You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
34
-
35
-
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.Insights**.
33
+
- Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
34
+
- Sign in to your [Azure tenant](https://ms.portal.azure.com/), and go to **Subscriptions** > **Your subscription** > **Resource Providers** > **Register to Microsoft.Insights**.
36
35
37
36
### Add contributor permissions
38
37
39
-
Once the Storage account is created, you'll need to:
38
+
Once the storage account is created, you need to define the user who is signing in as a contributor.
40
39
41
-
1.Define the user who is logging into Microsoft Defender XDR as Contributor.
40
+
1.Go to **Storage Account** > **Access control (IAM)**, and then select **Add**.
42
41
43
-
Go to **Storage Account > Access control (IAM) > Add** and verify under **Role assignments**.
42
+
2. Verify the user is listed under **Role assignments**.
44
43
45
44
## Enable raw data streaming
46
45
47
-
1. Log in to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender XDR</a> as a ***Security Administrator*** at a minimum.
46
+
> [!NOTE]
47
+
> When using the Streaming API to an Azure Storage account, ensure the option `Allow trusted Microsoft services to access this storage account` is enabled in the storage account settings to allow for data to be streamed from Microsoft Defender for Endpoint.
48
+
49
+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with at least Security Administrator permissions.
48
50
49
-
>[!IMPORTANT]
50
-
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
51
+
> [!IMPORTANT]
52
+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
51
53
52
-
2. Go to **Settings**\>**Microsoft Defender XDR**\>**Streaming API**. To go directly to the **Streaming API** page, use <https://security.microsoft.com/settings/mtp_settings/raw_data_export>.
54
+
2. Go to **Settings** > **Microsoft Defender XDR** > **Streaming API**. To go directly to the **Streaming API** page, use [https://security.microsoft.com/settings/mtp_settings/raw_data_export](https://security.microsoft.com/settings/mtp_settings/raw_data_export).
53
55
54
56
3. Select **Add**.
55
57
56
58
4. In the **Add new Streaming API settings** flyout that appears, configure the following settings:
57
-
1.**Name**: Choose a name for your new settings.
58
-
2. Select **Forward events to Azure Storage**.
59
-
4. To display the Azure Resource Manager resource ID for a storage account in the Azure portal, follow these steps:
60
59
61
-
1. Navigate to your storage account in the Azure portal.
62
-
2. On the **Overview** page, in the **Essentials** section, select the **JSON View** link.
63
-
3. The resource ID for the storage account is displayed at the top of the page, copy the text under **Storage Account Resource ID**.
60
+
-**Name**: Choose a name for your new settings.
61
+
- Select **Forward events to Azure Storage**.
62
+
63
+
5. To display the Azure Resource Manager resource ID for a storage account in the Azure portal, follow these steps:
64
+
65
+
1. Navigate to your storage account in the [Azure portal](https://portal.azure.com).
66
+
67
+
2. In the **Overview** page, in the **Essentials** section, select the **JSON View** link.
64
68
65
-
4. Back on the **Add new Streaming API settings** flyout, choose the **Event types** that you want to stream.
69
+
3. The resource ID for the storage account is displayed at the top of the page. Copy the text under **Storage Account Resource ID**.
66
70
67
-
When you're finished, select **Submit**.
71
+
4. In the **Add new Streaming API settings** flyout, choose the **Event types** that you want to stream.
72
+
73
+
5. When you're finished, select **Submit**.
68
74
69
75
## The schema of the events in the Storage account
70
76
@@ -74,14 +80,14 @@ Once the Storage account is created, you'll need to:
74
80
75
81
- The schema of each row in a blob is the following JSON:
76
82
77
-
```JSON
78
-
{
83
+
```JSON
84
+
{
79
85
"time": "<The time Microsoft Defender XDR received the event>"
80
86
"tenantId": "<Your tenant ID>"
81
87
"category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
@@ -91,9 +97,11 @@ Once the Storage account is created, you'll need to:
91
97
92
98
## Data types mapping
93
99
94
-
In order to get the data types for our events properties do the following:
100
+
To get the data types for events properties, follow these steps:
101
+
102
+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in.
95
103
96
-
1. Log in to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender XDR</a> and go to **Hunting**\>**Advanced hunting**. To go directly to the **Advanced hunting** page, use <security.microsoft.com/advanced-hunting>.
104
+
2. Go to **Hunting**\>**Advanced hunting**. To go directly to the **Advanced hunting** page, use [https://security.microsoft.com/advanced-hunting](https://security.microsoft.com/advanced-hunting).
97
105
98
106
2. On the **Query** tab, run the following query to get the data types mapping for each event:
99
107
@@ -103,21 +111,20 @@ In order to get the data types for our events properties do the following:
103
111
| project ColumnName, ColumnType
104
112
```
105
113
106
-
- Here's an example for Device Info event:
114
+
Here's an example for Device Info event:
107
115
108
-
:::image type="content" source="/defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example device info query" lightbox="/defender-endpoint/media/machine-info-datatype-example.png":::
116
+
:::image type="content" source="/defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example device info query" lightbox="/defender-endpoint/media/machine-info-datatype-example.png":::
109
117
110
118
## Monitoring created resources
111
119
112
-
You can monitor the resources created by the streaming API using **Azure Monitor**.
113
-
For more information, see [Monitor destinations - Azure Monitor | Microsoft Docs](/azure/azure-monitor/logs/logs-data-export?tabs=portal#monitor-destinations).
120
+
You can monitor the resources created by the streaming API using **Azure Monitor**. For more information, see [Monitor destinations - Azure Monitor](/azure/azure-monitor/logs/logs-data-export?tabs=portal#monitor-destinations).
114
121
115
-
## Related topics
122
+
## Related articles
116
123
117
124
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
118
-
119
125
-[Overview of Advanced Hunting](advanced-hunting-overview.md)
0 commit comments