Skip to content

Commit 6e7aed6

Browse files
committed
sentinel
1 parent 03e0b61 commit 6e7aed6

File tree

1 file changed

+14
-18
lines changed

1 file changed

+14
-18
lines changed

articles/defender-for-cloud/export-to-siem.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Stream alerts to monitoring solutions
3-
description: Learn how to stream your security alerts to Microsoft Sentinel, third-party SIEMs, SOAR, or ITSM solutions
3+
description: Learn how to stream your security alerts to Microsoft Sentinel, SIEMs, SOAR, or ITSM solutions.
44
ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
@@ -9,16 +9,12 @@ ms.date: 01/10/2024
99

1010
# Stream alerts to monitoring solutions
1111

12-
Microsoft Defender for Cloud has the ability to stream security alerts into various Security Information and Event Management (SIEM),
13-
Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions.
14-
Security alerts are notifications that Defender for Cloud generates when it detects threats on your resources.
15-
Defender for Cloud prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem.
16-
Defender for Cloud also provides detailed steps to help you remediate attacks.
17-
Alerts data is retained for 90 days.
12+
Microsoft Defender for Cloud has the ability to stream security alerts into various Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions. Security alerts are generated when threats are detected on your resources. Defender for Cloud prioritizes and lists the alerts on the Alerts page, along with additional information needed to quickly investigate the problem. Detailed steps are provided to assist you to remediate the detected threat. All alerts data is retained for 90 days.
1813

19-
There are built-in Azure tools for ensuring you can view your alert data in all of the most popular solutions in use today, including:
14+
There are built-in Azure tools that are available that ensure you can view your alert data in the following solutions:
2015

2116
- **Microsoft Sentinel**
17+
- **Defender XDR**
2218
- **Splunk Enterprise and Splunk Cloud**
2319
- **IBM's QRadar**
2420
- **ServiceNow**
@@ -28,22 +24,22 @@ There are built-in Azure tools for ensuring you can view your alert data in all
2824

2925
## Stream alerts to Microsoft Sentinel
3026

31-
Defender for Cloud natively integrates with Microsoft Sentinel, Azure's cloud-native SIEM and SOAR solution.
32-
33-
[Learn more about Microsoft Sentinel](../sentinel/overview.md).
27+
Defender for Cloud natively integrates with [Microsoft Sentinel](../sentinel/overview.md) Azure's cloud-native SIEM and SOAR solution.
3428

3529
### Microsoft Sentinel's connectors for Defender for Cloud
3630

37-
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels:
31+
Microsoft Sentinel includes built-in connectors for Microsoft Defender for Cloud at the subscription and tenant levels.
32+
33+
You can:
3834

39-
- [Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md)
40-
- [Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539)
35+
- [Stream alerts to Microsoft Sentinel at the subscription level](../sentinel/connect-azure-security-center.md).
36+
- [Connect all subscriptions in your tenant to Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-security-center-auto-connect-to-sentinel/ba-p/1387539).
4137

42-
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. If you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated, but the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
38+
When you connect Defender for Cloud to Microsoft Sentinel, the status of Defender for Cloud alerts that get ingested into Microsoft Sentinel is synchronized between the two services. For example, when an alert is closed in Defender for Cloud, that alert is also shown as closed in Microsoft Sentinel. When you change the status of an alert in Defender for Cloud, the status of the alert in Microsoft Sentinel is also updated. However,the statuses of any Microsoft Sentinel **incidents** that contain the synchronized Microsoft Sentinel alert aren't updated.
4339

44-
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of those Defender for Cloud alerts. So, for example, when a Microsoft Sentinel incident that contains a Defender for Cloud alert is closed, Defender for Cloud automatically closes the corresponding original alert.
40+
You can enable the **bi-directional alert synchronization** feature to automatically sync the status of the original Defender for Cloud alerts with Microsoft Sentinel incidents that contain the copies of the Defender for Cloud alerts. For example, when a Microsoft Sentinel incident that contains a Defender for Cloud alert is closed, Defender for Cloud automatically closes the corresponding original alert.
4541

46-
Learn more in [Connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
42+
Learn how to [connect alerts from Microsoft Defender for Cloud](../sentinel/connect-azure-security-center.md).
4743

4844
> [!NOTE]
4945
> The bi-directional alert synchronization feature isn't available in the Azure Government cloud.
@@ -63,7 +59,7 @@ Another alternative for investigating Defender for Cloud alerts in Microsoft Sen
6359

6460
The export of security alerts to Splunk and QRadar uses Event Hubs and a built-in connector.
6561
You can either use a PowerShell script or the Azure portal to set up the requirements for exporting security alerts for your subscription or tenant.
66-
Then you’ll need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
62+
Then you need to use the procedure specific to each SIEM to install the solution in the SIEM platform.
6763

6864
### Prerequisites
6965

0 commit comments

Comments
 (0)