Skip to content

Commit c9826e4

Browse files
Merge pull request #302362 from batamig/patch-337815
Updating with notes from Louie's onboarding text
2 parents b7429ec + 1ab13d0 commit c9826e4

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/sentinel/move-to-defender.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Before you start, note:
4040

4141
Review all planning guidance and finish all prerequisites before you onboard your workspace to the Defender portal. For more information, see the following articles:
4242

43-
- [**Plan for unified security operations in the Defender portal**](/unified-secops-platform/overview-plan)
43+
- [**Plan for unified security operations in the Defender portal**](/unified-secops-platform/overview-plan). After onboarding to the Defender portal, the **[Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-contributor)** role is assigned to the **Microsoft Threat Protection** and **WindowsDefenderATP** apps in your subscription.
4444

4545
- [**Deploy for unified security operations in the Defender portal**](/unified-secops-platform/overview-deploy). While this article is for new customers who don't yet have a workspace for Microsoft Sentinel or other services onboarded to the Defender portal, use it as a reference if you're moving to the Defender portal.
4646

@@ -88,6 +88,8 @@ For more information, see:
8888

8989
When Microsoft Sentinel is integrated with Microsoft Defender, the fundamental architecture of data collection and telemetry flow remains intact. Existing connectors that were configured in Microsoft Sentinel, whether for Microsoft Defender products or other data sources, continue operating without interruption.
9090

91+
Alerts related to Defender products are streamed directly from the Microsoft Defender XDR data connector to ensure consistency. Make sure that you have incidents and alerts from this connector turned on in your workspace. For more information, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md).
92+
9193
From a Log Analytics perspective, Microsoft Sentinel’s integration into Microsoft Defender introduces no change to the underlying ingestion pipeline or data schema. Despite the front-end unification, the Microsoft Sentinel backend remains fully integrated with Log Analytics for data storage, search, and correlation.
9294

9395
#### Integrate with Microsoft Defender for Cloud
@@ -214,7 +216,7 @@ For more information, see [Incidents and alerts in the Microsoft Defender portal
214216

215217
### Note changes for investigations with Advanced hunting
216218

217-
After onboarding Microsoft Sentinel to the Defender portal, access and use all your existing Kusto Query Language (KQL) queries and functions in the **Advanced hunting** page.
219+
After onboarding Microsoft Sentinel to the Defender portal, access and use all your existing log tables, Kusto Query Language (KQL) queries, and functions in the **Advanced hunting** page. All Microsoft Sentinel alerts that are tied to incidents are ingested into the `AlertInfo` table, accessible from the **Advanced hunting** page.
218220

219221
Some differences exist, such as:
220222

0 commit comments

Comments
 (0)