Skip to content

Commit 540f79c

Browse files
amee-sumojpipkin1
andauthored
Azure Security - Microsoft Defender for Office 365 (apps) (#5800)
* Update cid-redirects.json * Create azure-security-microsoft-defender-for-office-365.md * Update azure-security-microsoft-defender-for-office-365.md * final updates * Update docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * changed release date --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]>
1 parent f8d218c commit 540f79c

File tree

7 files changed

+215
-59
lines changed

7 files changed

+215
-59
lines changed

blog-service/2025-09-19-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Azure Security - Microsoft Defender for Office 365 (Apps)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- azure
7+
- microsoft
8+
- azure-security-microsoft-defender-for-office-365
9+
hide_table_of_contents: true
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Office 365. This app provides insights into threats and alerts across Microsoft 365, helping you prioritize incidents, respond faster, and strengthen your Office 365 security posture. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2936,6 +2936,7 @@
29362936
"/cid/1105": "/docs/integrations/cloud-security-monitoring-analytics/aws-security-hub-ocsf",
29372937
"/cid/1106": "/docs/integrations/sumo-apps/opentelemetry-collector-insights",
29382938
"/cid/1107": "/docs/integrations/saas-cloud/aws-iam-users",
2939+
"/cid/1109": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365",
29392940
"/cid/1108": "/docs/integrations/saas-cloud/trellix-mvision-epo",
29402941
"/Cloud_SIEM_Enterprise": "/docs/cse",
29412942
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
Lines changed: 192 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,192 @@
1+
---
2+
id: azure-security-microsoft-defender-for-office-365
3+
title: Azure Security - Microsoft Defender for Office 365
4+
description: Learn how to collect alerts from the Azure Security - Microsoft Defender for Office 365 platform and send them to Sumo Logic for analysis.
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-office-365.png')} alt="Thumbnail icon" width="50"/>
10+
11+
The Sumo Logic app for Azure Security – Microsoft Defender for Office 365 provides visibility into threats and alerts across Microsoft 365. It includes dashboards to monitor alert activity, geographic trends, detection sources, and user-level details, enabling quick identification of phishing, malware, and suspicious sign-ins. High-severity alerts, malicious IPs, compromised accounts, and targeted devices are highlighted to support rapid response. The app helps strengthen Office 365 security posture, prioritize incidents, and detect potential compromises across users and devices.
12+
13+
## Log types
14+
15+
The Azure Security – Microsoft Defender for Office 365 app uses SumoLogic’s Microsoft Graph Security source to collect [alerts](https://learn.microsoft.com/en-us/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http) from the Microsoft Graph Security source.
16+
17+
### Sample log messages
18+
19+
<details>
20+
<summary>Alerts</summary>
21+
22+
```json
23+
{
24+
"id": "adbe0c9e2dccf8f1756423691203fj4f03ebd9d327664bcda30a",
25+
"providerAlertId": "6e11a0063f2acc258e17152cac17564236912037c178d92c04c17564236918be",
26+
"incidentId": "20",
27+
"status": "resolved",
28+
"severity": "high",
29+
"classification": "falsePositive",
30+
"determination": "phishing",
31+
"serviceSource": "microsoftDefenderForOffice365",
32+
"detectionSource": "microsoftDefenderForCloud",
33+
"detectorId": "UnfamiliarLocation",
34+
"tenantId": "3adb963c-8e61-48e8-a06d-6dbb0dacea39",
35+
"title": "Unfamiliar sign-in properties",
36+
"description": "Sign-in with properties we have not seen recently for the given user",
37+
"recommendedActions": "",
38+
"category": "InitialAccess",
39+
"assignedTo": null,
40+
"alertWebUrl": "https://remote-trail.gl.at.ply.gg/alerts/adbe0c9e2dccf8f433ff4f03ebd9d327664bcda30a?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
41+
"incidentWebUrl": "https://remote-trail.gl.at.ply.gg/incidents/20?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
42+
"actorDisplayName": null,
43+
"threatDisplayName": null,
44+
"threatFamilyName": null,
45+
"mitreTechniques": [
46+
"T1078",
47+
"T1078.004"
48+
],
49+
"createdDateTime": "2025-08-28T16:28:11-0700725Z",
50+
"lastUpdateDateTime": "2025-08-28T16:28:11-0700333Z",
51+
"resolvedDateTime": "2025-08-28T16:28:11-0700725Z",
52+
"firstActivityDateTime": "2025-08-28T16:28:11-0700919Z",
53+
"lastActivityDateTime": "2025-08-28T16:28:11-0700919Z",
54+
"comments": [
55+
{
56+
"@qlvcckxbgq.type": "#microsoft.graph.security.alertComment",
57+
"comment": "Not valid",
58+
"createdByDisplayName": "David",
59+
"createdDateTime": "2025-08-28T16:28:11-070088Z"
60+
}
61+
],
62+
"evidence": [
63+
{
64+
"@qlvcckxbgq.type": "#microsoft.graph.security.userEvidence",
65+
"createdDateTime": "2025-08-28T16:28:11-0700667Z",
66+
"verdict": "unknown",
67+
"remediationStatus": "none",
68+
"remediationStatusDetails": null,
69+
"roles": [
70+
"compromised"
71+
],
72+
"detailedRoles": [
73+
74+
],
75+
"tags": [
76+
77+
],
78+
"userAccount": {
79+
"accountName": "tseapps",
80+
"domainName": null,
81+
"userSid": "S-1-12-1-1756423691-1756423691-589068932-1756423691",
82+
"azureAdUserId": "f5e829f5-4b1f-4fcf-847a-1c234c1b3b84",
83+
"userPrincipalName": "[email protected]",
84+
"displayName": AndreGurn
85+
}
86+
},
87+
{
88+
"@qlvcckxbgq.type": "#microsoft.graph.security.ipEvidence",
89+
"createdDateTime": "2025-08-28T16:28:11-0700667Z",
90+
"verdict": "malicious",
91+
"remediationStatus": "none",
92+
"remediationStatusDetails": null,
93+
"roles": [
94+
95+
],
96+
"detailedRoles": [
97+
98+
],
99+
"tags": [
100+
101+
],
102+
"ipAddress": "185.231.233.146",
103+
"countryLetterCode": "IN"
104+
}
105+
]
106+
}
107+
```
108+
</details>
109+
110+
### Sample queries
111+
112+
```sql title="Recent Alerts"
113+
_sourceCategory=Labs/AzureSecurityMicrosoftDefenderFor365
114+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
115+
116+
| where toLowerCase(service_source) = "microsoftdefenderforoffice365"
117+
118+
// panel specific
119+
| if(isNull(category),"-",category) as category
120+
| if(isNull(classification),"-",classification) as classification
121+
| if(isNull(determination),"-",determination) as determination
122+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
123+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
124+
| tourl (alert_url,alert_id) as alert_id
125+
| fields time,alert_id,title,description,status,severity,category,classification,determination
126+
| fields -_messageTime
127+
| sort by time
128+
| limit 100
129+
```
130+
131+
## Collection configuration and app installation
132+
133+
:::note
134+
- Skip this step if you have already configured the Microsoft Graph Security API Source.
135+
- Select **Use the existing source and install the app** to install the app using the `sourceCategory` of the Microsoft Graph Security API Source configured above.
136+
:::
137+
138+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
139+
140+
<CollectionConfiguration/>
141+
142+
:::important
143+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Azure Security - Microsoft Defender for Office 365 app is properly integrated and configured to collect and analyze your Azure Security - Microsoft Defender for Office 365 data.
144+
:::
145+
146+
### Create a new collector and install the app
147+
148+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
149+
150+
<AppCollectionOPtion1/>
151+
152+
### Use an existing collector and install the app
153+
154+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
155+
156+
<AppCollectionOPtion2/>
157+
158+
### Use an existing source and install the app
159+
160+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
161+
162+
<AppCollectionOPtion3/>
163+
164+
## Viewing the Azure Security - Microsoft Defender for Office 365 dashboards
165+
166+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
167+
168+
<ViewDashboards/>
169+
170+
### Overview
171+
172+
The **Azure Security - Microsoft Defender for Office 365 - Overview** dashboard offers a high-level summary of security alerts detected by Microsoft Defender for Office 365. It showcases key metrics such as total alert volume, geographic distribution, and breakdowns by status, detection source, determination, and classification. Security analysts can quickly spot top alert categories like phishing and malware, identify affected users, and monitor the most active analysts involved in investigations. The dashboard also features a top action plan and recent alerts panel to help prioritize response efforts and investigate high-risk activities such as anomalous sign-ins, suspicious tokens, and potential account compromises.
173+
174+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+-+Microsoft+Defender+for+Office+365/Azure+Security+-+Microsoft+Defender+for+Office+365+-+Overview.png' alt="Azure Security - Microsoft Defender for Office 365 - Overview" />
175+
176+
### Security
177+
178+
The **Azure Security - Microsoft Defender for Office 365 - Security** dashboard focuses on high-severity alerts and threats associated with risky IP addresses, suspicious geographies, and compromised accounts. It provides visibility into alerts by severity over time, helping analysts detect spikes in high-priority incidents. The dashboard also highlights countries with malicious IP verdicts, top user accounts with compromised roles, and top attacked devices along with their risk posture and health status. This view enables teams to quickly pinpoint the most critical threats targeting their Office 365 environment and take immediate mitigation steps.
179+
180+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+-+Microsoft+Defender+for+Office+365/Azure+Security+-+Microsoft+Defender+for+Office+365+-+Security.png' alt="Azure Security - Microsoft Defender for Office 365 - Security" />
181+
182+
## Upgrade/Downgrade the Azure Security - Microsoft Defender for Office 365 app (Optional)
183+
184+
import AppUpdate from '../../reuse/apps/app-update.md';
185+
186+
<AppUpdate/>
187+
188+
## Uninstalling the Azure Security - Microsoft Defender for Office 365 app (Optional)
189+
190+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
191+
192+
<AppUninstall/>

docs/integrations/microsoft-azure/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -281,6 +281,12 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
281281
<p>Learn about the Sumo Logic collection process for the Azure Security - Defender for Cloud service.</p>
282282
</div>
283283
</div>
284+
<div className="box smallbox card">
285+
<div className="container">
286+
<a href="/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365"><img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-office-365.png')} alt="thumbnail icon" width="50"/><h4>Azure Security - Microsoft Defender for Office 365</h4></a>
287+
<p>Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Office 365</p>
288+
</div>
289+
</div>
284290
<div className="box smallbox card">
285291
<div className="container">
286292
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-service-bus.png')} alt="Thumbnail icon" width="60"/>

docs/integrations/microsoft-azure/microsoft-defender-for-office-365.md

Lines changed: 0 additions & 57 deletions
This file was deleted.

0 commit comments

Comments
 (0)