Skip to content

Commit 44af02f

Browse files
JV0812kimsauce
andauthored
Microsoft Defender for Endpoint app doc (#5587)
* Microsoft Defender for Endpoint app doc * note added * minor fix * Update blog-service/2025-07-16-apps.md Co-authored-by: Kim (Sumo Logic) <[email protected]> --------- Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent 7d6c22d commit 44af02f

File tree

5 files changed

+215
-30
lines changed

5 files changed

+215
-30
lines changed

blog-service/2025-07-16-apps.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: Microsoft Defender for Endpoint (Apps)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- palo-alto-networks-11
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
13+
We're excited to introduce the new Microsoft Defender for Endpoint app for Sumo Logic. This app enables you to gain real-time visibility into security alert data across your software projects and dependencies. This app also helps security and DevOps teams track risk exposure, prioritize remediation, and maintain a strong security posture. [Learn more](/docs/integrations/microsoft-azure/microsoft-defender-for-endpoint).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2900,6 +2900,7 @@
29002900
"/cid/21035": "/docs/integrations/google/cloud-traffic-director",
29012901
"/cid/21036": "/docs/integrations/google/cloud-vertex-ai",
29022902
"/cid/21037": "/docs/integrations/google/cloud-vpn",
2903+
"/cid/21333": "/docs/integrations/microsoft-azure/microsoft-defender-for-endpoint",
29032904
"/cid/21039": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source",
29042905
"/cid/21041": "/docs/integrations/google/cloud-security-command-center",
29052906
"/cid/21097": "/docs/integrations/saas-cloud/confluent-cloud",

docs/integrations/microsoft-azure/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -337,6 +337,13 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
337337
<p>A guide to the Sumo Logic app for Azure Kubernetes Service Control Plane.</p>
338338
</div>
339339
</div>
340+
<div className="box smallbox card">
341+
<div className="container">
342+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-identity.png')} alt="Thumbnail icon" width="40"/>
343+
<h4><a href="/docs/integrations/microsoft-azure/microsoft-defender-for-endpoint">Microsoft Defender for Endpoint</a></h4>
344+
<p>A guide to the Sumo Logic app for Microsoft Defender for Endpoint.</p>
345+
</div>
346+
</div>
340347
<div className="box smallbox card">
341348
<div className="container">
342349
<img src={useBaseUrl('img/integrations/microsoft-azure/network-watcher.png')} alt="Thumbnail icon" width="50"/>

docs/integrations/microsoft-azure/microsoft-defender-for-endpoint.md

Lines changed: 193 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -9,44 +9,208 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-identity.png')} alt="Thumbnail icon" width="60"/>
1111

12-
Microsoft Defender for Endpoint is an enterprise-grade endpoint security platform designed to help you prevent, detect, investigate, and respond to advanced cyber threats on devices (endpoints) like laptops, desktops, mobile phones, and servers.
12+
The **Azure Security – Microsoft Defender for Endpoint** app empowers organizations to strengthen endpoint protection and proactively defend against advanced cyber threats. By centralizing alert data from devices like desktops, laptops, mobile devices, and servers, the app offers actionable insights that help security teams detect, investigate, and respond to suspicious activity faster and more effectively.
1313

14-
This document outlines the steps required to collect and analyse the [Microsoft Defender for Endpoint](https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-endpoint) alerts in the Sumo Logic platform.
14+
Leveraging advanced analytics and contextual threat intelligence, the app highlights patterns of malicious behavior, suspicious processes, and high-severity alerts. This visibility equips security teams to pinpoint vulnerabilities, monitor risk exposure, and understand the evolving threat landscape impacting endpoints. With its comprehensive pre-configured dashboards and visualizations, the app helps identify users, devices, or locations associated with recurring security incidents. This capability supports faster investigation and more targeted mitigation, reducing dwell time and potential damage.
1515

16-
## Set up collection
16+
By providing a holistic view of your organization’s endpoint security posture, the **Azure Security – Microsoft Defender for Endpoint** app ensures security teams remain agile, informed, and ready to respond to emerging threats — strengthening defenses and safeguarding critical assets.
1717

18-
:::note
19-
Skip this step if you have already configured the Microsoft Graph Security API Source.
20-
:::
18+
## Log types
19+
20+
This app uses SumoLogic’s Microsoft Graph Security source to collect [Alerts](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) from the Microsoft Defender for Endpoint to the Sumo Logic platform.
2121

22-
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Defender for Endpoint to the Sumo Logic platform.
22+
### Sample log message
2323

24-
## Search alerts
24+
<details>
2525

26-
Use the following query to retrieve alerts generated by the Microsoft Defender for Endpoint.
26+
<summary>Alerts log message</summary>
2727

28-
```sql
29-
_sourcecategory=Labs/MicrosoftGraphSecurity
30-
| json field=_raw "serviceSource" as service_source
31-
| where service_source = "microsoftDefenderForEndpoint"
28+
```json
29+
{
30+
"id": "adf3a5c9bc83f5cfd175152516139fd01df4845a64d36f0d4481",
31+
"providerAlertId": "5bd1db63c29f8f4f17e6be7f8b4b1751525161523a3adee797b414fbaf6b1af1",
32+
"incidentId": "16",
33+
"status": "new",
34+
"severity": "high",
35+
"classification": "truePositive",
36+
"determination": "compromisedUser",
37+
"serviceSource": "microsoftDefenderForEndpoint",
38+
"detectionSource": "microsoftDataLossPrevention",
39+
"detectorId": "ImpossibleTravel",
40+
"tenantId": "3adb963c-8e61-48e8-a06d-6dbb0dacea39",
41+
"title": "Atypical travel",
42+
"description": "Sign-in from an atypical location based on the user\u2019s recent sign-ins",
43+
"recommendedActions": "",
44+
"category": "InitialAccess",
45+
"assignedTo": null,
46+
"alertWebUrl": "https://stravinmonsal.cajueiro.buzz/alerts/adf3a5c9bc83f5cfd39fd08df4845a64d36f0d4481?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
47+
"incidentWebUrl": "https://stravinmonsal.cajueiro.buzz/incidents/16?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
48+
"actorDisplayName": null,
49+
"threatDisplayName": null,
50+
"threatFamilyName": null,
51+
"mitreTechniques": ["T1078", "T1078.004"],
52+
"createdDateTime": "2025-07-03T12:16:01+053088Z",
53+
"lastUpdateDateTime": "2025-07-03T12:16:01+0530333Z",
54+
"resolvedDateTime": null,
55+
"firstActivityDateTime": "2025-07-03T12:16:01+0530577Z",
56+
"lastActivityDateTime": "2025-07-03T12:16:01+0530577Z",
57+
"comments": [
58+
{
59+
"@odata.type": "#microsoft.graph.security.alertComment",
60+
"comment": "Not valid",
61+
"createdByDisplayName": "John",
62+
"createdDateTime": "2025-07-03T12:16:01+053088Z"
63+
}
64+
],
65+
"evidence": [
66+
{
67+
"@odata.type": "#microsoft.graph.security.userEvidence",
68+
"createdDateTime": "2025-07-03T12:16:01.523Z",
69+
"verdict": "unknown",
70+
"remediationStatus": "none",
71+
"remediationStatusDetails": null,
72+
"roles": ["compromised"],
73+
"detailedRoles": [],
74+
"tags": [],
75+
"userAccount": {
76+
"accountName": "tseapps",
77+
"domainName": null,
78+
"userSid": "S-1-12-1-1751525161-1751525161-589068932-1751525161",
79+
"azureAdUserId": "f5e829f5-4b1f-4fcf-847a-1c234c1b3b82",
80+
"userPrincipalName": "[email protected]",
81+
"displayName": null
82+
}
83+
},
84+
{
85+
"@odata.type": "#microsoft.graph.security.ipEvidence",
86+
"createdDateTime": "2025-07-03T12:16:01.523Z",
87+
"verdict": "suspicious",
88+
"remediationStatus": "none",
89+
"remediationStatusDetails": null,
90+
"roles": [],
91+
"detailedRoles": [],
92+
"tags": [],
93+
"ipAddress": "38.180.52.2",
94+
"countryLetterCode": "IN"
95+
},
96+
{
97+
"@odata.type": "#microsoft.graph.security.ipEvidence",
98+
"createdDateTime": "2025-07-03T12:16:01.523Z",
99+
"verdict": "malicious",
100+
"remediationStatus": "none",
101+
"remediationStatusDetails": null,
102+
"roles": [],
103+
"detailedRoles": [],
104+
"tags": [],
105+
"ipAddress": "38.180.52.2",
106+
"countryLetterCode": "US"
107+
},
108+
{
109+
"@odata.type": "#microsoft.graph.security.deviceEvidence",
110+
"createdDateTime": "2025-07-03T12:16:01.523Z",
111+
"verdict": "String",
112+
"remediationStatus": "String",
113+
"remediationStatusDetails": "String",
114+
"roles": ["String"],
115+
"tags": ["String"],
116+
"firstSeenDateTime": "2025-07-03T12:16:01+053088Z",
117+
"mdeDeviceId": "String",
118+
"azureAdDeviceId": "String",
119+
"deviceDnsName": "String",
120+
"osPlatform": "String",
121+
"osBuild": "Integer",
122+
"version": "String",
123+
"rbacGroupId": "Integer",
124+
"rbacGroupName": "String",
125+
"healthStatus": "String",
126+
"riskScore": "String",
127+
"onboardingStatus": "String",
128+
"defenderAvStatus": "String",
129+
"vmMetadata": {
130+
"@euvzrzebjk.type": "microsoft.graph.security.vmMetadata"
131+
},
132+
"loggedOnUsers": [
133+
{ "@euvzrzebjk.type": "microsoft.graph.security.loggedOnUser" }
134+
]
135+
}
136+
]
137+
}
32138
```
33139

34-
## Analyse alerts
140+
</details>
35141

36-
Use the following query to extract detailed insights from the alert data:
142+
### Sample query
37143

38-
```sql
39-
_sourceCategory=Labs/MicrosoftGraphSecurity
144+
```sql title="Total Alerts"
145+
_sourceCategory="Labs/MicrosoftGraphSecurity"
40146
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
41-
| where service_source = "microsoftDefenderForEndpoint"
42-
| where severity matches "*" and status matches "*" and classification matches "*"
43-
| if(isNull(category),"-",category) as category
44-
| if(isNull(classification),"-",classification) as classification
45-
| if(isNull(determination),"-",determination) as determination
46-
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
47-
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
48-
| tourl (alert_url,alert_id) as alert_id
49-
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
50-
| fields -_messageTime
51-
| sort by time
52-
```
147+
148+
| where toLowerCase(service_source) = "microsoftdefenderforendpoint"
149+
150+
// global filters
151+
| where if ("{{severity}}" = "*", true, severity matches "{{severity}}")
152+
| where if ("{{status}}" = "*", true, status matches "{{status}}")
153+
| where if ("{{classification}}" = "*", true, classification matches "{{classification}}")
154+
155+
// panel specific
156+
| count by alert_id
157+
| count
158+
```
159+
160+
## Collection configuration and app installation
161+
162+
:::note
163+
Skip this step if you have already configured the [Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) Source. **[Use an existing source and install the app](#use-an-existing-source-and-install-the-app)** option to install the app using the `_sourceCategory` of Microsoft Graph Security API Source.
164+
:::
165+
166+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
167+
168+
<CollectionConfiguration/>
169+
170+
### Create a new collector and install the app
171+
172+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
173+
174+
<AppCollectionOPtion1/>
175+
176+
### Use an existing collector and install the app
177+
178+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
179+
180+
<AppCollectionOPtion2/>
181+
182+
### Use an existing source and install the app
183+
184+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
185+
186+
<AppCollectionOPtion3/>
187+
188+
:::important
189+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Microsoft Graph Security API app is properly integrated and configured to collect and analyze your security alerts data.
190+
:::
191+
192+
## Viewing Microsoft Defender for Endpoint dashboards​
193+
194+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
195+
196+
<ViewDashboards/>
197+
198+
### Overview
199+
200+
The **Azure Security - Microsoft Defender for Endpoint - Overview** dashboard offers a detailed view into security threats detected across endpoints, enabling analysts to assess and act swiftly on potential incidents. With a broad set of visualizations, it displays total alerts, high-severity alerts, and their distribution by status, classification, determination, service source, and detection source.
201+
202+
Security teams can quickly identify which alert categories are most prevalent, view recent alerts for immediate awareness, and also track which analysts are actively assigned to incidents. By highlighting the top users linked to alerts, the dashboard helps uncover potential insider threats or compromised accounts that require further investigation.
203+
204+
Geo-location mapping visualizes the alert origin, supporting risk assessment tied to specific regions. Together, these insights provide a balanced blend of historical context and real-time visibility, empowering teams to prioritize high-impact threats and respond effectively.
205+
206+
Overall, this dashboard serves as an essential tool for maintaining situational awareness, tracking alert trends, and strengthening your organization’s response strategy against evolving endpoint threats.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Endpoint/Azure-Security-Microsoft-Defender-for-Endpoint-Overview.png' alt="Azure-Security-Microsoft-Defender-for-Endpoint-Overview" />
207+
208+
### Security
209+
210+
The **Azure Security - Microsoft Defender for Endpoint - Security** dashboard delivers a high-level view of your organization’s endpoint threat landscape, helping teams identify where risks concentrate and how they evolve over time. Visual trend panels illustrate changes in alert severity, revealing whether high-risk incidents are increasing and guiding prioritization of response efforts.
211+
212+
Geo-location data highlights alerts emerging from risky countries, allowing teams to assess exposure to region-specific threats. The dashboard also surfaces critical context, such as the top user accounts with compromised roles, which can signal targeted attacks on privileged accounts.
213+
214+
In addition, the dashboard ranks the most frequently attacked devices and countries linked to suspicious or malicious IP activity, offering clarity on which assets and locations are most at risk. This intelligence supports more targeted defenses and timely intervention.
215+
216+
By combining trend analysis, threat origins, and user risk insights, the Security dashboard equips analysts to recognize patterns, respond to emerging threats proactively, and bolster the organization’s overall security posture against complex endpoint attacks.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Endpoint/Azure-Security-Microsoft-Defender-fo-Endpoint-Security.png' alt="Azure-Security-Microsoft-Defender-fo-Endpoint-Security" />

0 commit comments

Comments
 (0)