Skip to content

Commit 26fb5a4

Browse files
committed
MDE aggregated reporting
1 parent a2e87a5 commit 26fb5a4

File tree

4 files changed

+130
-0
lines changed

4 files changed

+130
-0
lines changed
Lines changed: 130 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,130 @@
1+
---
2+
title: Aggregated reporting in Microsoft Defender for Endpoint
3+
description: Learn how you collect important telemetry in Microsoft Defender for Endpoint by turning on aggregated reporting.
4+
ms.service: defender-endpoint
5+
ms.author: diannegali
6+
author: diannegali
7+
ms.localizationpriority: medium
8+
manager: deniseb
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- tier3
13+
ms.topic: conceptual
14+
search.appverid: met150
15+
ms.date: 01/21/2025
16+
appliesto:
17+
- Microsoft Defender for Endpoint Plan 2
18+
---
19+
20+
# Aggregated reporting in Microsoft Defender for Endpoint
21+
22+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
23+
24+
> [!IMPORTANT]
25+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
26+
27+
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
28+
29+
Defender for Endpoint reduces noise in collected data to improve the signal-to-noise ratio while balancing product performance and efficiency. It limits data collection to maintain this balance.
30+
31+
With aggregated reporting, Defender for Endpoint ensures that all essential event properties valuable to investigation and threat hunting activities are continuously collected. It does this by extended reporting intervals of one hour, which reduces the size of reported events and enables efficient yet valuable data collection.
32+
33+
When aggregated reporting is turned on, you can query for a summary of all supported event types, including low-efficacy telemetry, that you can use for investigation and hunting activities.
34+
35+
## Prerequisites
36+
37+
The following requirements must be met before turning on aggregated reporting:
38+
39+
- Defender for Endpoint Plan 2 license
40+
- Permissions to enable advanced features
41+
42+
Aggregated reporting supports the following:
43+
44+
- Client version: Windows version 2411 and above
45+
- Operating systems: Windows 11 22H2, Windows Server 2022, Windows 11 Enterprise, Windows 10 20H2, 21H1, 21H2, Windows Server version 20H2, and Windows Server 2019
46+
47+
## Turn on aggregated reporting
48+
49+
To turn aggregated reporting on, go to **Settings > Endpoints > Advanced features**. Toggle on the **Aggregated reporting** feature.
50+
51+
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/aggregated-reporting-toggle.png" alt-text="Screenshot of the aggregated reporting toggle in the Microsoft Defender portal settings page.":::
52+
53+
Once aggregated reporting is turned on, it can take up to seven days for aggregated reports to become available. You can then begin to query new data after the feature is turned on.
54+
55+
When you turn off aggregated reporting, the changes take a few hours to be applied. All previously collected data remains.
56+
57+
## Query aggregated reports
58+
59+
Aggregated reporting supports the following event types:
60+
61+
|Action type|Advanced hunting table|Device timeline presentation|Properties|
62+
|---|---|---|-----------|
63+
|FileCreatedAggregatedReport|DeviceFileEvents|{ProcessName} created {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
64+
|FileRenamedAggregatedReport|DeviceFileEvents|{ProcessName} renamed {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
65+
|FileModifiedAggregatedReport|DeviceFileEvents|{ProcessName} modified {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
66+
|ProcessCreatedAggregatedReport|DeviceProcessEvents|{InitiatingProcessName} created {Occurrences} {ProcessName} processes|1. Initiating process command line </br> 2. Initiating process SHA1 </br> 3. Initiating process file path </br> 4. Process command line </br> 5. Process SHA1 </br> 6. Folder path|
67+
|ConnectionSuccessAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} established {Occurrences} connections with {RemoteIP}:{RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
68+
|ConnectionFailedAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} failed to establish {Occurrences} connections with {RemoteIP:RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
69+
|LogonSuccessAggregatedReport|DeviceLogonEvents|{Occurrences} {LogonType} logons by {UserName}&bsol;{DomainName}|1. Target username </br> 2. Target user SID </br> 3. Target domain name </br> 4. Logon type|
70+
|LogonFailedAggregatedReport|DeviceLogonEvents|{Occurrences}{LogonType} logons failed by {UserName}&bsol;{DomainName} |1. Target username </br> 2. Target user SID </br> 3. Target domain name </br> 4. Logon type|
71+
72+
> [!NOTE]
73+
> Turning on aggregated reporting improves signal visibility, which might incur higher storage costs if you are streaming Defender for Endpoint advanced hunting tables to your SIEM or storage solutions.
74+
75+
To query new data with aggregated reports:
76+
77+
1. Go to **Investigation & response > Hunting > Custom detection rules**.
78+
2. Review and modify [existing rules and queries](/defender-xdr/custom-detection-rules) that might be affected by aggregated reporting.
79+
3. When necessary, create new custom rules to incorporate new action types.
80+
4. Go to the **Advanced Hunting** page and query the new data.
81+
82+
Here is an example of advanced hunting query results with aggregated reports.
83+
84+
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." "lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png:::
85+
86+
## Sample advanced hunting queries
87+
88+
You can use the following KQL queries to gather specific information using aggregated reporting.
89+
90+
### Query for noisy process activity
91+
92+
The following query highlights noisy process activity, which can be correlated with malicious signals.
93+
94+
```KQL
95+
DeviceProcessEvents
96+
| where Timestamp > ago(1h)
97+
| where ActionType == "ProcessCreatedAggregatedReport"
98+
| extend uniqueEventsAggregated = toint(todynamic(AdditionalFields).uniqueEventsAggregated)
99+
| project-reorder Timestamp, uniqueEventsAggregated, ProcessCommandLine, InitiatingProcessCommandLine, ActionType, SHA1, FolderPath, InitiatingProcessFolderPath, DeviceName
100+
| sort by uniqueEventsAggregated desc
101+
```
102+
103+
### Query for repeated sign in attempt failures
104+
105+
The following query identifies repeated sign-in attempt failures.
106+
107+
```KQL
108+
DeviceLogonEvents
109+
| where Timestamp > ago(30d)
110+
| where ActionType == "LogonFailedAggregatedReport"
111+
| extend uniqueEventsAggregated = toint(todynamic(AdditionalFields).uniqueEventsAggregated)
112+
| where uniqueEventsAggregated > 10
113+
| project-reorder Timestamp, DeviceId, uniqueEventsAggregated, LogonType, AccountName, AccountDomain, AccountSid
114+
| sort by uniqueEventsAggregated desc
115+
```
116+
117+
### Query for suspicious RDP connections
118+
119+
The following query identifies suspicious RDP connections, which might indicate malicious activity.
120+
121+
```KQL
122+
DeviceNetworkEvents
123+
| where Timestamp > ago(1d)
124+
| where ActionType endswith "AggregatedReport"
125+
| where RemotePort == "3389"
126+
| extend uniqueEventsAggregated = toint(todynamic(AdditionalFields).uniqueEventsAggregated)
127+
| where uniqueEventsAggregated > 10
128+
| project-reorder ActionType, Timestamp, uniqueEventsAggregated
129+
| sort by uniqueEventsAggregated desc
130+
```
13.9 KB
Loading
306 KB
Loading
597 KB
Loading

0 commit comments

Comments
 (0)