Skip to content

Commit 9841b3c

Browse files
Merge pull request #3644 from MicrosoftDocs/maccruz-ahmto
MTO updates
2 parents c46107b + 6e631ac commit 9841b3c

File tree

3 files changed

+41
-14
lines changed

3 files changed

+41
-14
lines changed

defender-xdr/advanced-hunting-limits.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: how-to
21-
ms.date: 10/29/2024
21+
ms.date: 05/02/2025
2222
---
2323

2424
# Use the advanced hunting query resource report
@@ -43,6 +43,8 @@ Refer to the following table to understand existing quotas and usage parameters.
4343

4444
In the unified Microsoft Defender portal, you are able to run queries over Microsoft Sentinel tables by onboarding a workspace. [Log analytics workspace limits](/azure/azure-monitor/service-limits#log-analytics-workspaces) therefore also apply.
4545

46+
For advanced hunting in multitenant organizations, see [Quotas in advanced hunting in multitenant management](/unified-secops-platform/mto-advanced-hunting#quotas).
47+
4648
> [!NOTE]
4749
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
4850

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
ms.topic: how-to
25-
ms.date: 02/10/2025
25+
ms.date: 05/02/2025
2626
---
2727

2828
# Create and manage custom detections rules
@@ -75,13 +75,14 @@ In the Microsoft Defender portal, go to **Advanced hunting** and select an exist
7575

7676

7777
To create a custom detection rule, the query must return the following columns:
78-
1. `Timestamp` - Used to set the timestamp for generated alerts
79-
2. A column or combination of columns that uniquely identify the event in Defender XDR tables:
78+
1. `Timestamp` - This column is used to set the timestamp for generated alerts. The `Timestamp` that is returned from the query should not have been manipulated in the query and should be returned exactly as it appears in the raw event.
79+
80+
3. A column or combination of columns that uniquely identify the event in Defender XDR tables:
8081
- For Microsoft Defender for Endpoint tables, the `Timestamp`, `DeviceId`, and `ReportId` columns must appear in the same event
8182
- For Alert* tables, `Timestamp` must appear in the event
8283
- For Observation* tables, `Timestamp`and `ObservationId` must appear in the same event
8384
- For all others, `Timestamp` and `ReportId` must appear in the same event
84-
3. One of the following columns that contain a strong identifier for an impacted asset:
85+
4. One of the following columns that contain a strong identifier for an impacted asset:
8586
- `DeviceId`
8687
- `DeviceName`
8788
- `RemoteDeviceName`
@@ -99,6 +100,8 @@ To create a custom detection rule, the query must return the following columns:
99100
> [!NOTE]
100101
> Support for more entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
101102
103+
104+
102105
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
103106

104107
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.

unified-secops-platform/mto-advanced-hunting.md

Lines changed: 31 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Advanced hunting in Microsoft Defender multi-tenant management
3-
description: Learn about advanced hunting in Microsoft Defender multi-tenant management
2+
title: Advanced hunting in Microsoft Defender multitenant management
3+
description: Learn about advanced hunting in Microsoft Defender multitenant management
44
search.appverid: met150
55
ms.service: unified-secops-platform
66
ms.author: deniseb
@@ -14,21 +14,27 @@ ms.collection:
1414
- tier1
1515
- usx-security
1616
ms.topic: conceptual
17-
ms.date: 03/25/2025
17+
ms.date: 05/02/2025
1818
appliesto:
1919
- Microsoft Defender XDR
2020
- Microsoft Sentinel in the Microsoft Defender portal
2121
---
2222

23-
# Advanced hunting in Microsoft Defender multi-tenant management
23+
# Advanced hunting in Microsoft Defender multitenant management
2424

25-
Advanced hunting in Microsoft Defender multi-tenant management allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants and workspaces at the same time. If you have multiple tenants with Microsoft Sentinel workspaces onboarded to the Microsoft Defender portal, search for security information and event management (SIEM) data together with extended detection and response (XDR) data across multiple tenants and workspaces.
25+
Advanced hunting in Microsoft Defender multitenant management allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants and workspaces at the same time. If you have multiple tenants with Microsoft Sentinel workspaces onboarded to the Microsoft Defender portal, search for security information and event management (SIEM) data together with extended detection and response (XDR) data across multiple tenants and workspaces.
26+
2627

27-
Multiple workspaces per tenant are supported in multi-tenant Advanced hunting as preview.
28+
Multiple workspaces per tenant are supported in multitenant Advanced hunting as preview.
29+
30+
31+
## Quotas
32+
33+
Advanced hunting in multitenant organizations returns up to 50,000 records in total. For more information about service limits in advanced hunting, read [Understand advanced hunting quotas](/defender-xdr/advanced-hunting-limits#understand-advanced-hunting-quotas-and-usage-parameters).
2834

2935
## Run cross-tenant queries
3036

31-
You can run any query that you already have access to in the multi-tenant management **Advanced hunting** page.
37+
You can run any query that you already have access to in the multitenant management **Advanced hunting** page.
3238

3339
1. Queries listed on the **Queries** tab are filtered by tenant. Select a tenant to view the queries available for each one.
3440

@@ -59,8 +65,15 @@ You can run any query that you already have access to in the multi-tenant manage
5965
| take 10
6066
```
6167

68+
69+
> [!NOTE]
70+
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
71+
6272
To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
6373

74+
75+
76+
6477
## Run cross-workspace queries (Preview)
6578

6679
To run queries across multiple workspaces in the same tenant, use the [workspace( ) expression](/azure/azure-monitor/logs/cross-workspace-query#query-across-log-analytics-workspaces-using-workspace), with the workspace identifier as the argument in your query to refer to a table in a different workspace.
@@ -82,6 +95,10 @@ Results show from both *WorkspaceA1* and *WorkspaceB2*.
8295

8396
For more information, see [Query multiple workspaces](/azure/sentinel/extend-sentinel-across-workspaces-tenants#query-multiple-workspaces) and [Manage workspaces across tenants using Azure Lighthouse](/azure/sentinel/extend-sentinel-across-workspaces-tenants#manage-workspaces-across-tenants-using-azure-lighthouse).
8497

98+
> [!NOTE]
99+
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
100+
101+
85102
## Custom detection rules
86103

87104
You can also manage custom detection rules from multiple tenants in the custom detection rules page.
@@ -91,7 +108,7 @@ You can also manage custom detection rules from multiple tenants in the custom d
91108
1. To view custom detection rules, go to the [Custom detection rules page](https://mto.security.microsoft.com/v2/custom_detection) in Microsoft Defender multitenant management.
92109
2. View the **Tenant name** column to see which tenant the detection rule comes from:
93110

94-
:::image type="content" source="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png" alt-text="Screenshot of the Microsoft Defender XDR multi-tenant custom detection page" lightbox="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png":::
111+
:::image type="content" source="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png" alt-text="Screenshot of the Microsoft Defender XDR multitenant custom detection page." lightbox="media/mto-advanced-hunting/mto-custom-detection-tenant-name.png":::
95112

96113
To view only a specific tenant's custom detection rules, select **Filter**, choose the tenant or tenants and select **Apply**.
97114

@@ -112,9 +129,14 @@ To manage detection rules:
112129

113130
1. Select **Open detection rules** to view this rule in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com). To learn more, see [Custom detection rules](/defender-xdr/custom-detection-rules).
114131

132+
133+
134+
135+
136+
115137
## Related content
116138

117139
- [Set up Microsoft Defender multitenant management](mto-requirements.md)
118140
- [Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md)
119141
- [View and manage incidents and alerts](mto-incidents-alerts.md)
120-
- [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579)
142+
- [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579)

0 commit comments

Comments
 (0)