides detailed steps to help you remediate attacks.
17
-
Alerts data is retained for 90 days.
12
+
Microsoft Defender for Cloud has the ability to stream security alerts into various Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions. Security alerts are generated when threats are detected on your resources. Defender for Cloud prioritizes and lists the alerts on the Alerts page, along with additional information needed to quickly investigate the problem. Detailed steps are provided to assist you to remediate the detected threat. All alerts data is retained for 90 days.
18
13
19
-
There are built-in Azure tools for ensuring you can view your alert data in all of the most popular solutions in use today, including:
14
+
There are built-in Azure tools that are available that ensure you can view your alert data in the following solutions:
20
15
21
16
-**Microsoft Sentinel**
22
17
-**Splunk Enterprise and Splunk Cloud**
23
-
-**IBM's QRadar**
24
-
-**ServiceNow**
25
-
-**ArcSight**
26
18
-**Power BI**
19
+
-**ServiceNow**
20
+
-**IBM's QRadar**
27
21
-**Palo Alto Networks**
22
+
-**ArcSight**
28
23
29
-
## Stream alerts to Microsoft Sentinel
24
+
## Stream alerts to Defender XDR with the Defender XDR API
30
25
31
-
Defender for Cloud natively integrates with Microsoft Sentinel, Azure's cloud-native SIEM and SOAR solution.
26
+
Defender for Cloud natively integrates with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide) allows you to use Defender XDR's incidents and alerts API to stream alerts and incidents into non-Microsoft solutions. Defender for Cloud customers can access one API for all Microsoft security products and can use this integration as an easier way to export alerts and incidents.
32
27
33
-
[Learn more about Microsoft Sentinel](../sentinel/overview.md).
28
+
Learn how to [integrate SIEM tools with Defender XDR](/microsoft-365/security/defender/configure-siem-defender?view=o365-worldwide).
29
+
30
+
## Stream alerts to Microsoft Sentinel
31
+
32
+
Defender for Cloud natively integrates with [Microsoft Sentinel](../sentinel/overview.md) Azure's cloud-native SIEM and SOAR solution.
34
33
35
34
### Microsoft Sentinel's connectors for Defender for Cloud
36
35
37
-
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels:
36
+
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels.
38
37
39
-
-[Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md)
40
-
-[Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539)
38
+
You can:
41
39
42
-
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. If you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated, but the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
40
+
-[Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md).
41
+
-[Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539).
43
42
44
-
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of those Defender for Cloud alerts. So, for example, when a Microsoft Sentinel incident that contains a Defender for Cloudalert is closed, Defender for Cloud automatically closes the corresponding original alert.
43
+
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. For example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. When you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated. However,the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
45
44
46
-
Learn more in [Connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
45
+
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of the Defender for Cloud alerts. For example, when a Microsoft Sentinel incident that contains a Defender for Cloud alert is closed, Defender for Cloud automatically closes the corresponding original alert.
46
+
47
+
Learn how to [connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
47
48
48
49
> [!NOTE]
49
50
> The bi-directional alert synchronization feature isn't available in the Azure Government cloud.
@@ -61,9 +62,7 @@ Another alternative for investigating Defender for Cloud alerts in Microsoft Sen
61
62
62
63
## Stream alerts to QRadar and Splunk
63
64
64
-
The export of security alerts to Splunk and QRadar uses Event Hubs and a built-in connector.
65
-
You can either use a PowerShell script or the Azure portal to set up the requirements for exporting security alerts for your subscription or tenant.
66
-
Then you’ll need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
65
+
To export security alerts to Splunk and QRadar, you need to use Event Hubs and a built-in connector. You can either use a PowerShell script or the Azure portal to set up the requirements for exporting security alerts for your subscription or tenant. Once the requirements are in place, you need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
67
66
68
67
### Prerequisites
69
68
@@ -72,41 +71,66 @@ Before you set up the Azure services for exporting alerts, make sure you have:
72
71
- Azure subscription ([Create a free account](https://azure.microsoft.com/free/))
73
72
- Azure resource group ([Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md))
74
73
-**Owner** role on the alerts scope (subscription, management group or tenant), or these specific permissions:
75
-
- Write permissions for event hubs and the Event Hub Policy
74
+
- Write permissions for event hubs and the Event Hubs Policy
76
75
- Create permissions for [Microsoft Entra applications](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app), if you aren't using an existing Microsoft Entra application
77
76
- Assign permissions for policies, if you're using the Azure Policy 'DeployIfNotExist'
78
77
<!-- - To export to a Log Analytics workspace:
79
78
- if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`
80
79
- if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action` -->
81
80
82
-
### Step 1: Set up the Azure services
81
+
### Set up the Azure services
83
82
84
83
You can set up your Azure environment to support continuous export using either:
85
84
86
-
- A PowerShell script (Recommended)
85
+
#### PowerShell script (Recommended)
86
+
87
+
1. Download and run [the PowerShell script](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Powershell%20scripts/3rd%20party%20SIEM%20integration).
88
+
89
+
1. Enter the required parameters.
90
+
91
+
1. Execute the script.
92
+
93
+
The script performs all of the steps for you. When the script finishes, use the output to install the solution in the SIEM platform.
94
+
95
+
#### Azure portal
87
96
88
-
Download and run [the PowerShell script](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Powershell%20scripts/3rd%20party%20SIEM%20integration).
89
-
Enter the required parameters and the script performs all of the steps for you.
90
-
When the script finishes, it outputs the information you’ll use to install the solution in the SIEM platform.
97
+
1. Sign in to the [Azure portal](https://portal.azure.com).
91
98
92
-
- The Azure portal
99
+
1. Search for and select `Event Hubs`.
93
100
94
-
Here's an overview of the steps you'll do in the Azure portal:
101
+
1.[Create an Event Hubs namespace and event hub](../event-hubs/event-hubs-create.md).
95
102
96
-
1. Create an Event Hubs namespace and event hub.
97
-
2. Define a policy for the event hub with “Send” permissions.
98
-
3.**If you're streaming alerts to QRadar** - Create an event hub "Listen" policy, then copy and save the connection string of the policy that you’ll use in QRadar.
99
-
4. Create a consumer group, then copy and save the name that you’ll use in the SIEM platform.
100
-
5. Enable continuous export of security alerts to the defined event hub.
101
-
6.**If you're streaming alerts to QRadar** - Create a storage account, then copy and save the connection string to the account that you’ll use in QRadar.
102
-
7.**If you're streaming alerts to Splunk**:
103
-
1. Create a Microsoft Entra application.
104
-
2. Save the Tenant, App ID, and App password.
105
-
3. Give permissions to the Microsoft Entra Application to read from the event hub you created before.
103
+
1. Define a policy for the event hub with `Send` permissions.
106
104
107
-
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
105
+
**If you're streaming alerts to QRadar**
108
106
109
-
### Step 2: Connect the event hub to your preferred solution using the built-in connectors
107
+
1. Create an event hub `Listen` policy.
108
+
109
+
1. Copy and save the connection string of the policy to use in QRadar.
110
+
111
+
1. Create a consumer group.
112
+
113
+
1. Copy and save the name to use in the SIEM platform.
114
+
115
+
1. Enable continuous export of security alerts to the defined event hub.
116
+
117
+
1. Create a storage account.
118
+
119
+
1. Copy and save the connection string to the account to use in QRadar.
120
+
121
+
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
122
+
123
+
**If you're streaming alerts to Splunk**:
124
+
125
+
1. Create a Microsoft Entra application.
126
+
127
+
1. Save the Tenant, App ID, and App password.
128
+
129
+
1. Give permissions to the Microsoft Entra Application to read from the event hub you created before.
130
+
131
+
For more detailed instructions, see [Prepare Azure resources for exporting to Splunk and QRadar](export-to-splunk-or-qradar.md).
132
+
133
+
### Connect the event hub to your preferred solution using the built-in connectors
110
134
111
135
Each SIEM platform has a tool to enable it to receive alerts from Azure Event Hubs. Install the tool for your platform to start receiving alerts.
112
136
@@ -117,14 +141,18 @@ Each SIEM platform has a tool to enable it to receive alerts from Azure Event Hu
117
141
118
142
## Stream alerts with continuous export
119
143
120
-
To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions, connect Defender for Cloud using continuous export and Azure Event Hubs:
144
+
To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions, connect Defender for Cloud using continuous export and Azure Event Hubs.
121
145
122
146
> [!NOTE]
123
147
> To stream alerts at the tenant level, use this Azure policy and set the scope at the root management group. You'll need permissions for the root management group as explained in [Defender for Cloud permissions](permissions.md): [Deploy export to an event hub for Microsoft Defender for Cloud alerts and recommendations](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fcdfcce10-4578-4ecd-9703-530938e4abcb).
124
148
125
-
1. Enable [continuous export](continuous-export.md) to stream Defender for Cloud alerts into a dedicated event hub at the subscription level. To do this at the Management Group level using Azure Policy, see [Create continuous export automation configurations at scale](continuous-export.md?tabs=azure-policy#configure-continuous-export-at-scale-using-the-supplied-policies).
149
+
**To stream alerts with continuous export**:
150
+
151
+
1. Enable continuous export:
152
+
- At the [subscription level](continuous-export.md).
153
+
- At the [Management Group level using Azure Policy](continuous-export.md?tabs=azure-policy#configure-continuous-export-at-scale-using-the-supplied-policies).
126
154
127
-
2. Connect the event hub to your preferred solution using the built-in connectors:
155
+
1. Connect the event hub to your preferred solution using the built-in connectors:
128
156
129
157
| Tool | Hosted in Azure | Description |
130
158
|:---|:---| :---|
@@ -134,15 +162,15 @@ To stream alerts into **ArcSight**, **SumoLogic**, **Syslog servers**, **LogRhyt
134
162
| LogRhythm | No| Instructions to set up LogRhythm to collect logs from an event hub are available [here](https://logrhythm.com/six-tips-for-securing-your-azure-cloud-environment/).
135
163
|Logz.io | Yes | For more information, see [Getting started with monitoring and logging using Logz.io for Java apps running on Azure](/azure/developer/java/fundamentals/java-get-started-with-logzio)
136
164
137
-
3. Optionally, stream the raw logs to the event hub and connect to your preferred solution. Learn more in [Monitoring data available](../azure-monitor/essentials/stream-monitoring-data-event-hubs.md#monitoring-data-available).
165
+
1. (Optional) Stream the raw logs to the event hub and connect to your preferred solution. Learn more in [Monitoring data available](../azure-monitor/essentials/stream-monitoring-data-event-hubs.md#monitoring-data-available).
138
166
139
167
To view the event schemas of the exported data types, visit the [Event Hubs event schemas](https://aka.ms/ASCAutomationSchemas).
140
168
141
-
## Use the Microsoft Graph Security API to stream alerts to third-party applications
169
+
## Use the Microsoft Graph Security API to stream alerts to non-Microsoft applications
142
170
143
-
As an alternative to Microsoft Sentinel and Azure Monitor, you can use Defender for Cloud's built-in integration with [Microsoft Graph Security API](/graph/security-concept-overview/). No configuration is required.
171
+
Defender for Cloud's built-in integration with [Microsoft Graph Security API](/graph/security-concept-overview/) without the need of any further configuration requirements.
144
172
145
-
You can use this API to stream alerts from your **entire tenant** (and data from many Microsoft Security products) into third-party SIEMs and other popular platforms:
173
+
You can use this API to stream alerts from your **entire tenant** (and data from many Microsoft Security products) into non-Microsoft SIEMs and other popular platforms:
146
174
147
175
-**Splunk Enterprise and Splunk Cloud** - [Use the Microsoft Graph Security API Add-On for Splunk](https://splunkbase.splunk.com/app/4564/)
148
176
-**Power BI** - [Connect to the Microsoft Graph Security API in Power BI Desktop](/power-bi/connect-data/desktop-connect-graph-security).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/export-to-splunk-or-qradar.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure the required Azure resources in the Azure po
4
4
author: dcurwin
5
5
ms.author: dacurwin
6
6
ms.topic: how-to
7
-
ms.date: 04/04/2022
7
+
ms.date: 01/14/2024
8
8
---
9
9
10
10
# Prepare Azure resources for exporting to Splunk and QRadar
@@ -132,4 +132,4 @@ To configure the Azure resources for QRadar and Splunk in the Azure portal:
132
132
1. Search for the Microsoft Entra application you created before and select it.
133
133
1. Select **Close**.
134
134
135
-
To continue setting up export of alerts, [install the built-in connectors](export-to-siem.md#step-2-connect-the-event-hub-to-your-preferred-solution-using-the-built-in-connectors) for the SIEM you're using.
135
+
To continue setting up export of alerts, [install the built-in connectors](export-to-siem.md#connect-the-event-hub-to-your-preferred-solution-using-the-built-in-connectors) for the SIEM you're using.
0 commit comments