You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/mto-advanced-hunting.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,13 +44,21 @@ You can run any query that you already have access to in the multi-tenant manage
44
44
45
45
:::image type="content" source="media/mto-advanced-hunting/mto-cross-tenants-query-tenant-id.png" alt-text="Screenshot of the Microsoft Defender XDR ross tenants advanced hunting query scope column" lightbox="media/mto-advanced-hunting/mto-cross-tenants-query-tenant-id.png":::
46
46
47
-
The query results contain a column named **TenantId**. The values in this column show the workspace ID. We recommend that you use your query to rename the column in your results from **TenantId** to **WorkspaceId** to make it simpler to read. For example: <!--does this happen even if you don't have mult workspaces? also - is this actually true? also - what's w the query for the tenant name up at the top?-->
47
+
The query results contain a column named **TenantId**. If you're using multiple workspaces, the values in this column show the workspace ID instead of the tenant ID. In such cases, we recommend that you use your query to rename the column in your results from **TenantId** to **WorkspaceId** to make it simpler to read. For example:
48
48
49
49
```kusto
50
50
DeviceEvents
51
51
| take 10
52
52
| project TenantId = WorkspaceID
53
53
54
+
Or, to query multiple workspaces in the same tenant, use a query similar to the following:
55
+
56
+
```kusto
57
+
Usage
58
+
| union workspace("WorkpaceA").Usage
59
+
| take 10
60
+
```
61
+
54
62
To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
Copy file name to clipboardExpand all lines: unified-secops-platform/mto-incidents-alerts.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,6 @@ To manage alerts across multiple tenants and workspaces:
85
85
86
86
:::image type="content" source="media/mto-incidents-alerts/mto-manage-alerts.png" alt-text="Screenshot that highlights the manage alerts option for selected alerts in Microsoft Defender multitenant management." lightbox="media/mto-incidents-alerts/mto-manage-alerts.png":::
87
87
88
-
<!--there's also move alerts here? what does that do? need perms-->
89
88
Select any specific alert to view the alert fly-out, where you can assign alerts, set the alert status, and classify the alerts for multiple tenants and workspaces.
90
89
91
90
For more information, see [Manage alerts](/defender-endpoint/manage-alerts).
Copy file name to clipboardExpand all lines: unified-secops-platform/mto-requirements.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,12 @@ The following table lists the basic requirements you need to use multitenant man
39
39
|:---|:---|
40
40
| Microsoft Defender XDR prerequisites | Verify you meet the [Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
41
41
| Microsoft Defender XDR for US Government customers | Check if you have the following applicable [licensing requirements](/defender-xdr/usgov#licensing-requirements)|
42
-
| Multitenant access | To view and manage the data you have access to in multitenant management, you need to ensure you have the necessary access. For each tenant you want to view and manage, you need to have either: <br/> <br/> - [Granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction)<br/> - [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b)<br/> <br/> To learn more about how to synchronize multiple B2B users across tenants, see [Configure cross-tenant synchronization](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).|
42
+
| Multitenant access | To view and manage the data you have access to in multitenant management, you need to ensure you have the necessary access. You must have Azure Lighthouse to gain access to Microsoft Sentinel in other tenant's workspaces. <br><br>Then, for each tenant you want to view and manage, you need to have either: <br/> <br/> - [Granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction), supported only for Defender data<br/> - [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b), supported for both Defender and Microsoft Sentinel data<br/> <br/> To learn more about how to synchronize multiple B2B users across tenants, see [Configure cross-tenant synchronization](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).|
43
43
| Permissions | Users must be assigned the correct roles and permissions at the individual tenant level, in order to view and manage the associated data in multitenant management. To learn more, see: <br/><br/> - [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](/defender-xdr/m365d-permissions) <br/> - [Custom roles in role-based access control for Microsoft Defender XDR](/defender-xdr/custom-roles)<br/><br/> To learn how to grant permissions for multiple users at scale, see [What is entitlement management](/azure/active-directory/governance/entitlement-management-overview).|
44
44
| Security information and event management (SIEM) data (Optional) |To include SIEM data with the extended detection and response (XDR) data, one or more tenants must include a Microsoft Sentinel workspace onboarded to the Microsoft unified security operations platform. For more information, see [Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md).<br/><br/>The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579).<br/><br/> Access to Microsoft Sentinel data is available through [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b). Microsoft Sentinel doesn't support [granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction) at this time. |
45
+
|Multi-workspace access (Optional) | To view data from
46
+
47
+
Azure Lighthouse is required to gain access to Microsoft Sentinel in other tenants’ workspaces.
45
48
46
49
We recommend that you set up [multifactor authentication trust](/azure/active-directory/external-identities/authentication-conditional-access) for each tenant to avoid missing data in Microsoft Defender multitenant management.
47
50
@@ -65,7 +68,7 @@ In order to view and manage the data you have access to in Microsoft Defender mu
65
68
66
69
### Verify your tenant access with GDAP
67
70
68
-
This procedure is not supported for unified SecOps platform customers. <!--where else should this go then?-->
71
+
GDAP is not supported for Microsoft Sentinel data, and provides access to Defender data only.
69
72
70
73
1. Go to the [Microsoft Partner Center](https://partner.microsoft.com/commerce/granularadminaccess/list).
71
74
2. Under **Customers** you can find the list of organizations you have guest access to.
Copy file name to clipboardExpand all lines: unified-secops-platform/whats-new.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,15 +22,20 @@ This article lists recent features added into Microsoft's unified SecOps platfor
22
22
23
23
## March 2025
24
24
25
-
-[Multi workspace support in multi-tenant management (preview)](#multi-workspace-support-in-multi-tenant-management-preview)
26
25
-[Multi workspace support for Microsoft Sentinel (preview)](#multi-workspace-support-for-microsoft-sentinel-preview)
27
26
28
-
### Multi workspace support in multi-tenant management (preview)
27
+
### Multi workspace support for Microsoft Sentinel (preview)
28
+
29
+
Microsoft Sentinel now supports multiple workspaces in the Defender portal, using one primary workspace per tenant and multiple secondary workspaces.
30
+
31
+
A primary workspace's alerts are correlated with Defender XDR data, which results in incidents that include alerts from Microsoft Sentinel's primary workspace and Defender XDR. All other onboarded workspaces are considered secondary workspaces. Incidents are created based on the workspace’s data and won't include Defender XDR data.
29
32
30
-
For preview, multiple workspaces are now supported for multi-tenant management in the Defender portal. This feature allows you to view incidents and alerts, and to hunt for data in Advanced hunting, across multiple workspaces and multiple tenants.
33
+
If you're working with multiple tenants and multiple workspaces per tenant, you can also use Microsoft Defender multitenant management to view incidents and alerts, and to hunt for data in Advanced hunting, across both multiple workspaces and tenants.
31
34
32
35
For more information, see:
33
36
37
+
-[Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579)
38
+
-[Connect Microsoft Sentinel to the Microsoft Defender portal](microsoft-sentinel-onboard.md)
0 commit comments