You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-limits.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.custom:
18
18
- cx-ti
19
19
- cx-ah
20
20
ms.topic: how-to
21
-
ms.date: 10/29/2024
21
+
ms.date: 05/02/2025
22
22
---
23
23
24
24
# Use the advanced hunting query resource report
@@ -43,6 +43,8 @@ Refer to the following table to understand existing quotas and usage parameters.
43
43
44
44
In the unified Microsoft Defender portal, you are able to run queries over Microsoft Sentinel tables by onboarding a workspace. [Log analytics workspace limits](/azure/azure-monitor/service-limits#log-analytics-workspaces) therefore also apply.
45
45
46
+
For advanced hunting in multitenant organizations, see [Quotas in advanced hunting in multitenant management](/unified-secops-platform/mto-advanced-hunting#quotas).
47
+
46
48
> [!NOTE]
47
49
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-rules.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ appliesto:
22
22
- Microsoft Defender XDR
23
23
- Microsoft Sentinel in the Microsoft Defender portal
24
24
ms.topic: how-to
25
-
ms.date: 02/10/2025
25
+
ms.date: 05/02/2025
26
26
---
27
27
28
28
# Create and manage custom detections rules
@@ -75,13 +75,14 @@ In the Microsoft Defender portal, go to **Advanced hunting** and select an exist
75
75
76
76
77
77
To create a custom detection rule, the query must return the following columns:
78
-
1.`Timestamp` - Used to set the timestamp for generated alerts
79
-
2. A column or combination of columns that uniquely identify the event in Defender XDR tables:
78
+
1.`Timestamp` - This column is used to set the timestamp for generated alerts. The `Timestamp` that is returned from the query should not have been manipulated in the query and should be returned exactly as it appears in the raw event.
79
+
80
+
3. A column or combination of columns that uniquely identify the event in Defender XDR tables:
80
81
- For Microsoft Defender for Endpoint tables, the `Timestamp`, `DeviceId`, and `ReportId` columns must appear in the same event
81
82
- For Alert* tables, `Timestamp` must appear in the event
82
83
- For Observation* tables, `Timestamp`and `ObservationId` must appear in the same event
83
84
- For all others, `Timestamp` and `ReportId` must appear in the same event
84
-
3. One of the following columns that contain a strong identifier for an impacted asset:
85
+
4. One of the following columns that contain a strong identifier for an impacted asset:
85
86
-`DeviceId`
86
87
-`DeviceName`
87
88
-`RemoteDeviceName`
@@ -99,6 +100,8 @@ To create a custom detection rule, the query must return the following columns:
99
100
> [!NOTE]
100
101
> Support for more entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
101
102
103
+
104
+
102
105
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
103
106
104
107
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.
Copy file name to clipboardExpand all lines: unified-secops-platform/mto-advanced-hunting.md
+31-9Lines changed: 31 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Advanced hunting in Microsoft Defender multi-tenant management
3
-
description: Learn about advanced hunting in Microsoft Defender multi-tenant management
2
+
title: Advanced hunting in Microsoft Defender multitenant management
3
+
description: Learn about advanced hunting in Microsoft Defender multitenant management
4
4
search.appverid: met150
5
5
ms.service: unified-secops-platform
6
6
ms.author: deniseb
@@ -14,21 +14,27 @@ ms.collection:
14
14
- tier1
15
15
- usx-security
16
16
ms.topic: conceptual
17
-
ms.date: 03/25/2025
17
+
ms.date: 05/02/2025
18
18
appliesto:
19
19
- Microsoft Defender XDR
20
20
- Microsoft Sentinel in the Microsoft Defender portal
21
21
---
22
22
23
-
# Advanced hunting in Microsoft Defender multi-tenant management
23
+
# Advanced hunting in Microsoft Defender multitenant management
24
24
25
-
Advanced hunting in Microsoft Defender multi-tenant management allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants and workspaces at the same time. If you have multiple tenants with Microsoft Sentinel workspaces onboarded to the Microsoft Defender portal, search for security information and event management (SIEM) data together with extended detection and response (XDR) data across multiple tenants and workspaces.
25
+
Advanced hunting in Microsoft Defender multitenant management allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants and workspaces at the same time. If you have multiple tenants with Microsoft Sentinel workspaces onboarded to the Microsoft Defender portal, search for security information and event management (SIEM) data together with extended detection and response (XDR) data across multiple tenants and workspaces.
26
+
26
27
27
-
Multiple workspaces per tenant are supported in multi-tenant Advanced hunting as preview.
28
+
Multiple workspaces per tenant are supported in multitenant Advanced hunting as preview.
29
+
30
+
31
+
## Quotas
32
+
33
+
Advanced hunting in multitenant organizations returns up to 50,000 records in total. For more information about service limits in advanced hunting, read [Understand advanced hunting quotas](/defender-xdr/advanced-hunting-limits#understand-advanced-hunting-quotas-and-usage-parameters).
28
34
29
35
## Run cross-tenant queries
30
36
31
-
You can run any query that you already have access to in the multi-tenant management **Advanced hunting** page.
37
+
You can run any query that you already have access to in the multitenant management **Advanced hunting** page.
32
38
33
39
1. Queries listed on the **Queries** tab are filtered by tenant. Select a tenant to view the queries available for each one.
34
40
@@ -59,8 +65,15 @@ You can run any query that you already have access to in the multi-tenant manage
59
65
| take 10
60
66
```
61
67
68
+
69
+
> [!NOTE]
70
+
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
71
+
62
72
To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
63
73
74
+
75
+
76
+
64
77
## Run cross-workspace queries (Preview)
65
78
66
79
To run queries across multiple workspaces in the same tenant, use the [workspace( ) expression](/azure/azure-monitor/logs/cross-workspace-query#query-across-log-analytics-workspaces-using-workspace), with the workspace identifier as the argument in your query to refer to a table in a different workspace.
@@ -82,6 +95,10 @@ Results show from both *WorkspaceA1* and *WorkspaceB2*.
82
95
83
96
For more information, see [Query multiple workspaces](/azure/sentinel/extend-sentinel-across-workspaces-tenants#query-multiple-workspaces) and [Manage workspaces across tenants using Azure Lighthouse](/azure/sentinel/extend-sentinel-across-workspaces-tenants#manage-workspaces-across-tenants-using-azure-lighthouse).
84
97
98
+
> [!NOTE]
99
+
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
100
+
101
+
85
102
## Custom detection rules
86
103
87
104
You can also manage custom detection rules from multiple tenants in the custom detection rules page.
@@ -91,7 +108,7 @@ You can also manage custom detection rules from multiple tenants in the custom d
91
108
1. To view custom detection rules, go to the [Custom detection rules page](https://mto.security.microsoft.com/v2/custom_detection) in Microsoft Defender multitenant management.
92
109
2. View the **Tenant name** column to see which tenant the detection rule comes from:
93
110
94
-
:::image type="content" source="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png" alt-text="Screenshot of the Microsoft Defender XDR multi-tenant custom detection page" lightbox="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png":::
111
+
:::image type="content" source="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png" alt-text="Screenshot of the Microsoft Defender XDR multitenant custom detection page." lightbox="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png":::
95
112
96
113
To view only a specific tenant's custom detection rules, select **Filter**, choose the tenant or tenants and select **Apply**.
97
114
@@ -112,9 +129,14 @@ To manage detection rules:
112
129
113
130
1. Select **Open detection rules** to view this rule in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com). To learn more, see [Custom detection rules](/defender-xdr/custom-detection-rules).
114
131
132
+
133
+
134
+
135
+
136
+
115
137
## Related content
116
138
117
139
-[Set up Microsoft Defender multitenant management](mto-requirements.md)
118
140
-[Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md)
119
141
-[View and manage incidents and alerts](mto-incidents-alerts.md)
120
-
-[Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579)
142
+
-[Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579)
0 commit comments