diff --git a/blog-service/2025-09-19-apps.md b/blog-service/2025-09-19-apps.md
new file mode 100644
index 0000000000..d6d5b212e2
--- /dev/null
+++ b/blog-service/2025-09-19-apps.md
@@ -0,0 +1,14 @@
+---
+title: Azure Security - Microsoft Defender for Office 365 (Apps)
+image: https://help.sumologic.com/img/reuse/rss-image.jpg
+keywords:
+ - apps
+ - azure
+ - microsoft
+ - azure-security-microsoft-defender-for-office-365
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Office 365. This app provides insights into threats and alerts across Microsoft 365, helping you prioritize incidents, respond faster, and strengthen your Office 365 security posture. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365).
\ No newline at end of file
diff --git a/cid-redirects.json b/cid-redirects.json
index 7d956fcfb6..2df77c14c7 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -2936,6 +2936,7 @@
"/cid/1105": "/docs/integrations/cloud-security-monitoring-analytics/aws-security-hub-ocsf",
"/cid/1106": "/docs/integrations/sumo-apps/opentelemetry-collector-insights",
"/cid/1107": "/docs/integrations/saas-cloud/aws-iam-users",
+ "/cid/1109": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365",
"/cid/1108": "/docs/integrations/saas-cloud/trellix-mvision-epo",
"/Cloud_SIEM_Enterprise": "/docs/cse",
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
diff --git a/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365.md b/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365.md
new file mode 100644
index 0000000000..013d15ba47
--- /dev/null
+++ b/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365.md
@@ -0,0 +1,192 @@
+---
+id: azure-security-microsoft-defender-for-office-365
+title: Azure Security - Microsoft Defender for Office 365
+description: Learn how to collect alerts from the Azure Security - Microsoft Defender for Office 365 platform and send them to Sumo Logic for analysis.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for Azure Security – Microsoft Defender for Office 365 provides visibility into threats and alerts across Microsoft 365. It includes dashboards to monitor alert activity, geographic trends, detection sources, and user-level details, enabling quick identification of phishing, malware, and suspicious sign-ins. High-severity alerts, malicious IPs, compromised accounts, and targeted devices are highlighted to support rapid response. The app helps strengthen Office 365 security posture, prioritize incidents, and detect potential compromises across users and devices.
+
+## Log types
+
+The Azure Security – Microsoft Defender for Office 365 app uses SumoLogic’s Microsoft Graph Security source to collect [alerts](https://learn.microsoft.com/en-us/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http) from the Microsoft Graph Security source.
+
+### Sample log messages
+
+Alerts
+
+```json
+{
+ "id": "adbe0c9e2dccf8f1756423691203fj4f03ebd9d327664bcda30a",
+ "providerAlertId": "6e11a0063f2acc258e17152cac17564236912037c178d92c04c17564236918be",
+ "incidentId": "20",
+ "status": "resolved",
+ "severity": "high",
+ "classification": "falsePositive",
+ "determination": "phishing",
+ "serviceSource": "microsoftDefenderForOffice365",
+ "detectionSource": "microsoftDefenderForCloud",
+ "detectorId": "UnfamiliarLocation",
+ "tenantId": "3adb963c-8e61-48e8-a06d-6dbb0dacea39",
+ "title": "Unfamiliar sign-in properties",
+ "description": "Sign-in with properties we have not seen recently for the given user",
+ "recommendedActions": "",
+ "category": "InitialAccess",
+ "assignedTo": null,
+ "alertWebUrl": "https://remote-trail.gl.at.ply.gg/alerts/adbe0c9e2dccf8f433ff4f03ebd9d327664bcda30a?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
+ "incidentWebUrl": "https://remote-trail.gl.at.ply.gg/incidents/20?tid=3adb963c-8e61-48e8-a06d-6dbb0dacea39",
+ "actorDisplayName": null,
+ "threatDisplayName": null,
+ "threatFamilyName": null,
+ "mitreTechniques": [
+ "T1078",
+ "T1078.004"
+ ],
+ "createdDateTime": "2025-08-28T16:28:11-0700725Z",
+ "lastUpdateDateTime": "2025-08-28T16:28:11-0700333Z",
+ "resolvedDateTime": "2025-08-28T16:28:11-0700725Z",
+ "firstActivityDateTime": "2025-08-28T16:28:11-0700919Z",
+ "lastActivityDateTime": "2025-08-28T16:28:11-0700919Z",
+ "comments": [
+ {
+ "@qlvcckxbgq.type": "#microsoft.graph.security.alertComment",
+ "comment": "Not valid",
+ "createdByDisplayName": "David",
+ "createdDateTime": "2025-08-28T16:28:11-070088Z"
+ }
+ ],
+ "evidence": [
+ {
+ "@qlvcckxbgq.type": "#microsoft.graph.security.userEvidence",
+ "createdDateTime": "2025-08-28T16:28:11-0700667Z",
+ "verdict": "unknown",
+ "remediationStatus": "none",
+ "remediationStatusDetails": null,
+ "roles": [
+ "compromised"
+ ],
+ "detailedRoles": [
+
+ ],
+ "tags": [
+
+ ],
+ "userAccount": {
+ "accountName": "tseapps",
+ "domainName": null,
+ "userSid": "S-1-12-1-1756423691-1756423691-589068932-1756423691",
+ "azureAdUserId": "f5e829f5-4b1f-4fcf-847a-1c234c1b3b84",
+ "userPrincipalName": "ag@qlvcckxbgq.com",
+ "displayName": AndreGurn
+ }
+ },
+ {
+ "@qlvcckxbgq.type": "#microsoft.graph.security.ipEvidence",
+ "createdDateTime": "2025-08-28T16:28:11-0700667Z",
+ "verdict": "malicious",
+ "remediationStatus": "none",
+ "remediationStatusDetails": null,
+ "roles": [
+
+ ],
+ "detailedRoles": [
+
+ ],
+ "tags": [
+
+ ],
+ "ipAddress": "185.231.233.146",
+ "countryLetterCode": "IN"
+ }
+ ]
+}
+```
+
+
+### Security
+
+The **Azure Security - Microsoft Defender for Office 365 - Security** dashboard focuses on high-severity alerts and threats associated with risky IP addresses, suspicious geographies, and compromised accounts. It provides visibility into alerts by severity over time, helping analysts detect spikes in high-priority incidents. The dashboard also highlights countries with malicious IP verdicts, top user accounts with compromised roles, and top attacked devices along with their risk posture and health status. This view enables teams to quickly pinpoint the most critical threats targeting their Office 365 environment and take immediate mitigation steps.
+
+
+
+## Upgrade/Downgrade the Azure Security - Microsoft Defender for Office 365 app (Optional)
+
+import AppUpdate from '../../reuse/apps/app-update.md';
+
+
Learn about the Sumo Logic collection process for the Azure Security - Defender for Cloud service.
+})
Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Office 365
+
diff --git a/docs/integrations/microsoft-azure/microsoft-defender-for-office-365.md b/docs/integrations/microsoft-azure/microsoft-defender-for-office-365.md
deleted file mode 100644
index ea2ba986e5..0000000000
--- a/docs/integrations/microsoft-azure/microsoft-defender-for-office-365.md
+++ /dev/null
@@ -1,57 +0,0 @@
----
-id: microsoft-defender-for-office-365
-title: Microsoft Defender for Office 365
-sidebar_label: Microsoft Defender for Office 365
-description: The Sumo Logic App for Microsoft Defender for Office 365 outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
----
-
-import useBaseUrl from '@docusaurus/useBaseUrl';
-
-
| [AWS Simple Notification Service](https://aws.amazon.com/sns/) | Automation integration: [AWS Simple Notification Service](/docs/platform-services/automation-service/app-central/integrations/aws-simple-notification-service/) |
|
| [AWS WAF](https://aws.amazon.com/waf/) | Apps:
| [Axonius](https://www.axonius.com/) | Automation integration: [Axonius](/docs/platform-services/automation-service/app-central/integrations/axonius/) |
-|
| [Azure](https://azure.microsoft.com/en-us) | Apps:
| [Azure](https://azure.microsoft.com/en-us) | Apps: