Skip to content

Commit 28bd221

Browse files
authored
Merge pull request #296957 from batamig/mult-workspace
Sentinel - Mult workspace
2 parents f73f770 + 3aed394 commit 28bd221

10 files changed

+191
-46
lines changed

articles/sentinel/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1099,7 +1099,9 @@
10991099
href: /defender-xdr/microsoft-sentinel-onboard?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
11001100
- name: Manage multiple workspaces
11011101
items:
1102-
- name: Workspace manager
1102+
- name: Workspaces in the Defender portal
1103+
href: workspaces-defender-portal.md
1104+
- name: Workspace manager in the Azure portal
11031105
href: workspace-manager.md
11041106
- name: Extend across multiple workspaces
11051107
href: extend-sentinel-across-workspaces-tenants.md

articles/sentinel/extend-sentinel-across-workspaces-tenants.md

Lines changed: 25 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Extend Microsoft Sentinel across workspaces and tenants
33
description: How to use Microsoft Sentinel to query and analyze data across workspaces and tenants.
44
author: yelevin
5-
ms.topic: how-to
6-
ms.date: 10/17/2024
5+
ms.topic: concept-article
6+
ms.date: 03/17/2025
77
ms.author: yelevin
8-
appliesto: Microsoft Sentinel in the Azure portal
8+
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
99

1010
#Customer intent: As a security analyst, I want to query data across multiple workspaces and tenants so that I can centralize incident management and enhance threat detection capabilities.
1111

@@ -15,11 +15,16 @@ appliesto: Microsoft Sentinel in the Azure portal
1515

1616
When you onboard Microsoft Sentinel, your first step is to select your Log Analytics workspace. While you can get the full benefit of the Microsoft Sentinel experience with a single workspace, in some cases, you might want to extend your workspace to query and analyze your data across workspaces and tenants. For more information, see [Design a Log Analytics workspace architecture](/azure/azure-monitor/logs/workspace-design) and [Prepare for multiple workspaces and tenants in Microsoft Sentinel](prepare-multiple-workspaces.md).
1717

18-
If you onboard Microsoft Sentinel to the Microsoft Defender portal, see [Microsoft Defender multitenant management](/defender-xdr/mto-overview).
18+
If you onboard Microsoft Sentinel to the Microsoft Defender portal, see:
19+
20+
- [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal)
21+
- [Microsoft Defender multitenant management](/defender-xdr/mto-overview)
1922

2023
## Manage incidents on multiple workspaces
2124

22-
Microsoft Sentinel supports a [multiple workspace incident view](./multiple-workspace-view.md) where you can centrally manage and monitor incidents across multiple workspaces. The centralized incident view lets you manage incidents directly or drill down transparently to the incident details in the context of the originating workspace.
25+
In the Azure and Defender portals, the incidents view allows you to centrally manage and monitor incidents across multiple workspaces or filter the view by workspace. Manage incidents directly or drill down transparently to the incident details in the context of the originating workspace.
26+
27+
If you're working in the Azure portal, see [multiple workspace incident view](./multiple-workspace-view.md). For the Defender portal, see [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal).
2328

2429
## Query multiple workspaces
2530

@@ -88,17 +93,26 @@ To configure and manage multiple Log Analytics workspaces enabled for Microsoft
8893
- Learn how to [automate the deployment of Microsoft Sentinel resources](https://techcommunity.microsoft.com/t5/azure-sentinel/extending-azure-sentinel-apis-integration-and-management/ba-p/1116885), including alert rules, hunting queries, workbooks, and playbooks.
8994
- Learn how to [deploy custom content from your repository](ci-cd.md). This resource provides a consolidated methodology for managing Microsoft Sentinel as code and for deploying and configuring resources from a private Azure DevOps or GitHub repository.
9095

91-
## Manage workspaces across tenants using Azure Lighthouse
96+
## Manage workspaces across tenants
97+
98+
<a name="manage-workspaces-across-tenants-using-azure-lighthouse"></a>
9299

93-
As mentioned above, in many scenarios, the different Log Analytics workspaces enabled for Microsoft Sentinels can be located in different Microsoft Entra tenants. You can use [Azure Lighthouse](/azure/lighthouse/overview) to extend all cross-workspace activities across tenant boundaries, allowing users in your managing tenant to work on workspaces across all tenants.
100+
In many scenarios, the different Log Analytics workspaces enabled for Microsoft Sentinels can be located in different Microsoft Entra tenants. You can use [Azure Lighthouse](/azure/lighthouse/overview) to extend all cross-workspace activities across tenant boundaries, allowing users in your managing tenant to work on workspaces across all tenants.
94101

95102
Once Azure Lighthouse is [onboarded](/azure/lighthouse/how-to/onboard-customer), use the [directory + subscription selector](multiple-tenants-service-providers.md#access-microsoft-sentinel-in-managed-tenants) on the Azure portal to select all the subscriptions containing workspaces you want to manage, in order to ensure that they'll all be available in the different workspace selectors in the portal.
96103

97104
When using Azure Lighthouse, it's recommended to create a group for each Microsoft Sentinel role and delegate permissions from each tenant to those groups.
98105

99-
## Next step
106+
If you're using the Defender portal, multitenant management for Microsoft Defender XDR and Microsoft Sentinel provides your security operation teams with a single, unified view of all the tenants you manage. For more information, see [Microsoft Defender multitenant management](/defender-xdr/mto-overview).
107+
108+
## Related content
109+
110+
For Microsoft Sentinel in the Azure portal, see:
111+
112+
- [Manage multiple tenants in Microsoft Sentinel as an MSSP](./multiple-tenants-service-providers.md) by using Azure Lighthouse
113+
- [Work with incidents in many workspaces at once](./multiple-workspace-view.md) in the Azure portal
100114

101-
In this article, you learned how Microsoft Sentinel's capabilities can be extended across multiple workspaces and tenants. For practical guidance on implementing Microsoft Sentinel's cross-workspace architecture, see the following articles:
115+
For Microsoft Sentinel in the Defender portal, see:
102116

103-
- Learn how to [work with multiple tenants](./multiple-tenants-service-providers.md) in Microsoft Sentinel, using Azure Lighthouse.
104-
- Learn how to [view and manage incidents in multiple workspaces](./multiple-workspace-view.md) seamlessly.
117+
- [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal)
118+
- [Microsoft Defender multitenant management](/defender-xdr/mto-overview)

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 19 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how using Microsoft Defender XDR together with Microsoft Sent
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 10/31/2024
7+
ms.date: 03/17/2025
88
appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel with Defender XDR in the Microsoft Defender portal
@@ -21,9 +21,8 @@ Integrate Microsoft Defender XDR with Microsoft Sentinel to stream all Defender
2121

2222
Alternatively, onboard Microsoft Sentinel with Defender XDR to Microsoft's unified security operations (SecOps) platform in the Defender portal. Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Defender XDR, and generative AI built specifically for cybersecurity. For more information, see the following resources:
2323

24-
- Blog post: [General availability of the Microsoft's unified security operations platform](https://aka.ms/unified-soc-announcement)
24+
- [What is Microsoft's unified security operations platform?](/unified-secops-platform/overview-unified-security)
2525
- [Microsoft Sentinel in the Microsoft Defender portal](microsoft-sentinel-defender-portal.md)
26-
- [Microsoft Copilot in Microsoft Defender](/defender-xdr/security-copilot-in-microsoft-365-defender)
2726

2827
## Microsoft Sentinel and Defender XDR
2928

@@ -103,14 +102,26 @@ For more information about the capabilities of the Microsoft Sentinel integratio
103102

104103
## Connecting to Microsoft Defender XDR <a name="microsoft-defender-xdr-incidents-and-microsoft-incident-creation-rules"></a>
105104

106-
Enable the Microsoft Defender XDR connector in Microsoft Sentinel to send all Defender XDR incidents and alerts information to Microsoft Sentinel and keep the incidents synchronized.
105+
How you integrate Defender XDR depends on whether you plan to onboard Microsoft Sentinel to the Defender portal or continue to work in the Azure portal.
106+
107+
### Defender portal integration
108+
109+
If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you. Any data connectors for the alert providers included in the Defender XDR connector are disconnected. This includes the following data connectors:
110+
111+
- Microsoft Defender for Cloud Apps (alerts)
112+
- Microsoft Defender for Endpoint
113+
- Microsoft Defender for Identity
114+
- Microsoft Defender for Office 365
115+
- Microsoft Entra ID Protection
116+
117+
### Azure portal integration
118+
119+
If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel. When you enable the connector, it'll send all Defender XDR incidents and alerts information to Microsoft Sentinel and keep the incidents synchronized.
107120

108121
- First, install the **Microsoft Defender XDR** solution for Microsoft Sentinel from the **Content hub**. Then, enable the **Microsoft Defender XDR** data connector to collect incidents and alerts. For more information, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md).
109122

110123
- After you enable alert and incident collection in the Defender XDR data connector, Defender XDR incidents appear in the Microsoft Sentinel incidents queue shortly after they're generated in Defender XDR. It can take up to 10 minutes from the time an incident is generated in Defender XDR to the time it appears in Microsoft Sentinel. In these incidents, the **Alert product name** field contains **Microsoft Defender XDR** or one of the component Defender services' names.
111124

112-
- [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard).
113-
114125
### Ingestion costs
115126

116127
Alerts and incidents from Defender XDR, including items that populate the *SecurityAlert* and *SecurityIncident* tables, are ingested into and synchronized with Microsoft Sentinel at no charge. For all other data types from individual Defender components such as the *Advanced hunting* tables *DeviceInfo*, *DeviceFileEvents*, *EmailEvents*, and so on, ingestion is charged.
@@ -119,7 +130,7 @@ For more information, see [Plan costs and understand Microsoft Sentinel pricing
119130

120131
### Data ingestion behavior
121132

122-
When the Defender XDR connector is enabled, alerts created by Defender XDR-integrated products are sent to Defender XDR and grouped into incidents. Both the alerts and the incidents flow to Microsoft Sentinel through the Defender XDR connector.
133+
Alerts created by Defender XDR-integrated products are sent to Defender XDR and grouped into incidents. Both the alerts and the incidents flow to Microsoft Sentinel through the Defender XDR connector.
123134

124135
The exception to this process is Defender for Cloud. You have the option to enable tenant-based Defender for Cloud alerts to receive all alerts and incidents through Defender XDR, or keep subscription-based alerts and promote them to incidents within Microsoft Sentinel in the Azure portal.
125136

@@ -134,7 +145,7 @@ To avoid creating *duplicate incidents for the same alerts*, the **Microsoft inc
134145

135146
- **Alert filtering**. Microsoft Sentinel's incident creation rules allowed you to filter the alerts that would be used to create incidents. With these rules disabled, preserve the alert filtering capability by configuring [alert tuning in the Microsoft Defender portal](/microsoft-365/security/defender/investigate-alerts), or by using [automation rules](automate-incident-handling-with-automation-rules.md#incident-suppression) to suppress or close incidents you don't want.
136147

137-
- **Incident titles**. After you enable the Defender XDR connector, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
148+
- **Incident titles**. With the Defender XDR connector enabled, you can no longer predetermine the titles of incidents. The Defender XDR correlation engine presides over incident creation and automatically names the incidents it creates. This change is liable to affect any automation rules you created that use the incident name as a condition. To avoid this pitfall, use criteria other than the incident name as conditions for [triggering automation rules](automate-incident-handling-with-automation-rules.md#conditions). We recommend using *tags*.
138149

139150
- **Scheduled analytics rules**. If you use Microsoft Sentinel's incident creation rules for other Microsoft security solutions or products not integrated into Defender XDR, such as Microsoft Purview Insider Risk Management, and you plan to onboard to the Defender portal, replace your incident creation rules with [scheduled analytics rules](scheduled-rules-overview.md).
140151

0 commit comments

Comments
 (0)