Skip to content

Commit 797bbd5

Browse files
committed
Updated unit for Sentinel SIEM in Defender XDR
1 parent d1575a4 commit 797bbd5

2 files changed

Lines changed: 69 additions & 7 deletions

File tree

Lines changed: 65 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,59 @@
1-
The Microsoft Defender extended detection and response (XDR) connector, with incident integration, allows you to stream all Microsoft Defender XDR incidents and alerts into Microsoft Sentinel. The connector keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They're grouped together, and are enriched by, alerts from Microsoft Defender XDR's component services, Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps. Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the *Unified Security Operations Platform* or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
1+
## Microsoft Defender XDR integration
22

3-
The connector also lets you stream advanced hunting events from all of the above components into Microsoft Sentinel. This allows you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide more insights, and store the logs with increased retention in Log Analytics.
3+
The Microsoft Defender extended detection and response (XDR) connector enables you to stream all Microsoft Defender XDR incidents, alerts, and advanced hunting events into Microsoft Sentinel. The connector keeps incidents synchronized between both portals and enriches them with alerts from Microsoft Defender XDR's component services:
44

5-
To deploy the connector, do the following steps:
5+
- Microsoft Defender for Endpoint
6+
- Microsoft Defender for Identity
7+
- Microsoft Defender for Office 365
8+
- Microsoft Defender for Cloud Apps
9+
- Microsoft Defender for Cloud
10+
11+
Other services whose alerts are included:
12+
13+
- Microsoft Purview Data Loss Prevention
14+
- Microsoft Entra ID Protection
15+
- Microsoft Purview Insider Risk Management
16+
17+
Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the Unified Security Operations Platform or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
18+
19+
## Integration methods
20+
21+
There are two methods to integrate Microsoft Defender XDR with Microsoft Sentinel:
22+
23+
1. **Defender portal integration**: If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you. This provides a unified security operations experience directly in the Microsoft Defender portal.
24+
25+
2. **Azure portal integration**: If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel.
26+
27+
## [Defender portal integration](#tab/defender-portal-integration)
28+
29+
If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you, and any data connectors for the alert providers included in the Defender XDR connector are automatically disconnected. This includes:
30+
31+
- Microsoft Defender for Cloud Apps (alerts)
32+
- Microsoft Defender for Endpoint
33+
- Microsoft Defender for Identity
34+
- Microsoft Defender for Office 365
35+
- Microsoft Entra ID Protection
36+
37+
In this integration method, you view Microsoft Sentinel data directly with the rest of your Defender incidents, alerts, vulnerabilities, and other security data in the Microsoft Defender portal. Defender XDR incidents appear in the Microsoft Sentinel incidents queue with the product name Microsoft Defender XDR, and each incident contains a link back to the parallel incident in the Microsoft Defender portal.
38+
39+
Changes made to certain fields or attributes of a Defender XDR incident in either portal are synchronized immediately to the other, with no delay. The following fields are synchronized between the Defender portal and Microsoft Sentinel:
40+
41+
- Title
42+
- Description
43+
- ProductName
44+
- Severity
45+
- Custom tags
46+
- AdditionalData
47+
- Comments (new only)
48+
- LastModifiedBy
49+
50+
## [Azure portal integration](#tab/azure-portal-integration)
51+
52+
If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel. Follow these steps:
53+
54+
1. Install the Microsoft Defender XDR solution for Microsoft Sentinel from the Content hub.
55+
56+
1. Enable the Microsoft Defender XDR data connector to collect incidents and alerts.
657

758
1. From the Microsoft Sentinel left navigation menu, expand **Configuration** and then select **Data connectors**.
859

@@ -12,15 +63,24 @@ To deploy the connector, do the following steps:
1263

1364
1. Under the *Instructions* tab, review the *Prerequisites* to confirm you have the required permissions and licenses.
1465

15-
1. Next, in the *Configuration* section, select the **Connect incidents & alerts** button.
66+
1. In the *Configuration* section, select the **Connect incidents & alerts** button.
1667

1768
:::image type="content" source="../media/03-connect-microsoft-defender-xdr-data-connector.png" alt-text="Screen capture of the Defender XDR data connector configuration." lightbox="../media/03-connect-microsoft-defender-xdr-data-connector.png":::
1869

1970
> [!NOTE]
20-
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may may recieve duplications in the incidents queue.
71+
> When you enable alert and incident collection in the Defender XDR data connector, Defender XDR incidents appear in the Microsoft Sentinel incidents queue shortly after they're generated in Defender XDR. Under normal operating conditions, incidents typically appear in the Microsoft Sentinel UI and API within five minutes. Ingestion into the `securityIncident` table might take a few additional minutes.
2172
2273
You can also connect (user and entity behavior analytics) *UEBA entities* and *events* logs from specific products.
2374

2475
1. Select the **Connect entities** and **Connect events** sections.
2576

2677
1. For *events*, mark the checkboxes of the event types you wish to collect, and then select **Apply Changes**.
78+
79+
---
80+
81+
## Important considerations
82+
83+
**Microsoft incident creation rules**: To avoid creating duplicate incidents for the same alerts, the Microsoft incident creation rules setting is turned off for Defender XDR-integrated products when connecting Defender XDR. Microsoft incident creation rules aren't supported in the Defender portal because it has its own incident creation engine. To preserve alert filtering capability, configure alert tuning in the Microsoft Defender portal or use automation rules to suppress or close incidents you don't want.
84+
85+
> [!NOTE]
86+
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may receive duplicate incidents in the incidents queue.

learn-pr/wwl-sci/connect-microsoft-defender-365-to-azure-sentinel/index.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,17 @@ uid: learn.wwl.connect-microsoft-defender-365-to-azure-sentinel
33
metadata:
44
title: Connect Microsoft Defender XDR to Microsoft Sentinel
55
description: "Connect Microsoft Defender XDR to Microsoft Sentinel"
6-
ms.date: 9/30/2024
7-
author: wwlpublish
6+
ms.date: 1/29/2026
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
11+
ai-usage: ai-assisted
1112
title: Connect Microsoft Defender XDR to Microsoft Sentinel
1213
summary: Learn about the configuration options and data provided by Microsoft Sentinel connectors for Microsoft Defender XDR.
1314
abstract: |
1415
Upon completion of this module, the learner is able to:
16+
* Understand the connectivity options for the Microsoft Defender XDR connector when Microsoft Sentinel is onboarded to Defender XDR, versus Microsoft Sentinel in the Azure portal
1517
* Activate the Microsoft Defender XDR connector in Microsoft Sentinel
1618
* Activate the Microsoft Defender for Cloud connector in Microsoft Sentinel
1719
* Activate the Microsoft Defender for IoT connector in Microsoft Sentinel

0 commit comments

Comments
 (0)