Skip to content

Commit 5cf8a9e

Browse files
authored
Merge pull request #5595 from limwainstein/custom-data-collection-mde
Custom data collection
2 parents 141b7a3 + 43ebbfe commit 5cf8a9e

10 files changed

+233
-5
lines changed

defender-endpoint/TOC.yml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -625,6 +625,12 @@
625625
href: exclude-devices.md
626626
- name: Identifying transient devices
627627
href: transient-device-tagging.md
628+
- name: Collect custom device data
629+
items:
630+
- name: Overview
631+
href: custom-data-collection.md
632+
- name: Create custom data collection rules
633+
href: create-custom-data-collection-rules.md
628634
- name: Internet facing devices
629635
href: internet-facing-devices.md
630636
- name: Device timeline
@@ -1098,10 +1104,7 @@
10981104
href: live-response-command-examples.md
10991105

11001106
- name: Use sensitivity labels to prioritize incident response
1101-
href: information-protection-investigation.md
1102-
1103-
- name: Advanced hunting
1104-
href: /defender-xdr/advanced-hunting-overview?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
1107+
href: information-protection-investigation.md
11051108

11061109
- name: Threat analytics
11071110
items:
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Create and manage custom data collection rules in Microsoft Defender for Endpoint
3+
description: Learn how to create and manage custom data collection rules in Microsoft Defender for Endpoint to enhance your threat hunting capabilities.
4+
ms.service: defender-endpoint
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: lwainstein
8+
author: limwainstein
9+
ms.localizationpriority: medium
10+
manager: bagol
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- usx-security
16+
ms.topic: how-to
17+
search.appverid:
18+
- MOE150
19+
- MET150
20+
ms.date: 11/12/2025
21+
appliesto:
22+
- Microsoft Defender for Endpoint
23+
---
24+
25+
# Create and manage custom data collection rules in Microsoft Defender for Endpoint (Preview)
26+
27+
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
28+
29+
[Custom data collection (Preview)](custom-data-collection.md) enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs.
30+
31+
Custom data collection rules allow you to define specific events and analyze the data to enhance your security visibility and threat hunting operations. Custom data collection rules are based on tailored filters for event properties such as folder paths, process names, and network connections.
32+
33+
This article shows you how to create and manage custom data collection rules in the Microsoft Defender portal.
34+
35+
## Create custom data collection rules
36+
37+
### Prerequisites
38+
39+
To use custom data collection, check that you have the following prerequisites:
40+
41+
- A Microsoft Defender for Endpoint P2 license.
42+
- A connected [Microsoft Sentinel workspace](/azure/sentinel/quickstart-onboard): required for custom data storage and querying. You can currently only connect one Sentinel workspace per Defender for Endpoint tenant for custom data collection.
43+
- Dynamic tags configured in [Asset Rule Management](/defender-xdr/configure-asset-rules) for device targeting. To use a tag for custom data collection, the tag should be run at least once.
44+
45+
### Supported operating systems
46+
47+
- **Windows 10 and 11** with a minimum Defender for Endpoint client version of 10.8805.
48+
- Windows 10 requires enrollment in [Extended Security Updates (ESU) program](/windows/whats-new/extended-security-updates).
49+
50+
### Performance and limits
51+
52+
- Each collection rule can capture up to 25,000 events per device within a 24-hour rolling window. Once the device reaches the limit, telemetry for the specific rule on the specific device stops until the window resets.
53+
- If the device reaches the threshold early in the cycle, it can take up to 24 hours for telemetry to resume. For example, if the device reaches the limit one hour after the window resets, telemetry resumes after 23 hours.
54+
- If the device reaches the threshold near the end of the window, the delay is shorter. For example, if the device reaches the limit two hours before the window resets, telemetry resumes after two hours.
55+
- Rule deployment typically takes 20 minutes to one hour.
56+
- Custom collection operates alongside default Defender for Endpoint configuration without interference.
57+
58+
### Data costs
59+
60+
Custom data collection is included with Microsoft Defender for Endpoint P2 licensing. However, data ingestion into Microsoft Sentinel workspaces incurs charges based on your Sentinel billing arrangement.
61+
62+
### Create rules
63+
64+
1. In the Microsoft Defender portal, navigate to **Settings** > **Endpoints** > **Rules** > **Custom Data Collection**.
65+
66+
:::image type="content" source="media/custom-data-collection/custom-data-collection-main-view.png" alt-text="Screenshot of the main Custom Data Collection page." lightbox="media/custom-data-collection/custom-data-collection-main-view.png":::
67+
68+
1. To switch your Microsoft Sentinel workspace, select the workspace name on the top right, and select the workspace.
69+
1. Select **Create rule**. In the **General Information** section, type a rule name and description, and select **Next**.
70+
71+
:::image type="content" source="media/create-custom-data-collection-rules/create-custom-data-collection-rule-general.png" alt-text="Screenshot of creating a rule: General Information page." lightbox="media/create-custom-data-collection-rules/create-custom-data-collection-rule-general.png":::
72+
73+
1. In the **Create rule** section:
74+
75+
1. Select which table you want to collect data from. For more information, see [Supported event tables](custom-data-collection.md#supported-event-tables).
76+
1. Select the action for which you want to collect data.
77+
1. Add rule conditions to filter the data even further. You can add multiple conditions to refine the data collection. Rule conditions are based on the selected table. For more information, see the respective table link under [Supported event tables](custom-data-collection.md#supported-event-tables).
78+
79+
:::image type="content" source="media/create-custom-data-collection-rules/create-custom-data-collection-rule.png" alt-text="Screenshot of creating a rule: Create rule page." lightbox="media/create-custom-data-collection-rules/create-custom-data-collection-rule.png":::
80+
81+
1. Select **Next**.
82+
83+
1. In the **Define rule scope** section, select whether you want to collect data from all applicable client devices or from specific devices that include dynamic tags. For more information, see [Create dynamic rules for devices in asset rule management](/defender-xdr/configure-asset-rules).
84+
85+
:::image type="content" source="media/create-custom-data-collection-rules/create-custom-data-collection-rule-define-scope.png" alt-text="Screenshot of creating a rule: Define scope page." lightbox="media/create-custom-data-collection-rules/create-custom-data-collection-rule-define-scope.png":::
86+
87+
> [!NOTE]
88+
> Custom data collection only supports dynamic tags.
89+
90+
1. In the **Review and finish** section, review your rule settings, and select **Submit**.
91+
92+
:::image type="content" source="media/create-custom-data-collection-rules/create-custom-data-collection-rule-review.png" alt-text="Screenshot of creating a rule: Review and finish page." lightbox="media/create-custom-data-collection-rules/create-custom-data-collection-rule-review.png":::
93+
94+
It can take up to an hour for the rule to be deployed to the targeted devices.
95+
96+
## Monitor and troubleshoot
97+
98+
If rules aren't working as expected:
99+
100+
- Create a broad rule to collect events in an unexpected use case. For example, create a rule that collects all network events where `port not equals 0`.
101+
- Apply individual filters and tags to isolate issues.
102+
- If a device isn't responding after you enable the feature, reboot the device.
103+
104+
Review these considerations when monitoring and troubleshooting custom data collection rules:
105+
106+
- Endpoint detection and response (EDR) exclusions may override custom collection rules.
107+
- Dynamic tags update approximately every hour. Check the **Custom collection** > **Last run time** column for the status.
108+
109+
## Edit, delete, and enable or disable custom data collection rules
110+
111+
- To edit a rule, navigate to **Settings** > **Endpoints** > **Rules** > **Custom Collection**, select the rule you want to edit, and select **Edit**.
112+
- To disable or enable a rule, select the rule you want to modify, and select or clear the **Enable** check-box under the rule description. When you disable a rule,data collection for that rule stops on all targeted devices.
113+
- To delete a rule, select the rule you want to delete, and select **Delete**. When you delete a rule, the rule is permanently removed from the system.
114+
115+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
---
2+
title: Custom data collection in Microsoft Defender for Endpoint
3+
description: Custom data collection allows organizations to tailor telemetry collection to their specific threat hunting needs with customizable filters and enhanced visibility.
4+
ms.service: defender-endpoint
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: lwainstein
8+
author: limwainstein
9+
ms.localizationpriority: medium
10+
manager: bagol
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
- usx-security
16+
ms.topic: concept-article
17+
search.appverid:
18+
- MOE150
19+
- MET150
20+
ms.date: 11/12/2025
21+
appliesto:
22+
- Microsoft Defender for Endpoint
23+
---
24+
25+
# Custom data collection in Microsoft Defender for Endpoint (Preview)
26+
27+
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
28+
29+
Custom data collection (Preview) enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. This feature allows security teams to define specific collection rules with tailored filters for event properties such as folder paths, process names, and network connections.
30+
31+
This article provides an overview of custom data collection so that you can understand the feature's capabilities and how it enhances your security visibility and threat hunting operations.
32+
33+
## How custom data collection works
34+
35+
Custom data collection uses rule-based filtering to capture specific events from endpoint devices and route them to your Microsoft Sentinel workspace for analysis and threat hunting.
36+
37+
:::image type="content" source="media/custom-data-collection/custom-data-collection-main-view.png" alt-text="Screenshot of the main Custom Data Collection page." lightbox="media/custom-data-collection/custom-data-collection-main-view.png":::
38+
39+
Custom collection rules allow you to define the specific events you want to capture and the conditions under which they should be collected.
40+
41+
To create custom data collection rules, see [Create custom data collection rules](create-custom-data-collection-rules.md).
42+
43+
## Supported event tables
44+
45+
Custom data collection supports the following event tables.
46+
47+
| Table name | Description | Learn more |
48+
|------------|-------------|------------|
49+
| **DeviceCustomProcessEvents** | Stores data on process creation, termination, and other process-related activities. | [In-portal schema reference](/defender-xdr/advanced-hunting-schema-tables?#get-schema-information-in-the-security-center) or [DeviceProcessEvents](/defender-xdr/advanced-hunting-deviceprocessevents-table) table reference |
50+
| **DeviceCustomImageLoadEvents** | Stores data on image loading events, including details about the loaded images and their origins. | [In-portal schema reference](/defender-xdr/advanced-hunting-schema-tables?#get-schema-information-in-the-security-center) or [DeviceImageLoadEvents](/defender-xdr/advanced-hunting-deviceimageloadevents-table) table reference |
51+
| **DeviceCustomFileEvents** | Stores data on file creation, modification, deletion, and access activities. | [In-portal schema reference](/defender-xdr/advanced-hunting-schema-tables?#get-schema-information-in-the-security-center) or [DeviceFileEvents](/defender-xdr/advanced-hunting-devicefileevents-table) table reference |
52+
| **DeviceCustomNetworkEvents** | Stores data on network connection events, including IP addresses, ports, and protocols. | [In-portal schema reference](/defender-xdr/advanced-hunting-schema-tables?#get-schema-information-in-the-security-center) or [DeviceNetworkEvents](/defender-xdr/advanced-hunting-devicenetworkevents-table) table reference |
53+
| **DeviceCustomScriptEvents** | Stores data on script execution and process details related to any explicit customer request for collection. This table is a new addition and does not have a reference in the default event tables. | [In-portal schema reference](/defender-xdr/advanced-hunting-schema-tables?#get-schema-information-in-the-security-center) |
54+
55+
## Data flow and integration
56+
57+
This is the typical data flow for custom data collection:
58+
59+
1. Define collection rules in the Microsoft Defender portal with specific filters and device targets.
60+
2. Rules are transmitted to targeted endpoints, typically within 20 minutes to one hour.
61+
3. Endpoints collect events matching your rule criteria alongside default telemetry.
62+
4. Custom event data flows to your connected Microsoft Sentinel workspace.
63+
5. Query custom data using the supported event tables to learn about specific activities on your endpoints.
64+
65+
## Frequently asked questions
66+
67+
### Does custom data collection affect the default Defender for Endpoint configuration?
68+
69+
No, custom data collection rules live side-by-side with the Defender for Endpoint out-of-the-box configuration.
70+
71+
### Is a Microsoft Sentinel workspace required?
72+
73+
Yes, you need a connected Microsoft Sentinel workspace to create custom data collection rules. For more information, see the [prerequisites](create-custom-data-collection-rules.md#prerequisites).
74+
75+
### How can I know if a rule has reached the endpoint?
76+
77+
You can query for events collected by the relevant rule, for the specific endpoint. For example, the following query returns all effective rules on the endpoint (now and in the past), counting the rules' collected events.
78+
79+
```kusto
80+
search in (DeviceCustomFileEvents, DeviceCustomScriptEvents, DeviceCustomNetworkEvents) "your_device_id"
81+
| where DeviceId == "your_device_id"
82+
| summarize count() by RuleName, RuleLastModificationTime, $table
83+
```
84+
85+
### Does custom data collection incur additional costs?
86+
87+
See [data costs](create-custom-data-collection-rules.md#data-costs).
88+
89+
### What client versions and operating systems are currently supported?
90+
91+
See [supported operating systems](create-custom-data-collection-rules.md#supported-operating-systems). To query your client version, in [advanced hunting](/defender-xdr/advanced-hunting-overview), use the **ClientVersion** column in the **DeviceInfo** table.
92+
93+
### Are manual (static) tags supported?
94+
95+
No, we currently only support dynamic tags. However, you can create dynamic tags out of manual tags in **Settings > Microsoft Defender XDR > Asset rule management**. For more information, see [Configure dynamic rules for devices in asset rule management](/defender-xdr/configure-asset-rules).
96+
97+
### How can I collect all events for a specific event type?
98+
99+
See [Monitor and troubleshoot](create-custom-data-collection-rules.md#monitor-and-troubleshoot).
100+
101+
## Next steps
102+
103+
- Learn how to [create and manage custom data collection rules](create-custom-data-collection-rules.md)
104+
105+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
105 KB
Loading
133 KB
Loading
83 KB
Loading
116 KB
Loading
244 KB
Loading
211 KB
Loading

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,19 @@ appliesto:
2222
---
2323
# What's new in Microsoft Defender for Endpoint
2424

25-
2625
This article describes Microsoft Defender for Endpoint features that are in preview or generally available (GA) in the latest release.
2726

2827
Learn more:
2928

3029
- [What's new in Microsoft Defender for Endpoint on other operating systems and services](#whats-new-in-defender-for-endpoint-on-other-operating-systems-and-services)
3130
- [Preview features](/defender-xdr/preview)
3231

32+
## November 2025
33+
34+
|Feature |Preview/GA |Description |
35+
|---------|------------|-------------|
36+
|[Custom data collection](custom-data-collection.md) |Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
37+
3338
## October 2025
3439

3540
|Feature |Preview/GA |Description |

0 commit comments

Comments
 (0)