You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-defender-for-cloud.md
+24-29Lines changed: 24 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Ingest Microsoft Defender for Cloud subscription-based alerts to Microsof
3
3
description: Learn how to connect security alerts from Microsoft Defender for Cloud and stream them into Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 09/26/2024
6
+
ms.date: 11/19/2024
7
7
ms.author: yelevin
8
8
9
9
@@ -17,53 +17,51 @@ ms.author: yelevin
17
17
18
18
[Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription. While Microsoft Sentinel's legacy connector for Defender for Cloud Apps is also configured per subscription, the **Tenant-based Microsoft Defender for Cloud** connector, in preview, allows you to collect Defender for Cloud alerts over your entire tenant without having to enable each subscription separately. The tenant-based connector also works with [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
- When you connect Microsoft Defender for Cloud to Microsoft Sentinel, the status of security alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert will display as closed in Microsoft Sentinel as well.
22
+
- When you connect Microsoft Defender for Cloud to Microsoft Sentinel, the status of security alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert displays as closed in Microsoft Sentinel as well.
25
23
26
-
- Changing the status of an alert in Defender for Cloud will *not* affect the status of any Microsoft Sentinel **incidents** that contain the Microsoft Sentinel alert, only that of the alert itself.
24
+
- Changing the status of an alert in Defender for Cloud won't* affect the status of any Microsoft Sentinel **incidents** that contain the Microsoft Sentinel alert, only that of the alert itself.
27
25
28
-
## Bi-directional alert synchronization
26
+
-**Bi-directional alert synchronization**: Enabling **bi-directional sync** automatically syncs the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert is closed in Microsoft Defender for Cloud automatically.
29
27
30
-
Enabling **bi-directional sync** will automatically sync the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert will be closed in Microsoft Defender for Cloud automatically.
- You must have read and write permissions on your Microsoft Sentinel workspace.
35
33
36
34
- You must have the **Contributor** or **Owner** role on the subscription you want to connect to Microsoft Sentinel.
37
35
38
-
- You will need to enable at least one plan within Microsoft Defender for Cloud for each subscription where you want to enable the connector. To enable Microsoft Defender plans on a subscription, you must have the **Security Admin** role for that subscription.
36
+
- You'll need to enable at least one plan within Microsoft Defender for Cloud for each subscription where you want to enable the connector. To enable Microsoft Defender plans on a subscription, you must have the **Security Admin** role for that subscription.
39
37
40
-
- You will need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
38
+
- You'll need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
41
39
42
40
- To enable bi-directional sync, you must have the **Contributor** or **Security Admin** role on the relevant subscription.
43
41
44
42
- Install the solution for **Microsoft Defender for Cloud** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
45
43
46
44
## Connect to Microsoft Defender for Cloud
47
45
48
-
1. After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
46
+
1. After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
49
47
50
-
1. From the **Data connectors** page, select the either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
48
+
1. From the **Data connectors** page, select either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
51
49
52
-
1. Under **Configuration**, you will see a list of the subscriptions in your tenant, and the status of their connection to Microsoft Defender for Cloud. Select the **Status** toggle next to each subscription whose alerts you want to stream into Microsoft Sentinel. If you want to connect several subscriptions at once, you can do this by marking the check boxes next to the relevant subscriptions and then selecting the **Connect** button on the bar above the list.
50
+
1. Under **Configuration**, you'll see a list of the subscriptions in your tenant, and the status of their connection to Microsoft Defender for Cloud. Select the **Status** toggle next to each subscription whose alerts you want to stream into Microsoft Sentinel. If you want to connect several subscriptions at once, you can do this by marking the check boxes next to the relevant subscriptions and then selecting the **Connect** button on the bar above the list.
53
51
54
52
- The check boxes and **Connect** toggles are active only on the subscriptions for which you have the [required permissions](#prerequisites).
55
53
- The **Connect** button is active only if at least one subscription's check box has been marked.
56
54
57
55
1. To enable bi-directional sync on a subscription, locate the subscription in the list, and choose **Enabled** from the drop-down list in the **Bi-directional sync** column. To enable bi-directional sync on several subscriptions at once, mark their check boxes and select the **Enable bi-directional sync** button on the bar above the list.
58
56
59
-
- The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
60
-
- The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
57
+
- The check boxes and drop-down lists are active only on the subscriptions for which you have the [required permissions](#prerequisites).
58
+
- The **Enable bi-directional sync** button is active only if at least one subscription's check box has been marked.
61
59
62
-
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector).
60
+
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription, which is a [prerequisite](#prerequisites) for enabling the connector.
63
61
64
-
The value for each subscription in this column is either blank (meaning no Defender plans are enabled), **All enabled**, or **Some enabled**. Those that say **Some enabled** also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable.
62
+
The value for each subscription in this column is either blank, meaning no Defender plans are enabled, **All enabled**, or **Some enabled**. Those that say **Some enabled** also have an **Enable all** link you can select, that takes you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable.
65
63
66
-
The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether. For example:
64
+
The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list takes you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether. For example:
67
65
68
66
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration.":::
69
67
@@ -77,21 +75,18 @@ Enabling **bi-directional sync** will automatically sync the status of original
77
75
78
76
## Find and analyze your data
79
77
80
-
> [!NOTE]
81
-
> Alert synchronization *in both directions* can take a few minutes. Changes in the status of alerts might not be displayed immediately.
82
-
83
-
- Security alerts are stored in the *SecurityAlert* table in your Log Analytics workspace.
78
+
Security alerts are stored in the *SecurityAlert* table in your Log Analytics workspace. To query security alerts in Log Analytics, copy the following into your query window as a starting point:
84
79
85
-
- To query security alerts in Log Analytics, copy the following into your query window as a starting point:
80
+
```kusto
81
+
SecurityAlert
82
+
| where ProductName == "Azure Security Center"
83
+
```
86
84
87
-
```kusto
88
-
SecurityAlert
89
-
| where ProductName == "Azure Security Center"
90
-
```
85
+
Alert synchronization *in both directions* can take a few minutes. Changes in the status of alerts might not be displayed immediately.
91
86
92
-
- See the **Next steps** tab in the connector page for additional useful sample queries, analytics rule templates, and recommended workbooks.
87
+
See the **Next steps** tab in the connector page for more useful sample queries, analytics rule templates, and recommended workbooks.
93
88
94
-
## Next steps
89
+
## Related content
95
90
96
91
In this document, you learned how to connect Microsoft Defender for Cloud to Microsoft Sentinel and synchronize alerts between them. To learn more about Microsoft Sentinel, see the following articles:
0 commit comments