You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-microsoft-365-defender.md
+36-46Lines changed: 36 additions & 46 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,41 +3,40 @@ title: Connect Microsoft Defender XDR data to Microsoft Sentinel| Microsoft Docs
3
3
description: Learn how to ingest incidents, alerts, and raw event data from Microsoft Defender XDR into Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.author: yelevin
6
-
ms.topic: conceptual
7
-
ms.date: 02/01/2023
6
+
ms.topic: how-to
7
+
ms.date: 06/25/2023
8
+
appliesto:
9
+
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10
+
ms.collection: usx-security
8
11
---
9
12
10
13
# Connect data from Microsoft Defender XDR to Microsoft Sentinel
11
14
12
-
Microsoft Sentinel's [Microsoft Defender XDR](/microsoft-365/security/mtp/microsoft-threat-protection) connector with incident integration allows you to stream all Microsoft Defender XDR incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They also include alerts from Microsoft Defender XDR's component services **Microsoft Defender for Endpoint**, **Microsoft Defender for Identity**, **Microsoft Defender for Office 365**, and **Microsoft Defender for Cloud Apps**, as well as alerts from other services such as **Microsoft Purview Data Loss Prevention** and **Microsoft Entra ID Protection**. The Microsoft Defender XDR connector also brings incidents from **Microsoft Defender for Cloud**, although in order to synchronize alerts and entities from these incidents, you must enable the Microsoft Defender for Cloud connector, otherwise your Microsoft Defender for Cloud incidents will appear empty. Learn more about the available connectors for [Microsoft Defender for Cloud](ingest-defender-for-cloud-incidents.md).
15
+
The Microsoft Defender XDR connector for Microsoft Sentinel allows you to stream all Microsoft Defender XDR incidents, alerts, and advanced hunting events into Microsoft Sentinel. This connector keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include alerts, entities, and other relevant information from all the Microsoft Defender products and services. For more information, see [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md).
13
16
14
-
The connector also lets you stream **advanced hunting** events from *all*of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
17
+
The Defender XDR connector, especially its incident integration feature, is the foundation of the unified security operations platform. If you're onboarding Microsoft Sentinel to the Microsoft Defender portal, you must first enable this connector with incident integration.
15
18
16
-
For more information about incident integration and advanced hunting event collection, see [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
24
-
25
-
- Your user must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
26
-
27
-
- Your user must have read and write permissions on your Microsoft Sentinel workspace.
23
+
Before you begin, you must have the appropriate licensing, access, and configured resources described in this section.
28
24
29
-
- To make any changes to the connector settings, your user must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
25
+
- You must have a valid license for Microsoft Defender XDR, as described in [Microsoft Defender XDR prerequisites](/microsoft-365/security/mtp/prerequisites).
26
+
- Your user account must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
27
+
- You must have read and write permissions on your Microsoft Sentinel workspace.
28
+
- To make any changes to the connector settings, your account must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
30
29
- Install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
30
+
- Grant access to Microsoft Sentinel as appropriate for your organization. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
31
31
32
-
### Prerequisites for Active Directory sync via MDI
32
+
For on-premises Active Directory sync via Microsoft Defender for Identity:
33
33
34
34
- Your tenant must be onboarded to Microsoft Defender for Identity.
35
-
36
-
- You must have the MDI sensor installed.
35
+
- You must have the Microsoft Defender for Identity sensor installed.
37
36
38
37
## Connect to Microsoft Defender XDR
39
38
40
-
In Microsoft Sentinel, select **Data connectors**, select**Microsoft Defender XDR** from the gallery and select**Open connector page**.
39
+
In Microsoft Sentinel, select **Data connectors**. Select**Microsoft Defender XDR** from the gallery and **Open connector page**.
41
40
42
41
The **Configuration** section has three parts:
43
42
@@ -47,37 +46,31 @@ The **Configuration** section has three parts:
47
46
48
47
1.[**Connect events**](#connect-events) enables the collection of raw advanced hunting events from Defender components.
49
48
50
-
These are explained in greater detail below. See [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md) for more information.
49
+
For more information, see [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md).
51
50
52
51
### Connect incidents and alerts
53
52
54
-
To ingest and synchronize Microsoft Defender XDR incidents, with all their alerts, to your Microsoft Sentinel incidents queue:
53
+
To ingest and synchronize Microsoft Defender XDR incidents with all their alerts to your Microsoft Sentinel incidents queue, complete the following steps.
55
54
56
-
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents.
57
-
(This check box will not appear once the Microsoft Defender XDR connector is connected.)
55
+
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents. This check box doesn't appear once the Microsoft Defender XDR connector is connected.
58
56
59
57
1. Select the **Connect incidents & alerts** button.
58
+
1. Verify that Microsoft Sentinel is collecting Microsoft Defender XDR incident data. In Microsoft Sentinel **Logs** in the Azure portal, run the following statement in the query window:
60
59
60
+
```kusto
61
+
SecurityIncident
62
+
| where ProviderName == "Microsoft 365 Defender"
63
+
```
61
64
62
-
> [!NOTE]
63
-
> When you enable the Microsoft Defender XDR connector, all of the Microsoft Defender XDR components’ connectors (the ones mentioned at the beginning of this article) are automatically connected in the background. In order to disconnect one of the components’ connectors, you must first disconnect the Microsoft Defender XDR connector.
64
-
65
-
To query Microsoft Defender XDR incident data, use the following statement in the query window:
66
-
67
-
```kusto
68
-
SecurityIncident
69
-
| where ProviderName == "Microsoft 365 Defender"
70
-
```
65
+
When you enable the Microsoft Defender XDR connector, any Microsoft Defender components’ connectors that were previously connected are automatically disconnected in the background. Although they continue to *appear* connected, no data flows through them.
71
66
72
67
### Connect entities
73
68
74
69
Use Microsoft Defender for Identity to sync user entities from your on-premises Active Directory to Microsoft Sentinel.
75
70
76
-
Verify that you've satisfied the [prerequisites](#prerequisites-for-active-directory-sync-via-mdi) for syncing on-premises Active Directory users through Microsoft Defender for Identity (MDI).
77
-
78
71
1. Select the **Go the UEBA configuration page** link.
79
72
80
-
1. In the **Entity behavior configuration** page, if you haven't yet enabled UEBA, then at the top of the page, move the toggle to **On**.
73
+
1. In the **Entity behavior configuration** page, if you didn't enable UEBA, then at the top of the page, move the toggle to **On**.
81
74
82
75
1. Mark the **Active Directory (Preview)** check box and select **Apply**.
83
76
@@ -110,15 +103,15 @@ If you want to collect advanced hunting events from Microsoft Defender for Endpo
110
103
|-|-|
111
104
|**[EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)**| Information about files attached to emails |
112
105
|**[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)**| Microsoft 365 email events, including email delivery and blocking events |
113
-
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
106
+
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox |
114
107
|**[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)**| Information about URLs on emails |
108
+
|**[UrlClickEvents](/defender-xdr/advanced-hunting-urlclickevents-table)**|Events involving URLs clicked, selected, or requested on Microsoft Defender for Office 365|
115
109
116
110
# [Defender for Identity](#tab/MDI)
117
111
118
112
| Table name | Events type |
119
113
|-|-|
120
114
|**[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)**| Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
121
-
|**[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)**| Information about user accounts obtained from various services, including Microsoft Entra ID |
122
115
|**[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)**| Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
123
116
|**[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)**| Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
124
117
@@ -132,18 +125,18 @@ If you want to collect advanced hunting events from Microsoft Defender for Endpo
132
125
133
126
| Table name | Events type |
134
127
|-|-|
135
-
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**|Information about alerts from Microsoft Defender XDR components |
136
-
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft Defender XDR components|
128
+
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**|Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Cloud App Security, and Microsoft Defender for Identity, including severity information and threat categorization|
129
+
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft Defender XDR components|
137
130
138
131
---
139
132
140
-
1.Click**Apply Changes**.
133
+
1.Select**Apply Changes**.
141
134
142
-
1.To query the advanced hunting tables in Log Analytics, enter the table name from the list above in the query window.
135
+
To run a query in the advanced hunting tables in Log Analytics, enter the table name in the query window.
143
136
144
137
## Verify data ingestion
145
138
146
-
The data graph in the connector page indicates that you are ingesting data. You'll notice that it shows one line each for incidents, alerts, and events, and the events line is an aggregation of event volume across all enabled tables. Once you have enabled the connector, you can use the following KQL queries to generate more specific graphs.
139
+
The data graph in the connector page indicates that you're ingesting data. Notice that it shows one line each for incidents, alerts, and events, and the events line is an aggregation of event volume across all enabled tables. After you enable the connector, use the following KQL queries to generate more specific graphs.
147
140
148
141
Use the following KQL query for a graph of the incoming Microsoft Defender XDR incidents:
149
142
@@ -178,11 +171,8 @@ let Now = now();
178
171
| render timechart
179
172
```
180
173
181
-
In the **Next steps** tab, you’ll find some useful workbooks, sample queries, and analytics rule templates that have been included. You can run them on the spot or modify and save them.
182
-
183
174
## Next steps
184
175
185
-
In this document, you learned how to integrate Microsoft Defender XDR incidents, and advanced hunting event data from Microsoft Defender component services, into Microsoft Sentinel, using the Microsoft Defender XDR connector. To learn more about Microsoft Sentinel, see the following articles:
176
+
In this document, you learned how to integrate Microsoft Defender XDR incidents, alerts, and advanced hunting event data from Microsoft Defender services, into Microsoft Sentinel, by using the Microsoft Defender XDR connector.
186
177
187
-
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
188
-
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
178
+
To use Microsoft Sentinel integrated with Defender XDR in the unified security operations platform, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md).
0 commit comments