|
| 1 | +--- |
| 2 | +title: Migrate to Supported API Solutions |
| 3 | +description: This article describes how to transition from the legacy Defender for Cloud Apps SIEM agent to supported APIs. |
| 4 | +ms.date: 05/19/2025 |
| 5 | +ms.topic: article |
| 6 | +--- |
| 7 | + |
| 8 | +# Migrate from Defender for Cloud Apps SIEM agent to supported APIs |
| 9 | + |
| 10 | +Transitioning from the legacy [Defender for Cloud Apps SIEM agent ](siem.md) to supported APIs enables continued access to enriched activities and alerts data. While the APIs might not have exact one-to-one mappings to the legacy Common Event Format (CEF) schema, they provide comprehensive, enhanced data through integration across multiple Microsoft Defender workloads. |
| 11 | + |
| 12 | +## Recommended APIs for migration |
| 13 | + |
| 14 | +> To ensure continuity and access to data currently available through Microsoft Defender for Cloud Apps SIEM agents, we recommend transitioning to the following supported APIs: |
| 15 | +> |
| 16 | +> - For alerts and activities, see: [Microsoft Defender XDR Streaming API](/defender-xdr/streaming-api). |
| 17 | +> - For Microsoft Entra ID Protection logon events, see [IdentityLogonEvents](/defender-xdr/advanced-hunting-identitylogonevents-table) table in the advanced hunting schema. |
| 18 | +> - For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true) |
| 19 | +> - To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true) |
| 20 | +
|
| 21 | +## Field Mapping from Legacy SIEM to Supported APIs |
| 22 | + |
| 23 | +The table below compares the legacy SIEM agent’s CEF fields to the nearest equivalent fields in the Defender XDR Streaming API (advanced hunting event schema) and the Microsoft Graph Security Alerts API. |
| 24 | + |
| 25 | + |
| 26 | +| CEF Field (MDA SIEM) | Description | Defender XDR Streaming API (CloudAppEvents/AlertEvidence/AlertInfo) | Graph Security Alerts API (v2) | |
| 27 | +|---------------------------------------|-------------------------------------------------------------|--------------------------------------------------------------------------------------------------|----------------------------------------------------------------| |
| 28 | +| `start` | Activity or alert timestamp | `Timestamp` | `firstActivityDateTime` | |
| 29 | +| `end` | Activity or alert timestamp | None | `lastActivityDateTime` | |
| 30 | +| `rt` | Activity or alert timestamp | `createdDateTime` | `createdDateTime` / `lastUpdateDateTime` / `resolvedDateTime` | |
| 31 | +| `msg` | Alert or activity description as shown in the portal in a human readable format | The closest structured fields that contribute to a similar description: `actorDisplayName`, `ObjectName`, `ActionType`, `ActivityType` | `description` | |
| 32 | +| `suser` | Activity or alert subject user | `AccountObjectId`, `AccountId`, `AccountDisplayName` | See `userEvidence` resource type | |
| 33 | +| `destinationServiceName` | Activity or alert from the originating app (for example, SharePoint, Box) | `CloudAppEvents > Application` | See `cloudApplicationEvidence` resource type | |
| 34 | +| `cs<X>Label`, `cs<X>` | Alert or activity dynamic fields (for example, target user, object) | `Entities`, `Evidence`, `additionalData`, `ActivityObjects` | Various `alertEvidence` resource types | |
| 35 | +| `EVENT_CATEGORY_*` | High-level activity category | `ActivityType` / `ActionType` | `category` | |
| 36 | +| `<name>` | Matched policy name | `Title`, `alertPolicyId` | `Title`, `alertPolicyId` | |
| 37 | +| `<ACTION>` (Activities) | Specific activity type | `ActionType` | N/A | |
| 38 | +| `externalId` (Activities) | Event ID | `ReportId` | N/A | |
| 39 | +| `requestClientApplication` (activities)| User agent of the client device in activities | `UserAgent` | N/A | |
| 40 | +| `Dvc` (activities) | Client device IP | `IPAddress` | N/A | |
| 41 | +| `externalId` (Alert) | Alert ID | `AlertId` | `id` | |
| 42 | +| `<alert type>` | Alert type (for example, ALERT_CABINET_EVENT_MATCH_AUDI) | - | - | |
| 43 | +| `Src` / `c6a1` (alerts) | Source IP | `IPAddress` | `ipEvidence` resource type | |
| 44 | + |
| 45 | + |
| 46 | +## Related content |
| 47 | + |
| 48 | +- [Generic SIEM integration](siem.md) |
| 49 | +- [Microsoft Sentinel integration (Preview)](siem-sentinel.md) |
0 commit comments