-
Notifications
You must be signed in to change notification settings - Fork 227
Azure Security - Microsoft Defender for Identity #5847
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
ankitgoelcmu
merged 13 commits into
main
from
Azure-Security---Microsoft-Defender-for-Identity
Sep 30, 2025
Merged
Changes from 4 commits
Commits
Show all changes
13 commits
Select commit
Hold shift + click to select a range
15847bd
azure-security-microsoft-defender-for-identity
amee-sumo 9f63ddc
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
amee-sumo dc71966
uploaded dashboard images
amee-sumo c43b1bd
Merge branch 'Azure-Security---Microsoft-Defender-for-Identity' of ht…
amee-sumo f546766
Update cid-redirects.json
amee-sumo 8a113c1
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
priyansh-sumo 1145fd1
Update docs/integrations/microsoft-azure/azure-security-microsoft-def…
amee-sumo 722d375
Update docs/integrations/microsoft-azure/azure-security-microsoft-def…
amee-sumo 125f7f5
redirected the path
amee-sumo 2b82d8c
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
amee-sumo 749c840
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
priyansh-sumo 20da9a6
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
ankitgoelcmu 4e66c0b
Merge branch 'main' into Azure-Security---Microsoft-Defender-for-Iden…
ankitgoelcmu File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,14 @@ | ||
| --- | ||
| title: Azure Security - Microsoft Defender for Identity (Apps) | ||
| image: https://help.sumologic.com/img/reuse/rss-image.jpg | ||
| keywords: | ||
| - apps | ||
| - azure | ||
| - microsoft | ||
| - azure-security-microsoft-defender-for-identity | ||
| hide_table_of_contents: true | ||
| --- | ||
|
|
||
| import useBaseUrl from '@docusaurus/useBaseUrl'; | ||
|
|
||
| We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Identity. This app offers you enhanced capabilities to protect endpoints and defend against advanced cyber threats. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity). |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
249 changes: 249 additions & 0 deletions
249
.../integrations/microsoft-azure/azure-security-microsoft-defender-for-identity.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,249 @@ | ||
| --- | ||
| id: azure-security-microsoft-defender-for-identity | ||
| title: Azure Security - Microsoft Defender for Identity | ||
| description: Learn how to collect alerts from the Azure Security - Microsoft Defender for Identity platform and send them to Sumo Logic for analysis. | ||
| --- | ||
|
|
||
| import useBaseUrl from '@docusaurus/useBaseUrl'; | ||
|
|
||
| <img src={useBaseUrl('img/send-data/ms-graph.svg')} alt="Thumbnail icon" width="50"/> | ||
|
|
||
| The Azure Security – Microsoft Defender for Identity app enhances endpoint protection by centralising alert data from various devices, enabling faster detection, investigation, and response to cyber threats. It uses advanced analytics and threat intelligence to identify malicious behaviour and high-risk activity. With detailed dashboards and visualisations, it helps security teams track recurring incidents, assess vulnerabilities, and reduce response time, offering a comprehensive view of your organisation’s endpoint security posture. | ||
amee-sumo marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| :::info | ||
| This app includes [built-in monitors](#azure-security---microsoft-defender-for-identity-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Microsoft Defender for Identity app](#create-monitors-for-azure-security---microsoft-defender-for-identity-app). | ||
| ::: | ||
|
|
||
| ## Log types | ||
|
|
||
| The Azure Security – Microsoft Defender for Identity app uses SumoLogic’s Microsoft Graph Security source to collect [alerts](https://learn.microsoft.com/en-us/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http) from the Microsoft Graph Security source. | ||
amee-sumo marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ### Sample log messages | ||
|
|
||
| <details> | ||
| <summary>Alert Log</summary> | ||
|
|
||
| ```json | ||
| { | ||
| "@odata.type": "#microsoft.graph.security.alert", | ||
| "id": "da637551227677560813_-961444813", | ||
| "providerAlertId": "da637551227677560813_-961444813", | ||
| "incidentId": "28282", | ||
| "status": "new", | ||
| "severity": "low", | ||
| "classification": "unknown", | ||
| "determination": "unknown", | ||
| "serviceSource": "microsoftDefenderForIdenity", | ||
| "detectionSource": "antivirus", | ||
| "detectorId": "e0da400f-affd-43ef-b1d5-afc2eb6f2756", | ||
| "tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", | ||
| "title": "Suspicious execution of hidden file", | ||
| "description": "A hidden file has been launched. This activity could indicate a compromised host. Attackers often hide files associated with malicious tools to evade file system inspection and defenses.", | ||
| "recommendedActions": "Collect artifacts and determine scope Review the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) Look for the presence of relevant artifacts on other systems.", | ||
| "category": "DefenseEvasion", | ||
| "assignedTo": null, | ||
| "alertWebUrl": "https://security.microsoft.com/alerts/da637551227677560813_-961444813?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", | ||
| "incidentWebUrl": "https://security.microsoft.com/incidents/28282?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", | ||
| "actorDisplayName": null, | ||
| "threatDisplayName": null, | ||
| "threatFamilyName": null, | ||
| "mitreTechniques": [ | ||
| "T1564.001" | ||
| ], | ||
| "createdDateTime": "2021-04-27T12:19:27.7211305Z", | ||
| "lastUpdateDateTime": "2021-05-02T14:19:01.3266667Z", | ||
| "resolvedDateTime": null, | ||
| "firstActivityDateTime": "2021-04-26T07:45:50.116Z", | ||
| "lastActivityDateTime": "2021-05-02T07:56:58.222Z", | ||
| "comments": [], | ||
| "evidence": [ | ||
| { | ||
| "@odata.type": "#microsoft.graph.security.deviceEvidence", | ||
| "createdDateTime": "2021-04-27T12:19:27.7211305Z", | ||
| "verdict": "unknown", | ||
| "remediationStatus": "none", | ||
| "remediationStatusDetails": null, | ||
| "firstSeenDateTime": "2020-09-12T07:28:32.4321753Z", | ||
| "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db", | ||
| "azureAdDeviceId": null, | ||
| "deviceDnsName": "yonif-lap3.middleeast.corp.microsoft.com", | ||
| "hostName": "yonif-lap3", | ||
| "ntDomain": null, | ||
| "dnsDomain": "middleeast.corp.microsoft.com", | ||
| "osPlatform": "Windows10", | ||
| "osBuild": 22424, | ||
| "version": "Other", | ||
| "healthStatus": "active", | ||
| "riskScore": "medium", | ||
| "rbacGroupId": 75, | ||
| "rbacGroupName": "UnassignedGroup", | ||
| "onboardingStatus": "onboarded", | ||
| "defenderAvStatus": "unknown", | ||
| "ipInterfaces": [ | ||
| "1.1.1.1" | ||
| ], | ||
| "loggedOnUsers": [], | ||
| "roles": [ | ||
| "compromised" | ||
| ], | ||
| "detailedRoles": [ | ||
| "Main device" | ||
| ], | ||
| "tags": [ | ||
| "Test Machine" | ||
| ], | ||
| "vmMetadata": { | ||
| "vmId": "ca1b0d41-5a3b-4d95-b48b-f220aed11d78", | ||
| "cloudProvider": "azure", | ||
| "resourceId": "/subscriptions/8700d3a3-3bb7-4fbe-a090-488a1ad04161/resourceGroups/WdatpApi-EUS-STG/providers/Microsoft.Compute/virtualMachines/NirLaviTests", | ||
| "subscriptionId": "8700d3a3-3bb7-4fbe-a090-488a1ad04161" | ||
| } | ||
| } | ||
| ], | ||
| "systemTags" : [ | ||
| "Defender Experts" | ||
| ] | ||
| } | ||
| ``` | ||
| </details> | ||
|
|
||
| ### Sample queries | ||
|
|
||
| ```sql title="Alerts by Status" | ||
| _sourceCategory=MicrosoftGraphSecurityIdentity | ||
| |json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop | ||
|
|
||
| | where toLowerCase(service_source) matches("microsoftdefenderforidentity") | ||
|
|
||
| // global filters | ||
| | where if ("{{severity}}" = "*", true, severity matches "{{severity}}") | ||
| | where if ("{{status}}" = "*", true, status matches "{{status}}") | ||
| | where if ("{{classification}}" = "*", true, classification matches "{{classification}}") | ||
|
|
||
| // panel specific | ||
| | count by status,alert_id | ||
| | count as frequency by status | ||
| | sort by frequency,status | ||
| ``` | ||
|
|
||
| ```sql title="Alerts by Classification" | ||
| _sourceCategory=MicrosoftGraphSecurityIdentity | ||
| |json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop | ||
|
|
||
| | where toLowerCase(service_source) matches("microsoftdefenderforidentity") | ||
|
|
||
| // global filters | ||
| | where if ("{{severity}}" = "*", true, severity matches "{{severity}}") | ||
| | where if ("{{status}}" = "*", true, status matches "{{status}}") | ||
| | where if ("{{classification}}" = "*", true, classification matches "{{classification}}") | ||
|
|
||
| // panel specific | ||
| | where !isBlank(classification) | ||
| | count by classification,alert_id | ||
| | count as frequency by classification | ||
| | sort by frequency | ||
| ``` | ||
|
|
||
| ```sql title="Top 10 Alert Categories" | ||
| _sourceCategory=MicrosoftGraphSecurityIdentity | ||
| |json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop | ||
|
|
||
| | where toLowerCase(service_source) matches("microsoftdefenderforidentity") | ||
|
|
||
| // global filters | ||
| | where if ("{{severity}}" = "*", true, severity matches "{{severity}}") | ||
| | where if ("{{status}}" = "*", true, status matches "{{status}}") | ||
| | where if ("{{classification}}" = "*", true, classification matches "{{classification}}") | ||
|
|
||
| // panel specific | ||
| | where !isBlank(category) | ||
| | count by category,alert_id | ||
| | count as frequency by category | ||
| | sort by frequency | ||
| | limit 10 | ||
| ``` | ||
|
|
||
| ## Collection configuration and app installation | ||
|
|
||
| :::note | ||
| - Skip this step if you have already configured the [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/). | ||
| - Select **Use the existing source and install the app** to install the app using the `sourceCategory` of the Microsoft Graph Security API Source configured above. | ||
| ::: | ||
|
|
||
| import CollectionConfiguration from '../../reuse/apps/collection-configuration.md'; | ||
|
|
||
| <CollectionConfiguration/> | ||
|
|
||
| :::important | ||
| Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Azure Security - Microsoft Defender for Identity app is properly integrated and configured to collect and analyze your Azure Security - Microsoft Defender for Identity data. | ||
| ::: | ||
|
|
||
| ### Create a new collector and install the app | ||
|
|
||
| import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md'; | ||
|
|
||
| <AppCollectionOPtion1/> | ||
|
|
||
| ### Use an existing collector and install the app | ||
|
|
||
| import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md'; | ||
|
|
||
| <AppCollectionOPtion2/> | ||
|
|
||
| ### Use an existing source and install the app | ||
|
|
||
| import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md'; | ||
|
|
||
| <AppCollectionOPtion3/> | ||
|
|
||
| ## Viewing the Azure Security - Microsoft Defender for Identity dashboards | ||
|
|
||
| import ViewDashboards from '../../reuse/apps/view-dashboards.md'; | ||
|
|
||
| <ViewDashboards/> | ||
|
|
||
| ### Overview | ||
|
|
||
| The **Azure Security - Microsoft Defender for Identity - Overview** dashboard provides a comprehensive view of security threats detected across endpoints, enabling analysts to quickly assess, prioritise, and respond to potential incidents. Through an extensive set of visualisations, it presents key metrics such as total alerts, high-severity alerts, and their breakdown by status, classification, determination, service source, and detection source. | ||
|
|
||
| Security teams can easily identify dominant alert categories, monitor the most recent alerts for immediate action, and track analyst assignments to ensure accountability. The dashboard also highlights top users associated with alerts, helping detect insider threats or compromised accounts that may require deeper investigation. | ||
|
|
||
| Geo-location mapping adds another layer of insight by showing the origin of alerts, supporting region-specific risk assessments. By combining historical trends with real-time visibility, the dashboard enables security teams to focus on high-impact threats and improve response times. | ||
| <br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Identity/Azure-Security-Microsoft-Defender-for-Identity-Overview.png' alt="Azure Security - Microsoft Defender for Identity - Overview" /> | ||
|
|
||
| ### Security | ||
|
|
||
| The **Azure Security - Microsoft Defender for Identity - Security** dashboard offers a strategic, high-level view of the organisation’s endpoint threat landscape, enabling security teams to pinpoint risk concentrations and monitor how threats evolve over time. Interactive trend panels display shifts in alert severity, helping teams quickly identify surges in high-risk incidents and prioritise their response accordingly. | ||
|
|
||
| Geo-location insights spotlight alerts originating from high-risk regions, supporting threat assessments tied to specific geopolitical contexts. The dashboard also provides critical visibility into top user accounts with compromised or privileged roles—potential indicators of targeted attacks or insider threats. | ||
|
|
||
| Additionally, it ranks the most frequently attacked devices and highlights countries linked to malicious or suspicious IP activity, offering clear insight into the most vulnerable assets and regions. This intelligence allows for more focused defences and faster, more effective threat mitigation. | ||
|
|
||
| By integrating trend analysis, threat origin mapping, and user risk profiling, the Security dashboard empowers analysts to detect emerging patterns, respond proactively, and strengthen the organisation’s resilience against sophisticated endpoint threats. | ||
| <br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Identity/Azure-Security-Microsoft-Defender-for-Identity-Security.png' alt="Azure Security - Microsoft Defender for Identity - Security" /> | ||
|
|
||
| ## Create monitors for Azure Security - Microsoft Defender for Identity app | ||
|
|
||
| import CreateMonitors from '../../reuse/apps/create-monitors.md'; | ||
|
|
||
| <CreateMonitors/> | ||
|
|
||
| ### Azure Security - Microsoft Defender for Identity alerts | ||
|
|
||
| | Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | | ||
| |:--|:--|:--|:--| | ||
| | `Alerts Detected from Embargoed Locations` | This alert is triggered when activity is detected from a location flagged as high-risk, enabling you to monitor access attempts from unusual or restricted geographic regions. It enhances your ability to spot suspicious behaviour and potential threats originating from locations outside your organisation’s typical operating areas. | Critical | Count > 0 | | ||
| | `High Severity Alerts` | This alert is triggered when a high-severity threat is detected, allowing you to promptly monitor and respond to potentially harmful events that may compromise endpoint security. It ensures critical incidents are prioritised for swift investigation and mitigation. | Critical | Count > 0| | ||
| | `Embargoed Device` | This alert is triggered when a single device generates multiple alerts, indicating potentially malicious behaviour. It helps you identify high-risk devices, monitor suspicious activity more effectively, and take swift action to prevent further compromise. | Critical | Count > 5 | | ||
|
|
||
| ## Upgrade/Downgrade the Azure Security - Microsoft Defender for Identity app (Optional) | ||
|
|
||
| import AppUpdate from '../../reuse/apps/app-update.md'; | ||
|
|
||
| <AppUpdate/> | ||
|
|
||
| ## Uninstalling the Azure Security - Microsoft Defender for Identity app (Optional) | ||
|
|
||
| import AppUninstall from '../../reuse/apps/app-uninstall.md'; | ||
|
|
||
| <AppUninstall/> | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
56 changes: 0 additions & 56 deletions
56
docs/integrations/microsoft-azure/microsoft-defender-for-identity.md
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.