You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/move-to-defender.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Transition Your Microsoft Sentinel Environment to the Defender Portal
3
3
description: Move Microsoft Sentinel operations from the Azure portal to the Microsoft Defender portal.
4
-
author: batamig
5
-
ms.author: bagol
4
+
author: guywi-ms
5
+
ms.author: guywild
6
6
ms.topic: how-to #Required; leave this attribute/value as-is
7
-
ms.date: 07/29/2025
7
+
ms.date: 01/01/2026
8
8
ms.collection: usx-security
9
9
10
10
#Customer intent: As a security operations team member, I want to understand the process involved in moving our Microsoft Sentinel experience from the Azure portal to the Defender portal so that I can benefit from unified security operations across my entire environment.
@@ -260,6 +260,9 @@ Most functionalities of User and Entity Behavior Analytics (UEBA) remain the sam
260
260
261
261
- After onboarding Microsoft Sentinel to the Defender portal, the `IdentityInfo` table used in the Defender portal includes unified fields from both Defender XDR and Microsoft Sentinel. Some fields that existed when used in the Azure portal are either renamed in the Defender portal, or aren't supported at all. We recommend that you check your queries for any references to these fields and update them as needed. For more information, see [IdentityInfo table](ueba-reference.md?tabs=unified-table#identityinfo-table).
262
262
263
+
> [!IMPORTANT]
264
+
> When you transition to the Defender portal, the `IdentityInfo` table becomes a native Defender table that doesn't support table-level role-based access control (RBAC). If your organization uses table-level RBAC to restrict access to the `IdentityInfo` table in the Azure portal, this access control will no longer be available after you transition to the Defender portal.
265
+
263
266
### Update investigation processes to use Microsoft Defender threat intelligence
264
267
265
268
For Microsoft Sentinel customers moving from the Azure portal to the Defender portal, the familiar threat intelligence features are retained in the Defender portal under **Intel management**, and enhanced with other threat intelligence features available in the Defender portal. Supported features depend on the licenses you have, such as:
@@ -299,4 +302,3 @@ The Microsoft Sentinel [similar incidents](investigate-cases.md#similar-incident
299
302
-[The Best of Microsoft Sentinel - now in Microsoft Defender](https://techcommunity.microsoft.com/blog/MicrosoftThreatProtectionBlog/the-best-of-microsoft-sentinel-%E2%80%94-now-in-microsoft-defender/4415822) (blog)
300
303
- Watch the webinar: [Transition to the Unified SOC Platform: Deep Dive and Interactive Q&A for SOC Professionals](https://www.youtube.com/watch?v=WIM6fbJDkK4).
301
304
- See frequently asked questions in the [TechCommunity blog](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/unified-security-operations-platform---technical-faq/4189136) or the [Microsoft Community Hub](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/frequently-asked-questions-about-the-unified-security-operations-platform/4212048).
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-about-parsers.md
+6-15Lines changed: 6 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Use Advanced Security Information Model (ASIM) parsers instead of table names in
17
17
18
18
## Unifying parsers
19
19
20
-
When using ASIM in your queries, use **unifying parsers** to combine all sources, normalized to the same schema, and query them using normalized fields. The unifying parser name is `_Im_<schema>` for built-in parsers and `im<schema>` for workspace deployed parsers, where `<schema>` stands for the specific schema it serves.
20
+
When using ASIM in your queries, use **unifying parsers** to combine all sources, normalized to the same schema, and query them using normalized fields. The unifying parser name is `_Im_<schema>`, where `<schema>` stands for the specific schema it serves.
21
21
22
22
For example, the following query uses the built-in unifying DNS parser to query DNS events using the `ResponseCodeName`, `SrcIpAddr`, and `TimeGenerated` normalized fields:
23
23
@@ -35,21 +35,20 @@ _Im_Dns
35
35
| summarize count() by SrcIpAddr, bin(TimeGenerated,15m)
36
36
```
37
37
38
-
> [!NOTE]
39
-
> When using the ASIM parsers in the **Logs** page, the time range selector is set to `custom`. You can still set the time range yourself. Alternatively, specify the time range using parser parameters.
40
-
>
41
-
42
38
The following table lists the available unifying parsers:
43
39
44
40
| Schema | Unifying parser |
45
41
| ------ | ------------------------- |
42
+
| Alert Event | _Im_AlertEvent |
46
43
| Audit Event | _Im_AuditEvent |
47
44
| Authentication | _Im_Authentication |
45
+
| DHCP Event | _Im_DhcpEvent |
48
46
| Dns | _Im_Dns |
49
47
| File Event | _Im_FileEvent |
50
48
| Network Session | _Im_NetworkSession |
51
49
| Process Event | _Im_ProcessCreate<br> _Im_ProcessTerminate |
52
-
| Registry Event | _Im_Registry |
50
+
| Registry Event | _Im_RegistryEvent |
51
+
| User Management | _Im_UserManagement |
53
52
| Web Session | _Im_WebSession |
54
53
55
54
@@ -59,15 +58,7 @@ Using parsers might affect your query performance, primarily from filtering the
59
58
60
59
When invoking the parser, always use available filtering parameters by adding one or more named parameters to ensure optimal performance of the ASIM parsers.
61
60
62
-
Each schema has a standard set of filtering parameters documented in the relevant schema documentation. Filtering parameters are entirely optional. The following schemas support filtering parameters:
Every schema that supports filtering parameters supports at least the `starttime` and `endtime` parameters and using them is often critical for optimizing performance.
61
+
Each schema has a standard set of filtering parameters documented in the relevant schema documentation. Filtering parameters are entirely optional.
71
62
72
63
For an example of using filtering parsers, see [Unifying parsers](#unifying-parsers).
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-entity-device.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: ofshezaf
8
8
9
9
10
10
11
-
#Customer intent: As a security analyst, I want to understand the ASIM Device Entity so that I can accurately understand user information captured in normalized events, enabling consistent and comprehensive monitoring across security platforms and improving threat detection and response efforts.
11
+
#Customer intent: As a security analyst, I want to understand the ASIM Device Entity so that I can accurately understand device information captured in normalized events, enabling consistent and comprehensive monitoring across security platforms and improving threat detection and response efforts.
To use workspace-deployed ASIM parsers, replace the first line with the following code:
69
-
70
-
```kusto
71
-
imDns(responsecodename='NXDOMAIN')
72
-
```
73
-
74
-
### Differences between built-in and workspace-deployed parsers
75
-
76
-
The two options in the example [above](#sample-normalization-for-analytics-rules) are functionally identical. The normalized, source-agnostic version has the following differences:
68
+
The normalized, source-agnostic version has the following differences:
77
69
78
70
- The `_Im_Dns` or `imDns`normalized parsers are used instead of the Infoblox Parser.
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-schema-alert.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,7 @@ For more information about ASIM parsers, see the [ASIM parsers overview](normali
26
26
27
27
### Unifying Parsers
28
28
29
-
To use parsers that unify all ASIM out-of-the-box parsers and ensure that your analysis runs across all the configured sources, use the `_Im_AlertEvent` filtering parser or the `_ASim_AlertEvent` parameter-less parser. You can also use workspace-deployed `imAlertEvent` and `ASimAlertEvent` parsers by deploying them from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM).
30
-
31
-
For more information, see [built-in ASIM parsers and workspace-deployed parsers](normalization-parsers-overview.md#built-in-asim-parsers-and-workspace-deployed-parsers).
29
+
To use parsers that unify all ASIM out-of-the-box parsers and ensure that your analysis runs across all the configured sources, use the `_Im_AlertEvent` parser.
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-schema-dhcp.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,15 +135,15 @@ The source system is the system that requests a DHCP lease
135
135
|**RuleNumber**| Optional | int | The number of the rule associated with the alert.<br><br>e.g. `123456`|
136
136
|**RuleName**| Optional | string | The name or ID of the rule associated with the alert.<br><br>e.g. `Server PSEXEC Execution via Remote Access`|
137
137
|**ThreatId**| Optional | string | The ID of the threat or malware identified in the alert.<br><br> e.g. `1234567891011121314`|
138
-
|**ThreatName**| Optional | string | The name of the threat or malware identified in the alert.<br><br> e.g. `Init.exe`|
139
-
|**ThreatFirstReportedTime**| Optional | Date/Time | Date and time when the threat was first reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z`|
140
-
|**ThreatLastReportedTime**| Optional | Date/Time | Date and time when the threat was last reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z`|
141
138
|**ThreatCategory**| Optional | String | The category of the threat or malware identified in the alert.<br><br>Supported values are: `Malware`, `Ransomware`, `Trojan`, `Virus`, `Worm`, `Adware`, `Spyware`, `Rootkit`, `Cryptominor`, `Phishing`, `Spam`, `MaliciousUrl`, `Spoofing`, `Security Policy Violation`, `Unknown`|
142
-
|**ThreatIsActive**| Optional | bool | Indicates whether the threat is currently active.<br><br>Supported values are: `True`, `False`|
143
-
|**ThreatRiskLevel**| Optional | RiskLevel (Integer) | The risk level associated with the threat. The level should be a number between 0 and 100.<br><br>Note: The value might be provided in the source record by using a different scale, which should be normalized to this scale. The original value should be stored in ThreatRiskLevelOriginal. |
144
-
|**ThreatOriginalRiskLevel**| Optional | string | The risk level as reported by the originating system. |
139
+
|**ThreatName**| Optional | string | The name of the threat or malware identified in the alert.<br><br> e.g. `Init.exe`|
145
140
|**ThreatConfidence**| Optional | ConfidenceLevel (Integer) | The confidence level of the threat identified, normalized to a value between 0 and a 100. |
146
141
|**ThreatOriginalConfidence**| Optional | string | The confidence level as reported by the originating system. |
142
+
|**ThreatRiskLevel**| Optional | RiskLevel (Integer) | The risk level associated with the threat. The level should be a number between 0 and 100.<br><br>Note: The value might be provided in the source record by using a different scale, which should be normalized to this scale. The original value should be stored in ThreatRiskLevelOriginal. |
143
+
|**ThreatOriginalRiskLevel**| Optional | string | The risk level as reported by the originating system. |
144
+
|**ThreatIsActive**| Optional | bool | Indicates whether the threat is currently active.<br><br>Supported values are: `True`, `False`|
145
+
|**ThreatFirstReportedTime**| Optional | Date/Time | Date and time when the threat was first reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z`|
146
+
|**ThreatLastReportedTime**| Optional | Date/Time | Date and time when the threat was last reported.<br><br> e.g. `2024-09-19T10:12:10.0000000Z`|
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-schema-web.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,9 +49,7 @@ For more information about ASIM parsers, see the [ASIM parsers overview](normali
49
49
50
50
### Unifying parsers
51
51
52
-
To use parsers that unify all ASIM out-of-the-box parsers, and ensure that your analysis runs across all the configured sources, use the `_Im_WebSession` filtering parser or the `_ASim_WebSession` parameter-less parser.
53
-
54
-
You can also use workspace-deployed `ImWebSession` and `ASimWebSession` parsers by deploying them from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM). For more information, see [built-in ASIM parsers and workspace-deployed parsers](normalization-parsers-overview.md#built-in-asim-parsers-and-workspace-deployed-parsers).
52
+
To use parsers that unify all ASIM out-of-the-box parsers, and ensure that your analysis runs across all the configured sources, use the `_Im_WebSession` parser.
Copy file name to clipboardExpand all lines: articles/sentinel/ueba-reference.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -271,6 +271,9 @@ There are multiple versions of the *IdentityInfo* table:
271
271
272
272
For more information on the unified version, see [IdentityInfo in the *Advanced hunting* documentation](/defender-xdr/advanced-hunting-identityinfo-table).
273
273
274
+
> [!IMPORTANT]
275
+
> When you transition to the Defender portal, the `IdentityInfo` table becomes a native Defender table that doesn't support table-level RBAC (Role-Based Access Control). If your organization uses table-level RBAC to restrict access to the `IdentityInfo` table in the Azure portal, this access control will no longer be available after you transition to the Defender portal.
276
+
274
277
#### Schema
275
278
276
279
The table in the following "Log Analytics schema" tab describes the user identity data included in the **IdentityInfo** table in Log Analytics in the Azure portal.
@@ -421,4 +424,4 @@ This document described the Microsoft Sentinel entity behavior analytics table s
421
424
422
425
- Learn more about [entity behavior analytics](identify-threats-with-entity-behavior-analytics.md).
423
426
-[Enable UEBA in Microsoft Sentinel](enable-entity-behavior-analytics.md).
424
-
-[Put UEBA to use](investigate-with-ueba.md) in your investigations.
427
+
-[Put UEBA to use](investigate-with-ueba.md) in your investigations.
0 commit comments