Skip to content

Commit 95bba77

Browse files
Merge pull request #310023 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-01 12:00 UTC
2 parents a945d2a + dddac63 commit 95bba77

8 files changed

Lines changed: 26 additions & 42 deletions

articles/sentinel/move-to-defender.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Transition Your Microsoft Sentinel Environment to the Defender Portal
33
description: Move Microsoft Sentinel operations from the Azure portal to the Microsoft Defender portal.
4-
author: batamig
5-
ms.author: bagol
4+
author: guywi-ms
5+
ms.author: guywild
66
ms.topic: how-to #Required; leave this attribute/value as-is
7-
ms.date: 07/29/2025
7+
ms.date: 01/01/2026
88
ms.collection: usx-security
99

1010
#Customer intent: As a security operations team member, I want to understand the process involved in moving our Microsoft Sentinel experience from the Azure portal to the Defender portal so that I can benefit from unified security operations across my entire environment.
@@ -260,6 +260,9 @@ Most functionalities of User and Entity Behavior Analytics (UEBA) remain the sam
260260

261261
- After onboarding Microsoft Sentinel to the Defender portal, the `IdentityInfo` table used in the Defender portal includes unified fields from both Defender XDR and Microsoft Sentinel. Some fields that existed when used in the Azure portal are either renamed in the Defender portal, or aren't supported at all. We recommend that you check your queries for any references to these fields and update them as needed. For more information, see [IdentityInfo table](ueba-reference.md?tabs=unified-table#identityinfo-table).
262262

263+
> [!IMPORTANT]
264+
> When you transition to the Defender portal, the `IdentityInfo` table becomes a native Defender table that doesn't support table-level role-based access control (RBAC). If your organization uses table-level RBAC to restrict access to the `IdentityInfo` table in the Azure portal, this access control will no longer be available after you transition to the Defender portal.
265+
263266
### Update investigation processes to use Microsoft Defender threat intelligence
264267

265268
For Microsoft Sentinel customers moving from the Azure portal to the Defender portal, the familiar threat intelligence features are retained in the Defender portal under **Intel management**, and enhanced with other threat intelligence features available in the Defender portal. Supported features depend on the licenses you have, such as:
@@ -299,4 +302,3 @@ The Microsoft Sentinel [similar incidents](investigate-cases.md#similar-incident
299302
- [The Best of Microsoft Sentinel - now in Microsoft Defender](https://techcommunity.microsoft.com/blog/MicrosoftThreatProtectionBlog/the-best-of-microsoft-sentinel-%E2%80%94-now-in-microsoft-defender/4415822) (blog)
300303
- Watch the webinar: [Transition to the Unified SOC Platform: Deep Dive and Interactive Q&A for SOC Professionals](https://www.youtube.com/watch?v=WIM6fbJDkK4).
301304
- See frequently asked questions in the [TechCommunity blog](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/unified-security-operations-platform---technical-faq/4189136) or the [Microsoft Community Hub](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/frequently-asked-questions-about-the-unified-security-operations-platform/4212048).
302-

articles/sentinel/normalization-about-parsers.md

Lines changed: 6 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Use Advanced Security Information Model (ASIM) parsers instead of table names in
1717

1818
## Unifying parsers
1919

20-
When using ASIM in your queries, use **unifying parsers** to combine all sources, normalized to the same schema, and query them using normalized fields. The unifying parser name is `_Im_<schema>` for built-in parsers and `im<schema>` for workspace deployed parsers, where `<schema>` stands for the specific schema it serves.
20+
When using ASIM in your queries, use **unifying parsers** to combine all sources, normalized to the same schema, and query them using normalized fields. The unifying parser name is `_Im_<schema>`, where `<schema>` stands for the specific schema it serves.
2121

2222
For example, the following query uses the built-in unifying DNS parser to query DNS events using the `ResponseCodeName`, `SrcIpAddr`, and `TimeGenerated` normalized fields:
2323

@@ -35,21 +35,20 @@ _Im_Dns
3535
| summarize count() by SrcIpAddr, bin(TimeGenerated,15m)
3636
```
3737

38-
> [!NOTE]
39-
> When using the ASIM parsers in the **Logs** page, the time range selector is set to `custom`. You can still set the time range yourself. Alternatively, specify the time range using parser parameters.
40-
>
41-
4238
The following table lists the available unifying parsers:
4339

4440
| Schema | Unifying parser |
4541
| ------ | ------------------------- |
42+
| Alert Event | _Im_AlertEvent |
4643
| Audit Event | _Im_AuditEvent |
4744
| Authentication | _Im_Authentication |
45+
| DHCP Event | _Im_DhcpEvent |
4846
| Dns | _Im_Dns |
4947
| File Event | _Im_FileEvent |
5048
| Network Session | _Im_NetworkSession |
5149
| Process Event | _Im_ProcessCreate<br> _Im_ProcessTerminate |
52-
| Registry Event | _Im_Registry |
50+
| Registry Event | _Im_RegistryEvent |
51+
| User Management | _Im_UserManagement |
5352
| Web Session | _Im_WebSession |
5453

5554

@@ -59,15 +58,7 @@ Using parsers might affect your query performance, primarily from filtering the
5958

6059
When invoking the parser, always use available filtering parameters by adding one or more named parameters to ensure optimal performance of the ASIM parsers.
6160

62-
Each schema has a standard set of filtering parameters documented in the relevant schema documentation. Filtering parameters are entirely optional. The following schemas support filtering parameters:
63-
64-
- [Audit Event](normalization-schema-audit.md)
65-
- [Authentication](normalization-schema-authentication.md)
66-
- [DNS](normalization-schema-dns.md#filtering-parser-parameters)
67-
- [Network Session](normalization-schema-network.md#filtering-parser-parameters)
68-
- [Web Session](normalization-schema-web.md#filtering-parser-parameters)
69-
70-
Every schema that supports filtering parameters supports at least the `starttime` and `endtime` parameters and using them is often critical for optimizing performance.
61+
Each schema has a standard set of filtering parameters documented in the relevant schema documentation. Filtering parameters are entirely optional.
7162

7263
For an example of using filtering parsers, see [Unifying parsers](#unifying-parsers).
7364

articles/sentinel/normalization-entity-device.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: ofshezaf
88

99

1010

11-
#Customer intent: As a security analyst, I want to understand the ASIM Device Entity so that I can accurately understand user information captured in normalized events, enabling consistent and comprehensive monitoring across security platforms and improving threat detection and response efforts.
11+
#Customer intent: As a security analyst, I want to understand the ASIM Device Entity so that I can accurately understand device information captured in normalized events, enabling consistent and comprehensive monitoring across security platforms and improving threat detection and response efforts.
1212

1313
---
1414

articles/sentinel/normalization-modify-content.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,7 @@ _Im_Dns(responsecodename='NXDOMAIN')
6565
| extend timestamp = TimeGenerated, IPCustomEntity = SrcIpAddr
6666
```
6767

68-
To use workspace-deployed ASIM parsers, replace the first line with the following code:
69-
70-
```kusto
71-
imDns(responsecodename='NXDOMAIN')
72-
```
73-
74-
### Differences between built-in and workspace-deployed parsers
75-
76-
The two options in the example [above](#sample-normalization-for-analytics-rules) are functionally identical. The normalized, source-agnostic version has the following differences:
68+
The normalized, source-agnostic version has the following differences:
7769

7870
- The `_Im_Dns` or `imDns`normalized parsers are used instead of the Infoblox Parser.
7971

articles/sentinel/normalization-schema-alert.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,7 @@ For more information about ASIM parsers, see the [ASIM parsers overview](normali
2626

2727
### Unifying Parsers
2828

29-
To use parsers that unify all ASIM out-of-the-box parsers and ensure that your analysis runs across all the configured sources, use the `_Im_AlertEvent` filtering parser or the `_ASim_AlertEvent` parameter-less parser. You can also use workspace-deployed `imAlertEvent` and `ASimAlertEvent` parsers by deploying them from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM).
30-
31-
For more information, see [built-in ASIM parsers and workspace-deployed parsers](normalization-parsers-overview.md#built-in-asim-parsers-and-workspace-deployed-parsers).
29+
To use parsers that unify all ASIM out-of-the-box parsers and ensure that your analysis runs across all the configured sources, use the `_Im_AlertEvent` parser.
3230

3331
### Out-of-the-box, Source-specific Parsers
3432

articles/sentinel/normalization-schema-dhcp.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -135,15 +135,15 @@ The source system is the system that requests a DHCP lease
135135
| **RuleNumber** | Optional | int | The number of the rule associated with the alert.<br><br>e.g. `123456` |
136136
| **RuleName** | Optional | string | The name or ID of the rule associated with the alert.<br><br>e.g. `Server PSEXEC Execution via Remote Access` |
137137
| **ThreatId** | Optional | string | The ID of the threat or malware identified in the alert.<br><br> e.g. `1234567891011121314` |
138-
| **ThreatName** | Optional | string | The name of the threat or malware identified in the alert.<br><br> e.g. `Init.exe` |
139-
| **ThreatFirstReportedTime** | Optional | Date/Time | Date and time when the threat was first reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
140-
| **ThreatLastReportedTime** | Optional | Date/Time | Date and time when the threat was last reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
141138
| **ThreatCategory** | Optional | String | The category of the threat or malware identified in the alert.<br><br>Supported values are: `Malware`, `Ransomware`, `Trojan`, `Virus`, `Worm`, `Adware`, `Spyware`, `Rootkit`, `Cryptominor`, `Phishing`, `Spam`, `MaliciousUrl`, `Spoofing`, `Security Policy Violation`, `Unknown` |
142-
| **ThreatIsActive** | Optional | bool | Indicates whether the threat is currently active.<br><br>Supported values are: `True`, `False` |
143-
| **ThreatRiskLevel** | Optional | RiskLevel (Integer) | The risk level associated with the threat. The level should be a number between 0 and 100.<br><br>Note: The value might be provided in the source record by using a different scale, which should be normalized to this scale. The original value should be stored in ThreatRiskLevelOriginal. |
144-
| **ThreatOriginalRiskLevel** | Optional | string | The risk level as reported by the originating system. |
139+
| **ThreatName** | Optional | string | The name of the threat or malware identified in the alert.<br><br> e.g. `Init.exe` |
145140
| **ThreatConfidence** | Optional | ConfidenceLevel (Integer) | The confidence level of the threat identified, normalized to a value between 0 and a 100. |
146141
| **ThreatOriginalConfidence** | Optional | string | The confidence level as reported by the originating system. |
142+
| **ThreatRiskLevel** | Optional | RiskLevel (Integer) | The risk level associated with the threat. The level should be a number between 0 and 100.<br><br>Note: The value might be provided in the source record by using a different scale, which should be normalized to this scale. The original value should be stored in ThreatRiskLevelOriginal. |
143+
| **ThreatOriginalRiskLevel** | Optional | string | The risk level as reported by the originating system. |
144+
| **ThreatIsActive** | Optional | bool | Indicates whether the threat is currently active.<br><br>Supported values are: `True`, `False` |
145+
| **ThreatFirstReportedTime** | Optional | Date/Time | Date and time when the threat was first reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
146+
| **ThreatLastReportedTime** | Optional | Date/Time | Date and time when the threat was last reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z` |
147147

148148

149149
### Schema updates

articles/sentinel/normalization-schema-web.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,7 @@ For more information about ASIM parsers, see the [ASIM parsers overview](normali
4949

5050
### Unifying parsers
5151

52-
To use parsers that unify all ASIM out-of-the-box parsers, and ensure that your analysis runs across all the configured sources, use the `_Im_WebSession` filtering parser or the `_ASim_WebSession` parameter-less parser.
53-
54-
You can also use workspace-deployed `ImWebSession` and `ASimWebSession` parsers by deploying them from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM). For more information, see [built-in ASIM parsers and workspace-deployed parsers](normalization-parsers-overview.md#built-in-asim-parsers-and-workspace-deployed-parsers).
52+
To use parsers that unify all ASIM out-of-the-box parsers, and ensure that your analysis runs across all the configured sources, use the `_Im_WebSession` parser.
5553

5654
### Out-of-the-box, source-specific parsers
5755

articles/sentinel/ueba-reference.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,6 +271,9 @@ There are multiple versions of the *IdentityInfo* table:
271271

272272
For more information on the unified version, see [IdentityInfo in the *Advanced hunting* documentation](/defender-xdr/advanced-hunting-identityinfo-table).
273273

274+
> [!IMPORTANT]
275+
> When you transition to the Defender portal, the `IdentityInfo` table becomes a native Defender table that doesn't support table-level RBAC (Role-Based Access Control). If your organization uses table-level RBAC to restrict access to the `IdentityInfo` table in the Azure portal, this access control will no longer be available after you transition to the Defender portal.
276+
274277
#### Schema
275278

276279
The table in the following "Log Analytics schema" tab describes the user identity data included in the **IdentityInfo** table in Log Analytics in the Azure portal.
@@ -421,4 +424,4 @@ This document described the Microsoft Sentinel entity behavior analytics table s
421424

422425
- Learn more about [entity behavior analytics](identify-threats-with-entity-behavior-analytics.md).
423426
- [Enable UEBA in Microsoft Sentinel](enable-entity-behavior-analytics.md).
424-
- [Put UEBA to use](investigate-with-ueba.md) in your investigations.
427+
- [Put UEBA to use](investigate-with-ueba.md) in your investigations.

0 commit comments

Comments
 (0)