Skip to content

Commit 4924955

Browse files
authored
Merge pull request #269287 from ElazarK/WI215942-continuous-export
continuous export
2 parents adb6d2d + c9b86b2 commit 4924955

27 files changed

+442
-251
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,9 @@
281281
- name: Incidents reference list
282282
displayName: incidents
283283
href: incidents-reference.md
284-
284+
- name: Exporting alerts and recommendations with continuous export
285+
displayName: continuous, export, exportable, exportable data
286+
href: benefits-of-continuous-export.md
285287

286288
- name: How-to guides
287289
items:
@@ -419,15 +421,29 @@
419421
- name: Prepare Azure resources for exporting to Splunk and QRadar
420422
displayName: azure, resources, Splunk, QRadar
421423
href: export-to-splunk-or-qradar.md
422-
- name: Export to a Log Analytics workspace or Azure Event Hubs
423-
displayName: continuous, log analytics, workspace, event hubs, azure
424-
href: continuous-export.md
425-
- name: Download a CSV report of all alerts
424+
- name: Continuous export
425+
items:
426+
- name: Setup continuous export in the Azure portal
427+
displayName: continuous, log analytics, workspace, event hubs, azure
428+
href: continuous-export.md
429+
- name: Setup continuous export with REST API
430+
displayName: continuous, setup, export
431+
href: continuous-export-rest-api.md
432+
- name: Setup continuous export with Azure policy
433+
displayName: continuous, setup, export, policy
434+
href: continuous-export-azure-policy.md
435+
- name: Continuous export to an event hub behind a firewall
436+
displayName: continuous, export, event hub, firewall
437+
href: continuous-export-event-hub-firewall.md
438+
- name: View exported data in Azure Monitor
439+
displayName: continuous, view, exported, data, monitor
440+
href: continuous-export-view-data.md
441+
- name: Download a CSV report
426442
displayName: CSV report, alerts
427-
href: continuous-export.md#manual-one-time-export-of-alerts-and-recommendations
428-
- name: Alerts schemas
429-
displayName: Alerts schemas
430-
href: alerts-schemas.md
443+
href: export-alerts-to-csv.md
444+
- name: Alerts schemas
445+
displayName: Alerts schemas
446+
href: alerts-schemas.md
431447
- name: Manage security incidents
432448
displayName: security incidents
433449
href: incidents.md
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Exporting alerts and recommendations with continuous export
3+
description: Learn about the benefits of continuous export in Microsoft Defender for Cloud. Stream security data to Azure Monitor workspace for analysis and visualization.
4+
ms.date: 03/25/2024
5+
author: dcurwin
6+
ms.author: dacurwin
7+
ms.topic: concept-article
8+
#customer intent: As a reader, I want to understand the benefits of continuous export in Microsoft Defender for Cloud so that I can make informed decisions about implementing it in my organization.
9+
---
10+
11+
# Exporting alerts and recommendations with continuous export
12+
13+
Microsoft Defender for Cloud provides continuous export of security data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic [deployment model solution](export-to-siem.md). You can analyze and visualize the data using Azure Monitor logs and other Azure Monitor features.
14+
15+
When you set up continuous export, you can fully customize what information to export and where the information goes. For example, you can configure it so that:
16+
17+
- All high-severity alerts are sent to an Azure event hub.
18+
- All medium or higher-severity findings from vulnerability assessment scans of your computers running SQL Server are sent to a specific Log Analytics workspace.
19+
- Specific recommendations are delivered to an event hub or Log Analytics workspace whenever they're generated.
20+
- The secure score for a subscription is sent to a Log Analytics workspace whenever the score for a control changes by 0.01 or more.
21+
22+
## What data types can be exported?
23+
24+
You can use continuous export to export the following data types whenever they change:
25+
26+
- Security recommendations.
27+
- Recommendation severity.
28+
- Security findings.
29+
- Secure score.
30+
- Controls.
31+
- Security alerts.
32+
- Regulatory compliance.
33+
- Attack paths
34+
35+
Recommendation severity, security findings and controls are *sub* categories that belong to a *parent* category. For example:
36+
37+
- The recommendations [System updates should be installed on your machines (powered by Update Center)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e1145ab1-eb4f-43d8-911b-36ddf771d13f) and [System updates should be installed on your machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/4ab6e3c5-74dd-8b35-9ab9-f61b30875b27) each has one sub recommendation per outstanding system update.
38+
- The recommendation [Machines should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1195afff-c881-495e-9bc5-1486211ae03f) has a sub recommendation for every vulnerability that the vulnerability scanner identifies.
39+
40+
> [!NOTE]
41+
> If you’re configuring [continuous export by using the REST API](continuous-export-rest-api.md), always include the parent with the findings.
42+
43+
## Export data to an event hub or Log Analytics workspace in another tenant
44+
45+
You *can't* configure data to be exported to a Log Analytics workspace in another tenant if you use Azure Policy to assign the configuration. This process works only when you use the REST API to assign the configuration, and the configuration is unsupported in the Azure portal (because it requires a multitenant context). Azure Lighthouse *doesn't* resolve this issue with Azure Policy, although you can use Azure Lighthouse as the authentication method.
46+
47+
When you collect data in a tenant, you can analyze the data from one, central location.
48+
49+
To export data to an event hub or Log Analytics workspace in a different tenant:
50+
51+
- In the tenant that has the event hub or Log Analytics workspace, [invite a user](../active-directory/external-identities/what-is-b2b.md#easily-invite-guest-users-from-the-azure-portal) from the tenant that hosts the continuous export configuration, or you can configure Azure Lighthouse for the source and destination tenant.
52+
53+
- If you use business-to-business (B2B) guest user access in Microsoft Entra ID, ensure that the user accepts the invitation to access the tenant as a guest.
54+
55+
- If you use a Log Analytics workspace, assign the user in the workspace tenant one of these roles: Owner, Contributor, Log Analytics Contributor, Sentinel Contributor, or Monitoring Contributor.
56+
57+
- Create and submit the request to the Azure REST API to configure the required resources. You must manage the bearer tokens in both the context of the local (workspace) tenant and the remote (continuous export) tenant.
58+
59+
## Export to a Log Analytics workspace
60+
61+
If you want to analyze Microsoft Defender for Cloud data inside a Log Analytics workspace or use Azure alerts together with Defender for Cloud alerts, set up continuous export to your Log Analytics workspace.
62+
63+
### Log Analytics tables and schemas
64+
65+
Security alerts and recommendations are stored in the **SecurityAlert** and **SecurityRecommendation** tables respectively.
66+
67+
The name of the Log Analytics solution that contains these tables depends on whether you enabled the enhanced security features: Security (the Security and Audit solution) or SecurityCenterFree.
68+
69+
> [!TIP]
70+
> To see the data on the destination workspace, you must enable one of these solutions: Security and Audit or SecurityCenterFree.
71+
72+
:::image type="content" source="media/benefits-of-continuous-export/log-analytics-securityalert-solution.png" alt-text="Screenshot that shows the SecurityAlert table in Log Analytics.":::
73+
74+
To view the event schemas of the exported data types, see [Log Analytics table schemas](https://aka.ms/ASCAutomationSchemas).
75+
76+
## Related content
77+
78+
- [Set up continuous export in the Azure portal](continuous-export.md)
79+
- [Set up continuous export with REST API](continuous-export-rest-api.md)
80+
- [Set up continuous export with Azure Policy](continuous-export-azure-policy.md)
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: Set up continuous export with Azure Policy
3+
description: Learn how to set up continuous export of Microsoft Defender for Cloud security alerts and recommendations with Azure Policy.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/20/2024
8+
#customer intent: As a security analyst, I want to learn how to set up continuous export of alerts and recommendations with Azure Policy so that I can analyze the data in Log Analytics or Azure Event Hubs.
9+
---
10+
11+
# Set up continuous export with Azure Policy
12+
13+
Continuous export of Microsoft Defender for Cloud security alerts and recommendations can help you analyze the data in Log Analytics or Azure Event Hubs. You can set up continuous export in Defender for Cloud at scale, by using provided Azure Policy templates.
14+
15+
> [!TIP]
16+
> Defender for Cloud also offers the option to do a onetime, manual export to a comma-separated values (CSV) file. Learn how to [download a CSV file](export-alerts-to-csv.md).
17+
18+
## Prerequisites
19+
20+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21+
22+
- You must [enable Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
23+
24+
Required roles and permissions:
25+
- Security Admin or Owner for the resource group
26+
- Write permissions for the target resource.
27+
- If you use the [Azure Policy DeployIfNotExist policies](#set-up-continuous-export-at-scale-with-azure-policy), you must have permissions that let you assign policies.
28+
- To export data to Event Hubs, you must have Write permissions on the Event Hubs policy.
29+
- To export to a Log Analytics workspace:
30+
- If it *has the SecurityCenterFree solution*, you must have a minimum of Read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`.
31+
- If it *doesn't have the SecurityCenterFree solution*, you must have write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`.
32+
33+
Learn more about [Azure Monitor and Log Analytics workspace solutions](/previous-versions/azure/azure-monitor/insights/solutions).
34+
35+
## Set up continuous export at scale with Azure Policy
36+
37+
Automating your organization's monitoring and incident response processes can help you reduce the time it takes to investigate and mitigate security incidents.
38+
39+
To deploy your continuous export configurations across your organization, use the provided Azure Policy `DeployIfNotExist` policies to create and configure continuous export procedures.
40+
41+
To implement these policies:
42+
43+
1. Select a policy to apply:
44+
45+
|Goal |Policy |Policy ID |
46+
|---------|---------|---------|
47+
|Continuous export to Event Hubs|[Deploy export to Event Hubs for Microsoft Defender for Cloud alerts and recommendations](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fcdfcce10-4578-4ecd-9703-530938e4abcb)|cdfcce10-4578-4ecd-9703-530938e4abcb|
48+
|Continuous export to Log Analytics workspace|[Deploy export to Log Analytics workspace for Microsoft Defender for Cloud alerts and recommendations](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fffb6f416-7bd2-4488-8828-56585fef2be9)|ffb6f416-7bd2-4488-8828-56585fef2be9|
49+
50+
1. Select **Assign**.
51+
52+
:::image type="content" source="./media/continuous-export-azure-policy/export-policy-assign.png" alt-text="Screenshot that shows assigning the Azure Policy.":::
53+
54+
1. Select each tab and set the parameters to meet your requirements:
55+
56+
1. On the **Basics** tab, set the scope for the policy. To use centralized management, assign the policy to the management group that contains the subscriptions that use the continuous export configuration.
57+
58+
1. On the **Parameters** tab, set the resource group name, location and Event Hub details.
59+
60+
1. Optionally, to apply this assignment to existing subscriptions, select the **Remediation** tab, and then select the option to create a remediation task.
61+
62+
1. Review the summary page, and then select **Create**.
63+
64+
## Next step
65+
66+
> [!div class="nextstepaction"]
67+
> [Setup continuous export to an event hub behind a firewall](continuous-export-event-hub-firewall.md)
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Set up continuous export to an event hub behind a firewall
3+
description: Learn how to set up continuous export of Microsoft Defender for Cloud security alerts and recommendations to an event hub behind a firewall.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/20/2024
8+
#customer intent: As a security analyst, I want to learn how to set up continuous export of alerts and recommendations to an event hub behind a firewall so that I can analyze the data in Log Analytics or Azure Event Hubs.
9+
---
10+
11+
# Set up continuous export to an event hub behind a firewall
12+
13+
In a situation where an event hub is behind a firewall, you can enable continuous export as a trusted service so that you can send data to the event hub.
14+
15+
## Prerequisites
16+
17+
- [Set up continuous export in the Azure portal](continuous-export.md) or [set up continuous export with Azure Policy](continuous-export-azure-policy.md) or [set up continuous export with REST API](continuous-export-rest-api.md).
18+
19+
## Set up continuous export to the eventhub
20+
21+
You can enable continuous export as a trusted service so that you can send data to an event hub that has Azure Firewall enabled.
22+
23+
**To grant access to continuous export as a trusted service**:
24+
25+
1. Sign in to the [Azure portal](https://portal.azure.com).
26+
27+
1. Go to **Microsoft Defender for Cloud** > **Environmental settings**.
28+
29+
1. Select the relevant resource.
30+
31+
1. Select **Continuous export**.
32+
33+
1. Select **Export as a trusted service**.
34+
35+
:::image type="content" source="media/continuous-export-event-hub-firewall/export-as-trusted.png" alt-text="Screenshot that shows where the checkbox is located to select export as trusted service.":::
36+
37+
## Add the relevant role assignment to the destination event hub.
38+
39+
To add the relevant role assignment to the destination event hub:
40+
41+
1. Go to the selected event hub.
42+
43+
1. In the resource menu, select **Access control (IAM)** > **Add role assignment**.
44+
45+
:::image type="content" source="media/continuous-export-event-hub-firewall/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment button." lightbox="media/continuous-export-event-hub-firewall/add-role-assignment.png":::
46+
47+
1. Select **Azure Event Hubs Data Sender**.
48+
49+
1. Select the **Members** tab.
50+
51+
1. Choose **+ Select members**.
52+
53+
1. Search for and then select **Windows Azure Security Resource Provider**.
54+
55+
:::image type="content" source="media/continuous-export-event-hub-firewall/windows-security-resource.png" alt-text="Screenshot that shows you where to enter and search for Microsoft Azure Security Resource Provider." lightbox="media/continuous-export-event-hub-firewall/windows-security-resource.png":::
56+
57+
1. Select **Review + assign**.
58+
59+
## Next step
60+
61+
> [!div class="nextstepaction"]
62+
> [View exported data in Azure Monitor](continuous-export-view-data.md)
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Set up continuous export with REST API
3+
description: Learn how to set up continuous export of Microsoft Defender for Cloud security alerts and recommendations with REST API.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/19/2024
8+
# customer intent: As a reader, I want to learn how to set up continuous export of Microsoft Defender for Cloud security alerts and recommendations using the REST API, so that I can integrate it into my own applications.
9+
---
10+
11+
# Set up continuous export with REST API
12+
13+
Continuous export of Microsoft Defender for Cloud security alerts and recommendations can help you analyze the data in Log Analytics or Azure Event Hubs. You can set up continuous export in Defender for Cloud by using the REST API.
14+
15+
> [!TIP]
16+
> Defender for Cloud also offers the option to do a onetime, manual export to a comma-separated values (CSV) file. Learn how to [download a CSV file](export-alerts-to-csv.md).
17+
18+
## Prerequisites
19+
20+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21+
22+
- You must [enable Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
23+
24+
Required roles and permissions:
25+
- Security Admin or Owner for the resource group
26+
- Write permissions for the target resource.
27+
- If you use the [Azure Policy DeployIfNotExist policies](continuous-export-azure-policy.md), you must have permissions that let you assign policies.
28+
- To export data to Event Hubs, you must have Write permissions on the Event Hubs policy.
29+
- To export to a Log Analytics workspace:
30+
- If it *has the SecurityCenterFree solution*, you must have a minimum of Read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`.
31+
- If it *doesn't have the SecurityCenterFree solution*, you must have write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`.
32+
33+
Learn more about [Azure Monitor and Log Analytics workspace solutions](/previous-versions/azure/azure-monitor/insights/solutions).
34+
35+
### Set up continuous export by using the REST API
36+
37+
You can set up and manage continuous export by using the Microsoft Defender for Cloud [automations API](/rest/api/defenderforcloud/automations). Use this API to create or update rules for exporting to any of the following destinations:
38+
39+
- Azure Event Hubs
40+
- Log Analytics workspace
41+
- Azure Logic Apps
42+
43+
You also can send the data to an [event hub or Log Analytics workspace in a different tenant](benefits-of-continuous-export.md#export-data-to-an-event-hub-or-log-analytics-workspace-in-another-tenant).
44+
45+
> [!NOTE]
46+
> If you’re configuring continuous export by using the REST API, always include the parent with the findings.
47+
48+
Here are some examples of options that you can use only in the API:
49+
50+
- **Greater volume**: You can create multiple export configurations on a single subscription by using the API. The **Continuous Export** page in the Azure portal supports only one export configuration per subscription.
51+
52+
- **Additional features**: The API offers parameters that aren't shown in the Azure portal. For example, you can add tags to your automation resource and define your export based on a wider set of alert and recommendation properties than the ones that are offered on the **Continuous export** page in the Azure portal.
53+
54+
- **Focused scope**: The API offers you a more granular level for the scope of your export configurations. When you define an export by using the API, you can define it at the resource group level. If you're using the **Continuous export** page in the Azure portal, you must define it at the subscription level.
55+
56+
> [!TIP]
57+
> These API-only options are not shown in the Azure portal. If you use them, a banner informs you that other configurations exist.
58+
59+
## Next step
60+
61+
> [!div class="nextstepaction"]
62+
> [Set up continuous export with Azure Policy](continuous-export-azure-policy.md)

0 commit comments

Comments
 (0)