- article
microsoft guardianMicrosoft 365 AdvocateConnectors with event integration capabilities allow you to stream all events and alerts from Microsoft 365 Defender to Microsoft Sentinel and synchronize events between the two portals. Microsoft 365 Defender events include all alerts, entities, and other related information grouped together and enriched with alerts from Microsoft 365 Defender component services.Microsoft Defender Endpoint,Microsoft Defender Identity,Microsoft Defender para Office 365, IMicrosoft Defender for cloud applications, as well as alerts from other services such asMicrosoft Rights Data Loss Prevention (DLP)IAzure Active Directory Identity Protection (AADIP)。
The connector also allows streamingadvanced huntingevent ofAllCopying older Defender components to Microsoft Sentinel allows you to copy advanced indexing queries for these Defender components to Microsoft Sentinel, enrich Sentinel alerts with raw event data from Defender components to provide more information, and store logs in Log Analytics and improve retention rates.
For more information about event integration and advanced hunting event collection, seeMicrosoft 365 Defender integrates with Microsoft Sentinel。
The Microsoft 365 Defender Connector is now generally available.
grades
For information on the availability of US government cloud capabilities, see the Microsoft Sentinel table:Cloud features available for US government customers。
preconditions
You must have a valid Microsoft 365 Defender license as described inMicrosoft 365 Defender prerequisites。
Your user must be assignedglobal adminlubricantsecurity administratorThe tenant role from which you want to transmit logs.
The user must have read and write permissions to the Microsoft Sentinel workspace.
To make changes to connector settings, users must be in the same Azure Active Directory tenant that the Microsoft Sentinel workspace is associated with.
Installation solutionMicrosoft 365 Advocatezcontent centerIn Microsoft Sentinel. For more information, seeDiscover and manage Microsoft Sentinel content out of the box。
Prerequisites for Active Directory Synchronization via MDI
Your tenant must join Microsoft Defender for Identity.
An MDI sensor must be installed.
Connect to Microsoft 365 Defender
In Microsoft Sentinel, selectdata connector, chooseMicrosoft 365 AdvocateSelect from galleryOpen connector page。
DiezSettingThe section is divided into three parts:
Connect events and alertsSupports basic integration between Microsoft 365 Defender and Microsoft Sentinel to synchronize events and alerts between both platforms.
Connect entitiesEnables the integration of local Active Directory user identities with Microsoft Sentinel through Microsoft Defender for Identity.
connection eventsAllows you to collect raw, advanced hunting events from Defender components.
These are explained in more detail below. LookMicrosoft 365 Defender integrates with Microsoft Sentinelfor more information.
Connect events and alerts
To ingest and sync Microsoft 365 Defender events and all your alerts to the Microsoft Sentinel event queue:
Check the box markedDisable all Microsoft event creation rules for these products. respectableto avoid repeated incidents.
(When you connect the Microsoft 365 Defender connector, this check box will not appear.)chooseConnect events and alertsbutton.
grades
When you enable Microsoft 365 Defender connectors, all Microsoft 365 Defender component connectors (the connectors listed at the beginning of this article) automatically connect in the background. To disconnect one of the component connectors, you must first disconnect the Microsoft 365 Defender connector.
To query event data from Microsoft 365 Defender, use the following statement in the query window:
Security incident | Where Provider Name == "Microsoft 365 Defender"
Connect entities
Use Microsoft Defender for Identity to synchronize user entities from on-premises Active Directory with Microsoft Sentinel.
Confirm that you are satisfiedpreconditionsUsed to synchronize local Active Directory users with Microsoft Defender for Identity (MDI).
chooseGo to the UEBA configuration pageassociation.
insideConfiguration of the individual's behavior.page, if you have not already enabled UEBA, at the top of the page, slide the toggle button toexist。
classificationActive Directory (preview)check box and selectTo use。
connection events
If you want to collect advanced search events from Microsoft Defender for Endpoint or Microsoft Defender for Office 365, you can collect the following types of events from their corresponding advanced search tables.
In the table, select the check boxes next to the types of events you want to collect:
- defender of the final point
- Office 365 defender
- identity defender
- Cloud Application Guardian
- defender alert
Table name type of activity Device Information Information about your computer, including information about your operating system Device network information The device's network properties, including physical cards, IP and MAC addresses, and connected networks and domains. device process events Create processes and events related to them. Device Network Events Network connections and related events. device file events Creation, modification and other events related to the file system. Device Registration Event Create and modify registry keys Device login event Sign-ins and other authentication events on the device Device image load event DLL load event device events Multiple event types, including those triggered by security mechanisms such as Windows Defender Antivirus and Vulnerability Protection Device file certificate information Certificate information for the signed file obtained from the certificate verification event on the endpoint ClickMake changes。
To query an advanced lookup table in Log Analytics, enter the table name from the list above in the query window.
Check your data acquisition
The data graph on the connector page shows that it is downloading data. You will notice that it displays a row for events, alerts, and events, and that the events row is an aggregation of the event volume from all enabled tables. Once you enable the connector, you can use the KQL query below to generate more detailed charts.
Use the following KQL query to get a graph of incoming Microsoft 365 Defender events:
let's go now = now(); (time range from (14d) ago to Now-1d, step 1d | expand count = 0 | union isfuzzy=true ( SecurityIncident | where ProviderName == "Microsoft 365 Defender" | summarize Count = count() by bin_at(TimeGenerated, 1d , Now) ) | Sum by bin_at(TimeGenerated, 1d, Now) Count=max(Count) | Sort by TimeGenerate | Item value = iff(isnull(Count), 0, Count), Time = TimeGenerate, Legend = " Events" ) |Render Scheduling
Use the following KQL query to generate an event volume graph for a single table (changedevice eventstable for the table of your choice):
let Now = now();(TimeGenerate range from Aug(14d) to Now-1d Step 1d | Expand count = 0 | union isfuzzy=true (DeviceEvents | summarize Count = count() by bin_at(TimeGenerate, 1d, Now)) | Sum Count=max(Count) by bin_at(TimeGenerate, 1d, Now) | Sort by TimeGenerate | Item value = iff(isnull(Count), 0, Count), Time = TimeGenerate, Legend = "Events") | Surface render time
insidenext stepYou'll find useful workbooks, sample queries, and analysis rule templates included. You can run them in place or modify and save them.
next step
In this document, you learn how to use the Microsoft 365 Defender connector to integrate Microsoft 365 Defender events and advanced search event data from Microsoft Defender Component Services with Microsoft Sentinel. For more information about Microsoft Sentinel, see the following articles:
- Learn howKnow your data and potential threats。
- Start usingDetect threats with Microsoft Sentinel。
FAQs
How do I connect Microsoft Defender to Sentinel? ›
Add the Microsoft 365 Defender Connector
Login to the Azure Portal and navigate to Microsoft Sentinel > Pick the relevant workspace to integrate with Microsoft 365 Defender.
Enable a data connector
From the Data connectors page, select the active or custom connector you want to connect, and then select Open connector page. If you don't see the data connector you want, install the solution associated with it from the Content Hub.
- Sign in to the Microsoft 365 Defender portal.
- In the navigation pane, select Settings.
- Select Microsoft 365 Defender.
- Select Permissions and roles. ...
- Select the toggle for the workload you want to activate.
- Select Activate on the confirmation message.
Microsoft 365 Defender is ideal for organizations that rely heavily on Microsoft 365 services and want to protect their system against future threats. Microsoft Sentinel works best for organizations that need a comprehensive security solution to react effectively in response to a security breach.
Does SentinelOne work with Windows Defender? ›SentinelOne will seamlessly feed all threats and detections from Mac and Linux endpoints into the Windows Defender ATP console, enabling security teams to see and remediate threats across Windows, Mac, and Linux platforms.
How do I connect my defender to Intune? ›- Select Settings > Endpoints > Advanced features > enable Microsoft Intune connection.
- Select Endpoint security > Microsoft Defender for Endpoint > Confirm connection status: Available.
This connector allows you to stream your security alerts from Microsoft Defender for Cloud into Microsoft Sentinel, so you can view Defender data in workbooks, query it to produce alerts, and investigate and respond to incidents.
What is Microsoft Sentinel? ›What is Microsoft Sentinel, and how does it work? Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise—fast.
How does a data connector work? ›Data connectors are software components that automatically extract data, sometimes periodically, from one or more upstream data sources and land that data in another database. Data connectors are common in most business intelligence, analytics and data science applications and frameworks.
Do I need Microsoft 365 defender? ›Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection, and includes features to safeguard your organization from harmful links in real time.
How does Microsoft 365 defender work? ›
The Microsoft 365 Defender portal helps security teams investigate and respond to attacks by bringing in signals from different workloads into a set of unified experiences for: Incidents & alerts. Hunting.
What license do I need for Microsoft Defender for Office 365? ›Licensing requirements
Any of these licenses gives you access to Microsoft 365 Defender features via the Microsoft 365 Defender portal without additional cost: Microsoft 365 E5 or A5. Microsoft 365 E3 with the Microsoft 365 E5 Security add-on. Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on.
Use this command to disable Windows Security Center (WSC). It is not recommended to disable WSC. By default, the SentinelOne Windows Agent registers with WSC as anti-virus protection and Windows Defender is disabled.
Why would you use Microsoft Sentinel? ›Microsoft Sentinel aggregates data from all sources, including users, applications, servers, and devices running on premises or in any cloud, letting you reason over millions of records in a few seconds. It includes built-in connectors for easy onboarding of popular security solutions.
Is Microsoft 365 defender the same as Microsoft Defender? ›While Microsoft Defender for Office 365 and Microsoft Defender for Endpoint provide distinct functionalities, it is recommended to use both security solutions to protect vital business data from malicious emails as well as from ever-increasing cybersecurity attacks to ensure complete data integrity.
How do I onboard a device to Microsoft Defender for Endpoint? ›- In the navigation pane, choose Settings > Endpoints, and then under Device management, choose Onboarding.
- Select Windows 10 and 11, and then, in the Deployment method section, choose Local script.
- Select Download onboarding package.
To turn on Microsoft Defender Antivirus in Windows Security, go to Start > Settings > Update & Security > Windows Security > Virus & threat protection. Then, select Manage settings (or Virus & threat protection settings in early versions of Windows 10} and switch Real-time protection to On.
How do I sync Microsoft Defender for endpoint? ›- In Microsoft 365 Defender, from the navigation pane, select Settings.
- Select Endpoints.
- Under General, select Advanced features.
- Toggle the Microsoft Defender for Cloud Apps to On.
- Select Apply.