Connect Microsoft 365 Defender to Azure Sentinel
Plan for Microsoft 365 Defender Connectors
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365
- Microsoft Cloud App Security
Each of the products have a connector that is capable of sending alerts to the Security Alerts table in Sentinel. In the Microsoft 365 Defender connector only Microsoft Defender for Endpoint data is configurable currently.
Connect alerts from Microsoft Defender for Office 365
- A potentially malicious URL click was detected
- Email messages containing malware removed after delivery
- Email messages containing phish URLs removed after delivery
- Email reported by the user as malware or phish
- Suspicious email sending patterns detected
- User restricted from sending email
Connect alerts from Microsoft Defender for Endpoint
Connect the Microsoft 365 Defender connector
- Easily copy your existing Microsoft Defender ATP advanced hunting queries into Azure Sentinel.
- Use the raw event logs to provide more insights for your alerts, hunting, and investigation, as well as correlate events with data from other data sources in Azure Sentinel.
- Store the logs with increased retention, beyond Microsoft Defender for Endpoint or Microsoft 365 Defender's default retention of 30 days. You can do so by configuring the retention of your workspace or by configuring per-table retention in Log Analytics.
Events type |
Table name |
Machine
information (including OS information) |
DeviceInfo |
Network
properties of machines |
DeviceNetworkInfo |
Process
creation and related events |
DeviceProcessEvents |
Network
connection and related events |
DeviceNetworkEvents |
File
creation, modification, and other file system events |
DeviceFileEvents |
Creation
and modification of registry entries |
DeviceRegistryEvents |
Sign-ins
and other authentication events |
DeviceLogonEvents |
DLL
loading events |
DeviceImageLoadEvents |
More
events types |
DeviceEvents |
Comments
Post a Comment