Skip to content

Commit ab79ef3

Browse files
authored
Update Microsoft Defender for Cloud Apps (#5896)
* Update cid-redirects.json * Update Azure Security - Microsoft Defender for Cloud Apps * Update cid-redirects.json * Update cid-redirects.json * Update cid-redirects.json * Create 20-10-14-apps.md * changed release date
1 parent a04ad1d commit ab79ef3

File tree

8 files changed

+224
-59
lines changed

8 files changed

+224
-59
lines changed

blog-service/2025-10-14-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Azure Security - Microsoft Defender for Cloud Apps (Apps)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- azure
7+
- microsoft
8+
- azure-security-microsoft-defender-for-cloud-apps
9+
hide_table_of_contents: true
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Cloud Apps. This app enhances Azure security with centralized monitoring, proactive threat detection, and rapid incident response. It also offers interactive dashboards for tracking user activity and access, enabling faster threat management and stronger protection of cloud assets. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps/).

cid-redirects.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2948,6 +2948,8 @@
29482948
"/docs/integrations/microsoft-azure/microsoft-defender-for-identity/": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity",
29492949
"/cid/1112": "/docs/integrations/saas-cloud/carbon-black-inventory/",
29502950
"/cid/1111": "/docs/integrations/microsoft-azure/azure-open-ai",
2951+
"/cid/1115": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps",
2952+
"/docs/integrations/microsoft-azure/microsoft-defender-for-cloud-apps/": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps",
29512953
"/cid/1113": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/databricks-audit-source/",
29522954
"/Cloud_SIEM_Enterprise": "/docs/cse",
29532955
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
@@ -4519,7 +4521,7 @@
45194521
"/docs/manage/manage-subscription/manage-org-settings": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings",
45204522
"/docs/integrations/amazon-aws/elastic-load-balancing": "/docs/integrations/amazon-aws/classic-load-balancer",
45214523
"/docs/integrations/microsoft-azure/microsoft-defender-for-cloud": "/docs/integrations/microsoft-azure/azure-security-defender-for-cloud",
4522-
"/docs/integrations/microsoft-azure/microsoft-defender-for-office-365": "/docs/integrations/microsoft-azure/microsoft-defender-for-cloud-apps",
4524+
"/docs/integrations/microsoft-azure/microsoft-defender-for-office-365": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps",
45234525
"/docs/integrations/azure": "/docs/integrations/microsoft-azure",
45244526
"/docs/search/copilot": "/docs/search/mobot",
45254527
"/docs/search/copilot-unstructured-logs-beta": "/docs/search/mobot-unstructured-logs-beta",
Lines changed: 198 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,198 @@
1+
---
2+
id: azure-security-microsoft-defender-for-cloud-apps
3+
title: Azure Security - Microsoft Defender for Cloud Apps
4+
sidebar_label: Azure Security - Microsoft Defender for Cloud Apps
5+
description: Learn how to collect alerts from the Azure Security - Microsoft Defender for Cloud Apps platform and send them to Sumo Logic for analysis.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps.png')} alt="Thumbnail icon" width="50"/>
11+
12+
The Azure Security – Microsoft Defender for Cloud Apps strengthens the security of cloud-based applications within Azure by offering proactive threat detection and streamlined monitoring. It centralizes data related to cloud app security, enabling security teams to efficiently investigate anomalies, detect vulnerabilities, and take prompt action to mitigate risks. This centralized approach enhances the ability to respond to potential breaches and protects cloud resources more effectively.
13+
14+
The Sumo Logic app for Azure Security - Microsoft Defender for Cloud Apps provides interactive dashboards and visual tools, the app supports incident identification, user activity tracking, and access monitoring for sensitive data. These features allow for faster response times and more agile decision-making, helping organizations improve their overall security posture. By delivering a comprehensive view of cloud app security, the app empowers you to manage threats efficiently and ensures robust protection of critical Azure-based assets.
15+
16+
## Log Types
17+
18+
The Azure Security – Microsoft Defender for Cloud Apps uses Sumo Logic’s Microsoft Graph Security source to collect [alerts](https://learn.microsoft.com/en-us/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http) from the Microsoft Graph Security source.
19+
20+
### Sample log messages
21+
22+
<details>
23+
<summary>Alert Log</summary>
24+
25+
```json
26+
{
27+
"id": "adda21de253ca551df2175818825088751ac4ed5e365dae35a1a",
28+
"providerAlertId": "72e04fdfba1758188250d1d593711dd0e7aeaf11d35782c79d8c82f485fc1ce8",
29+
"incidentId": "15",
30+
"status": "new",
31+
"severity": "medium",
32+
"classification": "benignPositive",
33+
"determination": "securityPersonnel",
34+
"serviceSource": "microsoftDefenderForCloudApps",
35+
"detectionSource": "microsoftThreatExperts",
36+
"detectorId": "AnomalousToken",
37+
"tenantId": "3adb963c-8e61-48e8-a06d-6dbb0dacea39",
38+
"title": "Anomalous Token",
39+
"description": "Anomalous token indicates that there are abnormal characteristics in the token such as token duration and authentication from unfamiliar IP address",
40+
"recommendedActions": "",
41+
"category": "InitialAccess",
42+
"assignedTo": null,
43+
"alertWebUrl": "https://gay.nguyenletriloc.pro/alerts/adda21de253ca551ef288751ac4ed5e365dae35a1a?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
44+
"incidentWebUrl": "https://gay.nguyenletriloc.pro/incidents/15?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
45+
"actorDisplayName": null,
46+
"threatDisplayName": null,
47+
"threatFamilyName": null,
48+
"mitreTechniques": [],
49+
"createdDateTime": "2025-09-18T15:07:30+0530378Z",
50+
"lastUpdateDateTime": "2025-09-18T15:07:30+0530667Z",
51+
"resolvedDateTime": null,
52+
"firstActivityDateTime": "2025-09-18T15:07:30+0530913Z",
53+
"lastActivityDateTime": "2025-09-18T15:07:30+0530913Z",
54+
"comments": [
55+
{
56+
"@odata.type": "#microsoft.graph.security.alertComment",
57+
"comment": "Not valid",
58+
"createdByDisplayName": "Mike",
59+
"createdDateTime": "2025-09-18T15:07:30+053088Z"
60+
}
61+
],
62+
"evidence": [
63+
{
64+
"@odata.type": "#microsoft.graph.security.userEvidence",
65+
"createdDateTime": "2025-09-18T15:07:30+0530333Z",
66+
"verdict": "unknown",
67+
"remediationStatus": "none",
68+
"remediationStatusDetails": null,
69+
"roles": [
70+
"compromised"
71+
],
72+
"detailedRoles": [],
73+
"tags": [],
74+
"userAccount": {
75+
"accountName": "sonali.thakker",
76+
"domainName": null,
77+
"userSid": "S-1-12-1-1758188250-1758188250-1758188250-1758188250",
78+
"azureAdUserId": "c4bedccf-e5ff-4215-a1df-468800618a6c",
79+
"userPrincipalName": "[email protected]",
80+
"displayName": null
81+
}
82+
},
83+
{
84+
"@odata.type": "#microsoft.graph.security.ipEvidence",
85+
"createdDateTime": "2025-09-18T15:07:30+0530333Z",
86+
"verdict": "malicious",
87+
"remediationStatus": "none",
88+
"remediationStatusDetails": null,
89+
"roles": [],
90+
"detailedRoles": [],
91+
"tags": [],
92+
"ipAddress": "111.90.159.147",
93+
"countryLetterCode": "US"
94+
}
95+
]
96+
}
97+
```
98+
</details>
99+
100+
### Sample queries
101+
102+
```sql title="Total Alerts"
103+
_sourceCategory=Labs/MicrosoftGraphSecurity
104+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
105+
106+
| where toLowerCase(service_source) = "microsoftdefenderforcloudapps"
107+
108+
// global filters
109+
| where if ("*" = "*", true, severity matches "*")
110+
| where if ("*" = "*", true, status matches "*")
111+
| where if ("*" = "*", true, classification matches "*")
112+
113+
// panel specific
114+
| count by alert_id
115+
| count
116+
```
117+
118+
```sql title="High Severity Alerts"
119+
_sourceCategory=Labs/MicrosoftGraphSecurity
120+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,comments,evidence_info nodrop
121+
122+
| where toLowerCase(service_source) = "microsoftdefenderforcloudapps"
123+
124+
// global filters
125+
| where if ("*" = "*", true, severity matches "*")
126+
| where if ("*" = "*", true, status matches "*")
127+
| where if ("*" = "*", true, classification matches "*")
128+
129+
// panel specific
130+
| where toLowerCase(severity) matches ("*high*")
131+
| count by alert_id
132+
| count
133+
```
134+
135+
## Collection configuration and app installation
136+
137+
:::note
138+
- Skip this step if you have already configured the [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/).
139+
- Select **Use the existing source and install the app** to install the app using the `sourceCategory` of the Microsoft Graph Security API Source configured above.
140+
:::
141+
142+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
143+
144+
<CollectionConfiguration/>
145+
146+
:::important
147+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Azure Security - Microsoft Defender for Cloud Apps is properly integrated and configured to collect and analyze your Azure Security - Microsoft Defender for Cloud Apps data.
148+
:::
149+
150+
### Create a new collector and install the app
151+
152+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
153+
154+
<AppCollectionOPtion1/>
155+
156+
### Use an existing collector and install the app
157+
158+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
159+
160+
<AppCollectionOPtion2/>
161+
162+
### Use an existing source and install the app
163+
164+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
165+
166+
<AppCollectionOPtion3/>
167+
168+
## Viewing the Azure Security - Microsoft Defender for Cloud Apps dashboards
169+
170+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
171+
172+
<ViewDashboards/>
173+
174+
### Overview
175+
176+
The **Azure Security - Microsoft Defender for Cloud Apps - Overview** dashboard provides a comprehensive view of endpoint security threats, enabling quick assessment and response through visualizations of total and high-severity alerts by status, source, and classification. It helps teams identify prevalent alert categories, monitor recent activity, and track analyst assignments.
177+
178+
With features like geo-location mapping and top user alerts, the dashboard supports regional risk assessment and detection of insider threats. By combining real-time insights with historical trends, it enhances situational awareness and strengthens incident response strategies.
179+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+-Security-Microsoft-Defender-for-Cloud-Apps/Azure+Security+-+Microsoft+Defender+for+Cloud+Apps+-+Overview.png' alt="Azure Security - Microsoft Defender for Identity Cloud Apps - Overview" />
180+
181+
### Security
182+
183+
The **Azure Security - Microsoft Defender for Cloud Apps - Security** dashboard offers a high-level view of endpoint threats, highlighting evolving risks through alert severity trends and geo-location data. It helps teams prioritize responses by revealing increases in high-risk incidents and identifying threats from specific regions.
184+
185+
Key insights include compromised user accounts, frequently attacked devices, and countries linked to malicious IPs, enabling targeted defense strategies. By combining trend analysis with threat origins and user risk data, the dashboard empowers proactive threat response and strengthens overall security posture.
186+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+-Security-Microsoft-Defender-for-Cloud-Apps/Azure+Security+-+Microsoft+Defender+for+Cloud+Apps+-+Security.png' alt="Azure Security - Microsoft Defender for Cloud Apps - Security" />
187+
188+
## Upgrade/Downgrade the Azure Security - Microsoft Defender for Cloud Apps app (Optional)
189+
190+
import AppUpdate from '../../reuse/apps/app-update.md';
191+
192+
<AppUpdate/>
193+
194+
## Uninstalling the Azure Security - Microsoft Defender for Cloud Apps app (Optional)
195+
196+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
197+
198+
<AppUninstall/>

docs/integrations/microsoft-azure/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -290,6 +290,13 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
290290
</div>
291291
<div className="box smallbox card">
292292
<div className="container">
293+
<a href="/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps"><img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-microsoft-defender-for-cloud-apps.png')} alt="thumbnail icon" width="55"/><h4>Azure Security - Microsoft Defender for Cloud Apps</h4></a>
294+
<p>Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Cloud Apps.</p>
295+
</div>
296+
</div>
297+
<div className="box smallbox card">
298+
<div className="container">
299+
<a href="/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity"><img src={useBaseUrl('img/send-data/ms-graph.svg')} alt="thumbnail icon" width="50"/><h4>Azure Security - Microsoft Defender for Identity</h4></a>
293300
<a href={useBaseUrl('docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity')}><img src={useBaseUrl('img/send-data/ms-graph.svg')} alt="thumbnail icon" width="50"/><h4>Azure Security - Microsoft Defender for Identity</h4></a>
294301
<p>Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Identity</p>
295302
</div>

docs/integrations/microsoft-azure/microsoft-defender-for-cloud-apps.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

0 commit comments

Comments
 (0)