Skip to content

Commit 79ddfe2

Browse files
committed
Learn Editor: Update connect-microsoft-365-defender.md
1 parent 000a870 commit 79ddfe2

File tree

1 file changed

+10
-4
lines changed

1 file changed

+10
-4
lines changed

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,14 @@ These are explained in greater detail below. See [Microsoft 365 Defender integra
5151

5252
### Connect incidents and alerts
5353

54-
Select the **Connect incidents & alerts** button to connect Microsoft 365 Defender incidents to your Microsoft Sentinel incidents queue.
54+
To ingest and synchronize Microsoft 365 Defender incidents, with all their alerts, to your Microsoft Sentinel incidents queue:
55+
56+
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents.
57+
58+
(This check box will not appear once the Microsoft 365 Defender connector is connected.)
59+
60+
1. Select the **Connect incidents & alerts** button.
5561

56-
If you see a check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, mark it to avoid duplication of incidents.
5762

5863
> [!NOTE]
5964
> When you enable the Microsoft 365 Defender connector, all of the Microsoft 365 Defender components’ connectors (the ones mentioned at the beginning of this article) are automatically connected in the background. In order to disconnect one of the components’ connectors, you must first disconnect the Microsoft 365 Defender connector.
@@ -65,7 +70,7 @@ SecurityIncident
6570
| where ProviderName == "Microsoft 365 Defender"
6671
```
6772

68-
### Connect entities
73+
### Connect entities from on-premises Active Directory
6974

7075
Use Microsoft Defender for Identity to sync user entities from your on-premises Active Directory to Microsoft Sentinel.
7176

@@ -79,7 +84,7 @@ Verify that you've satisfied the [prerequisites](#prerequisites-for-active-direc
7984

8085
:::image type="content" source="media/connect-microsoft-365-defender/ueba-configuration-page.png" alt-text="Screenshot of UEBA configuration page for connecting user entities to Sentinel.":::
8186

82-
### Connect events
87+
### Connect raw events from Microsoft 365 Defender components
8388

8489
1. If you want to collect advanced hunting events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, the following types of events can be collected from their corresponding advanced hunting tables.
8590

@@ -182,3 +187,4 @@ In this document, you learned how to integrate Microsoft 365 Defender incidents,
182187

183188
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
184189
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
190+

0 commit comments

Comments
 (0)