You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-microsoft-365-defender.md
+49-43Lines changed: 49 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,9 +51,13 @@ These are explained in greater detail below. See [Microsoft 365 Defender integra
51
51
52
52
### Connect incidents and alerts
53
53
54
-
Select the **Connect incidents & alerts** button to connect Microsoft 365 Defender incidents to your Microsoft Sentinel incidents queue.
54
+
To ingest and synchronize Microsoft 365 Defender incidents, with all their alerts, to your Microsoft Sentinel incidents queue:
55
+
56
+
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents.
57
+
(This check box will not appear once the Microsoft 365 Defender connector is connected.)
58
+
59
+
1. Select the **Connect incidents & alerts** button.
55
60
56
-
If you see a check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, mark it to avoid duplication of incidents.
57
61
58
62
> [!NOTE]
59
63
> When you enable the Microsoft 365 Defender connector, all of the Microsoft 365 Defender components’ connectors (the ones mentioned at the beginning of this article) are automatically connected in the background. In order to disconnect one of the components’ connectors, you must first disconnect the Microsoft 365 Defender connector.
@@ -81,61 +85,61 @@ Verify that you've satisfied the [prerequisites](#prerequisites-for-active-direc
81
85
82
86
### Connect events
83
87
84
-
1.If you want to collect advanced hunting events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, the following types of events can be collected from their corresponding advanced hunting tables.
88
+
If you want to collect advanced hunting events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, the following types of events can be collected from their corresponding advanced hunting tables.
85
89
86
-
1. Mark the check boxes of the tables with the event types you wish to collect:
90
+
1. Mark the check boxes of the tables with the event types you wish to collect:
87
91
88
-
# [Defender for Endpoint](#tab/MDE)
92
+
# [Defender for Endpoint](#tab/MDE)
89
93
90
-
| Table name | Events type |
91
-
|-|-|
92
-
|**[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)**| Machine information, including OS information |
93
-
|**[DeviceNetworkInfo](/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table)**| Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains |
94
-
|**[DeviceProcessEvents](/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table)**| Process creation and related events |
95
-
|**[DeviceNetworkEvents](/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table)**| Network connection and related events |
96
-
|**[DeviceFileEvents](/microsoft-365/security/defender/advanced-hunting-devicefileevents-table)**| File creation, modification, and other file system events |
97
-
|**[DeviceRegistryEvents](/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table)**| Creation and modification of registry entries |
98
-
|**[DeviceLogonEvents](/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table)**| Sign-ins and other authentication events on devices |
|**[DeviceEvents](/microsoft-365/security/defender/advanced-hunting-deviceevents-table)**| Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
101
-
|**[DeviceFileCertificateInfo](/microsoft-365/security/defender/advanced-hunting-DeviceFileCertificateInfo-table)**| Certificate information of signed files obtained from certificate verification events on endpoints |
94
+
| Table name | Events type |
95
+
|-|-|
96
+
|**[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)**| Machine information, including OS information |
97
+
|**[DeviceNetworkInfo](/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table)**| Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains |
98
+
|**[DeviceProcessEvents](/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table)**| Process creation and related events |
99
+
|**[DeviceNetworkEvents](/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table)**| Network connection and related events |
100
+
|**[DeviceFileEvents](/microsoft-365/security/defender/advanced-hunting-devicefileevents-table)**| File creation, modification, and other file system events |
101
+
|**[DeviceRegistryEvents](/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table)**| Creation and modification of registry entries |
102
+
|**[DeviceLogonEvents](/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table)**| Sign-ins and other authentication events on devices |
|**[DeviceEvents](/microsoft-365/security/defender/advanced-hunting-deviceevents-table)**| Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
105
+
|**[DeviceFileCertificateInfo](/microsoft-365/security/defender/advanced-hunting-DeviceFileCertificateInfo-table)**| Certificate information of signed files obtained from certificate verification events on endpoints |
102
106
103
-
# [Defender for Office 365](#tab/MDO)
107
+
# [Defender for Office 365](#tab/MDO)
104
108
105
-
| Table name | Events type |
106
-
|-|-|
107
-
|**[EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)**| Information about files attached to emails |
108
-
|**[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)**| Microsoft 365 email events, including email delivery and blocking events |
109
-
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
110
-
|**[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)**| Information about URLs on emails |
109
+
| Table name | Events type |
110
+
|-|-|
111
+
|**[EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)**| Information about files attached to emails |
112
+
|**[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)**| Microsoft 365 email events, including email delivery and blocking events |
113
+
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
114
+
|**[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)**| Information about URLs on emails |
111
115
112
-
# [Defender for Identity](#tab/MDI)
116
+
# [Defender for Identity](#tab/MDI)
113
117
114
-
| Table name | Events type |
115
-
|-|-|
116
-
|**[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)**| Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
117
-
|**[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)**| Information about user accounts obtained from various services, including Azure Active Directory |
118
-
|**[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)**| Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
119
-
|**[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)**| Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
118
+
| Table name | Events type |
119
+
|-|-|
120
+
|**[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)**| Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
121
+
|**[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)**| Information about user accounts obtained from various services, including Azure Active Directory |
122
+
|**[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)**| Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
123
+
|**[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)**| Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
120
124
121
-
# [Defender for Cloud Apps](#tab/MDCA)
125
+
# [Defender for Cloud Apps](#tab/MDCA)
122
126
123
-
| Table name | Events type |
124
-
|-|-|
125
-
|**[CloudAppEvents](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table)**| Information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps |
127
+
| Table name | Events type |
128
+
|-|-|
129
+
|**[CloudAppEvents](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table)**| Information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps |
126
130
127
-
# [Defender alerts](#tab/MDA)
131
+
# [Defender alerts](#tab/MDA)
128
132
129
-
| Table name | Events type |
130
-
|-|-|
131
-
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**| Information about alerts from Microsoft 365 Defender components |
132
-
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft 365 Defender components |
133
+
| Table name | Events type |
134
+
|-|-|
135
+
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**| Information about alerts from Microsoft 365 Defender components |
136
+
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft 365 Defender components |
133
137
134
-
---
138
+
---
135
139
136
-
1. Click **Apply Changes**.
140
+
1. Click **Apply Changes**.
137
141
138
-
1. To query the advanced hunting tables in Log Analytics, enter the table name from the list above in the query window.
142
+
1. To query the advanced hunting tables in Log Analytics, enter the table name from the list above in the query window.
139
143
140
144
## Verify data ingestion
141
145
@@ -182,3 +186,5 @@ In this document, you learned how to integrate Microsoft 365 Defender incidents,
182
186
183
187
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
184
188
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
0 commit comments