You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-microsoft-365-defender.md
+48-48Lines changed: 48 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,19 +43,18 @@ The **Configuration** section has three parts:
43
43
44
44
1.[**Connect incidents and alerts**](#connect-incidents-and-alerts) enables the basic integration between Microsoft 365 Defender and Microsoft Sentinel, synchronizing incidents and their alerts between the two platforms.
45
45
46
-
1.[**Connect entities**](#connect-entities-from-on-premises-active-directory) enables the integration of on-premises Active Directory user identities into Microsoft Sentinel through Microsoft Defender for Identity.
46
+
1.[**Connect entities**](#connect-entities) enables the integration of on-premises Active Directory user identities into Microsoft Sentinel through Microsoft Defender for Identity.
47
47
48
-
1.[**Connect events**](#connect-raw-events-from-microsoft-365-defender-components) enables the collection of raw advanced hunting events from Defender components.
48
+
1.[**Connect events**](#connect-events) enables the collection of raw advanced hunting events from Defender components.
49
49
50
50
These are explained in greater detail below. See [Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md) for more information.
51
51
52
52
### Connect incidents and alerts
53
53
54
54
To ingest and synchronize Microsoft 365 Defender incidents, with all their alerts, to your Microsoft Sentinel incidents queue:
55
55
56
-
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents.
57
-
58
-
(This check box will not appear once the Microsoft 365 Defender connector is connected.)
56
+
1. Mark the check box labeled **Turn off all Microsoft incident creation rules for these products. Recommended**, to avoid duplication of incidents.
57
+
(This check box will not appear once the Microsoft 365 Defender connector is connected.)
59
58
60
59
1. Select the **Connect incidents & alerts** button.
61
60
@@ -70,7 +69,7 @@ SecurityIncident
70
69
| where ProviderName == "Microsoft 365 Defender"
71
70
```
72
71
73
-
### Connect entities from on-premises Active Directory
72
+
### Connect entities
74
73
75
74
Use Microsoft Defender for Identity to sync user entities from your on-premises Active Directory to Microsoft Sentinel.
76
75
@@ -84,63 +83,63 @@ Verify that you've satisfied the [prerequisites](#prerequisites-for-active-direc
84
83
85
84
:::image type="content" source="media/connect-microsoft-365-defender/ueba-configuration-page.png" alt-text="Screenshot of UEBA configuration page for connecting user entities to Sentinel.":::
86
85
87
-
### Connect raw events from Microsoft 365 Defender components
86
+
### Connect events
88
87
89
-
1.If you want to collect advanced hunting events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, the following types of events can be collected from their corresponding advanced hunting tables.
88
+
If you want to collect advanced hunting events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, the following types of events can be collected from their corresponding advanced hunting tables.
90
89
91
-
1. Mark the check boxes of the tables with the event types you wish to collect:
90
+
1. Mark the check boxes of the tables with the event types you wish to collect:
92
91
93
-
# [Defender for Endpoint](#tab/MDE)
92
+
# [Defender for Endpoint](#tab/MDE)
94
93
95
-
| Table name | Events type |
96
-
|-|-|
97
-
|**[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)**| Machine information, including OS information |
98
-
|**[DeviceNetworkInfo](/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table)**| Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains |
99
-
|**[DeviceProcessEvents](/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table)**| Process creation and related events |
100
-
|**[DeviceNetworkEvents](/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table)**| Network connection and related events |
101
-
|**[DeviceFileEvents](/microsoft-365/security/defender/advanced-hunting-devicefileevents-table)**| File creation, modification, and other file system events |
102
-
|**[DeviceRegistryEvents](/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table)**| Creation and modification of registry entries |
103
-
|**[DeviceLogonEvents](/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table)**| Sign-ins and other authentication events on devices |
|**[DeviceEvents](/microsoft-365/security/defender/advanced-hunting-deviceevents-table)**| Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
106
-
|**[DeviceFileCertificateInfo](/microsoft-365/security/defender/advanced-hunting-DeviceFileCertificateInfo-table)**| Certificate information of signed files obtained from certificate verification events on endpoints |
94
+
| Table name | Events type |
95
+
|-|-|
96
+
|**[DeviceInfo](/microsoft-365/security/defender/advanced-hunting-deviceinfo-table)**| Machine information, including OS information |
97
+
|**[DeviceNetworkInfo](/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table)**| Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains |
98
+
|**[DeviceProcessEvents](/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table)**| Process creation and related events |
99
+
|**[DeviceNetworkEvents](/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table)**| Network connection and related events |
100
+
|**[DeviceFileEvents](/microsoft-365/security/defender/advanced-hunting-devicefileevents-table)**| File creation, modification, and other file system events |
101
+
|**[DeviceRegistryEvents](/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table)**| Creation and modification of registry entries |
102
+
|**[DeviceLogonEvents](/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table)**| Sign-ins and other authentication events on devices |
|**[DeviceEvents](/microsoft-365/security/defender/advanced-hunting-deviceevents-table)**| Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
105
+
|**[DeviceFileCertificateInfo](/microsoft-365/security/defender/advanced-hunting-DeviceFileCertificateInfo-table)**| Certificate information of signed files obtained from certificate verification events on endpoints |
107
106
108
-
# [Defender for Office 365](#tab/MDO)
107
+
# [Defender for Office 365](#tab/MDO)
109
108
110
-
| Table name | Events type |
111
-
|-|-|
112
-
|**[EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)**| Information about files attached to emails |
113
-
|**[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)**| Microsoft 365 email events, including email delivery and blocking events |
114
-
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
115
-
|**[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)**| Information about URLs on emails |
109
+
| Table name | Events type |
110
+
|-|-|
111
+
|**[EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)**| Information about files attached to emails |
112
+
|**[EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)**| Microsoft 365 email events, including email delivery and blocking events |
113
+
|**[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)**| Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
114
+
|**[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)**| Information about URLs on emails |
116
115
117
-
# [Defender for Identity](#tab/MDI)
116
+
# [Defender for Identity](#tab/MDI)
118
117
119
-
| Table name | Events type |
120
-
|-|-|
121
-
|**[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)**| Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
122
-
|**[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)**| Information about user accounts obtained from various services, including Azure Active Directory |
123
-
|**[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)**| Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
124
-
|**[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)**| Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
118
+
| Table name | Events type |
119
+
|-|-|
120
+
|**[IdentityDirectoryEvents](/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table)**| Various identity-related events, like password changes, password expirations, and user principal name (UPN) changes, captured from an on-premises Active Directory domain controller<br><br>Also includes system events on the domain controller |
121
+
|**[IdentityInfo](/microsoft-365/security/defender/advanced-hunting-identityinfo-table)**| Information about user accounts obtained from various services, including Azure Active Directory |
122
+
|**[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)**| Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
123
+
|**[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)**| Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
125
124
126
-
# [Defender for Cloud Apps](#tab/MDCA)
125
+
# [Defender for Cloud Apps](#tab/MDCA)
127
126
128
-
| Table name | Events type |
129
-
|-|-|
130
-
|**[CloudAppEvents](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table)**| Information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps |
127
+
| Table name | Events type |
128
+
|-|-|
129
+
|**[CloudAppEvents](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table)**| Information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps |
131
130
132
-
# [Defender alerts](#tab/MDA)
131
+
# [Defender alerts](#tab/MDA)
133
132
134
-
| Table name | Events type |
135
-
|-|-|
136
-
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**| Information about alerts from Microsoft 365 Defender components |
137
-
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft 365 Defender components |
133
+
| Table name | Events type |
134
+
|-|-|
135
+
|**[AlertInfo](/microsoft-365/security/defender/advanced-hunting-alertinfo-table)**| Information about alerts from Microsoft 365 Defender components |
136
+
|**[AlertEvidence](/microsoft-365/security/defender/advanced-hunting-alertevidence-table)**| Information about various entities - files, IP addresses, URLs, users, devices - associated with alerts from Microsoft 365 Defender components |
138
137
139
-
---
138
+
---
140
139
141
-
1. Click **Apply Changes**.
140
+
1. Click **Apply Changes**.
142
141
143
-
1. To query the advanced hunting tables in Log Analytics, enter the table name from the list above in the query window.
142
+
1. To query the advanced hunting tables in Log Analytics, enter the table name from the list above in the query window.
144
143
145
144
## Verify data ingestion
146
145
@@ -188,3 +187,4 @@ In this document, you learned how to integrate Microsoft 365 Defender incidents,
188
187
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
189
188
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
0 commit comments