You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/workspaces-defender-portal.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about the support of multiple workspaces for Microsoft Sentin
4
4
author: batamig
5
5
ms.author: bagol
6
6
ms.topic: concept-article
7
-
ms.date: 10/21/2025
7
+
ms.date: 03/17/2026
8
8
appliesto:
9
9
- Microsoft Sentinel with Defender XDR in the Defender portal
10
10
@@ -28,13 +28,13 @@ In such cases:
28
28
29
29
|Area |Description |
30
30
|---------|---------|
31
-
|**Other workspaces previously connected to Defender XDR**| Any other workspaces that were previously connected to the Defender XDR connector are disconnected, and function as secondary workspaces. Defender XDR data isn't available in a secondary workspace, and any analytics rules and automation that you had previously configured based on Defender XDR data no longer function.|
31
+
|**Other workspaces previously connected to Defender XDR**| Any other workspaces that were previously connected to the Defender XDR connector are disconnected, and function as secondary workspaces. Any analytics rules and automation that you had previously configured based on Defender XDR data no longer function until you configure table ingestion.|
32
32
|**Tenant-based alerts and standalone data connectors**|Alerts from other Microsoft services, including other Defender services, are tenant-based alerts and relate to the entire tenant instead of a specific workspace. <br><br>To prevent duplication across workspaces, any direct, standalone data connectors for these services must be disconnected from Microsoft Sentinel in secondary workspaces. This results in tenant-based alerts surfacing only in the primary workspace. <br><br>Upon onboarding, standalone data connectors for Microsoft Defender for Office 365, Microsoft Entra ID Protection, Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, and Microsoft Defender for Identity are automatically disconnected. <br><br>If you have other, standalone Microsoft data connectors with alerts in your workspaces, make sure to disconnect them before onboarding to the Defender portal. |
33
-
|**Defender XDR alerts and incidents**| All Defender XDR alerts and incidents are synced to your primary workspace only.|
33
+
|**Defender XDR alerts and incidents**| All Defender XDR alerts and incidents are synced to your primary workspace only. However, secondary workspaces can ingest Defender table data if configured in the [Microsoft XDR connector in the Sentinel portal](connect-microsoft-365-defender.md#connect-to-microsoft-defender-xdr) in Azure, or under **Microsoft Sentinel** > **Configuration** > **Tables** in the Defender portal.|
34
34
|**Incident creation and alert correlation**| The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. Incidents in secondary workspaces don't include data from any other workspace, or from Defender XDR.|
35
35
|**One primary workspace required**| One primary workspace must always be connected to the Defender portal.|
36
36
37
-
For example, you might be working on a global SOC team in a company that has multiple, autonomous workspaces. In such cases, you might not want to see incidents and alerts from each of these workspaces in your global SOC queue in the Defender portal. Since these workspaces are onboarded to the Defender portal as secondary workspaces, they show in the Defender portal as Microsoft Sentinel only, without any Defender data, and continue to function autonomously. When looking at your global SOC workspace, you won't see data from these secondary workspaces.
37
+
For example, you might be working on a global SOC team in a company that has multiple, autonomous workspaces. In such cases, you might not want to see incidents and alerts from each of these workspaces in your global SOC queue in the Defender portal. Since these workspaces are onboarded to the Defender portal as secondary workspaces, they show in the Defender portal as Microsoft Sentinel only, without Defender incidents and alerts, and continue to function autonomously. When looking at your global SOC workspace, you won't see data from these secondary workspaces.
38
38
39
39
Where you have multiple Microsoft Sentinel workspaces within a Microsoft Entra ID tenant, consider using the primary workspace for your global security operations center.
40
40
@@ -56,7 +56,7 @@ After you connect Microsoft Sentinel to the Defender portal, your existing Azure
56
56
|Workspace |Access |
57
57
|---------|---------|
58
58
|**Primary**| If you have access to the primary workspace, you're able to read and manage data from the workspace and Defender XDR. |
59
-
|**Secondary**| If you have access to a secondary workspace, you're able to read and manage data from the workspace only. The secondary workspaces don't include Defender XDR data. |
59
+
|**Secondary**| If you have access to a secondary workspace, you're able to read and manage data from the workspace only. Defender incidents and alerts aren't synchronized with secondary workspaces, but secondary workspaces can still ingest Defender table data. For more information, see [Primary and secondary workspaces](#primary-and-secondary-workspaces). |
60
60
61
61
**Exception:** If you've already onboarded one workspace to the Defender portal, any alerts created by using custom detections on `AlertInfo` and `AlertEvidence` tables before mid January 2025 are visible to all users.
0 commit comments