Skip to content

Commit f72bd1e

Browse files
authored
Merge pull request #53262 from KenMAG/rename-update-KenMAG
Updated unit for Sentinel SIEM in Defender XDR
2 parents 5cea49d + cf32d75 commit f72bd1e

2 files changed

Lines changed: 67 additions & 7 deletions

File tree

Lines changed: 63 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,57 @@
1-
The Microsoft Defender extended detection and response (XDR) connector, with incident integration, allows you to stream all Microsoft Defender XDR incidents and alerts into Microsoft Sentinel. The connector keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They're grouped together, and are enriched by, alerts from Microsoft Defender XDR's component services, Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps. Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the *Unified Security Operations Platform* or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
1+
The Microsoft Defender extended detection and response (XDR) connector enables you to stream all Microsoft Defender XDR incidents, alerts, and advanced hunting events into Microsoft Sentinel. The connector keeps incidents synchronized between both portals and enriches them with alerts from Microsoft Defender XDR's component services:
22

3-
The connector also lets you stream advanced hunting events from all of the above components into Microsoft Sentinel. This allows you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide more insights, and store the logs with increased retention in Log Analytics.
3+
- Microsoft Defender for Endpoint
4+
- Microsoft Defender for Identity
5+
- Microsoft Defender for Office 365
6+
- Microsoft Defender for Cloud Apps
7+
- Microsoft Defender for Cloud
48

5-
To deploy the connector, do the following steps:
9+
Other services whose alerts are included:
10+
11+
- Microsoft Purview Data Loss Prevention
12+
- Microsoft Entra ID Protection
13+
- Microsoft Purview Insider Risk Management
14+
15+
Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the Unified Security Operations Platform or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
16+
17+
## Integration methods
18+
19+
There are two methods to integrate Microsoft Defender XDR with Microsoft Sentinel:
20+
21+
**Defender portal integration**: If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you. This provides a unified security operations experience directly in the Microsoft Defender portal.
22+
23+
**Azure portal integration**: If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel.
24+
25+
## [Defender portal integration](#tab/defender-portal-integration)
26+
27+
If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you, and any data connectors for the alert providers included in the Defender XDR connector are automatically disconnected. This includes:
28+
29+
- Microsoft Defender for Cloud Apps (alerts)
30+
- Microsoft Defender for Endpoint
31+
- Microsoft Defender for Identity
32+
- Microsoft Defender for Office 365
33+
- Microsoft Entra ID Protection
34+
35+
In this integration method, you view Microsoft Sentinel data directly with the rest of your Defender incidents, alerts, vulnerabilities, and other security data in the Microsoft Defender portal. Defender XDR incidents appear in the Microsoft Sentinel incidents queue with the product name Microsoft Defender XDR, and each incident contains a link back to the parallel incident in the Microsoft Defender portal.
36+
37+
Changes made to certain fields or attributes of a Defender XDR incident in either portal are synchronized immediately to the other, with no delay. The following fields are synchronized between the Defender portal and Microsoft Sentinel:
38+
39+
- Title
40+
- Description
41+
- ProductName
42+
- Severity
43+
- Custom tags
44+
- AdditionalData
45+
- Comments (new only)
46+
- LastModifiedBy
47+
48+
## [Azure portal integration](#tab/azure-portal-integration)
49+
50+
If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel. Follow these steps:
51+
52+
1. Install the Microsoft Defender XDR solution for Microsoft Sentinel from the Content hub.
53+
54+
1. Enable the Microsoft Defender XDR data connector to collect incidents and alerts.
655

756
1. From the Microsoft Sentinel left navigation menu, expand **Configuration** and then select **Data connectors**.
857

@@ -12,15 +61,24 @@ To deploy the connector, do the following steps:
1261

1362
1. Under the *Instructions* tab, review the *Prerequisites* to confirm you have the required permissions and licenses.
1463

15-
1. Next, in the *Configuration* section, select the **Connect incidents & alerts** button.
64+
1. In the *Configuration* section, select the **Connect incidents & alerts** button.
1665

1766
:::image type="content" source="../media/03-connect-microsoft-defender-xdr-data-connector.png" alt-text="Screen capture of the Defender XDR data connector configuration." lightbox="../media/03-connect-microsoft-defender-xdr-data-connector.png":::
1867

1968
> [!NOTE]
20-
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may may recieve duplications in the incidents queue.
69+
> When you enable alert and incident collection in the Defender XDR data connector, Defender XDR incidents appear in the Microsoft Sentinel incidents queue shortly after they're generated in Defender XDR. Under normal operating conditions, incidents typically appear in the Microsoft Sentinel UI and API within five minutes. Ingestion into the `securityIncident` table might take a few additional minutes.
2170
2271
You can also connect (user and entity behavior analytics) *UEBA entities* and *events* logs from specific products.
2372

2473
1. Select the **Connect entities** and **Connect events** sections.
2574

2675
1. For *events*, mark the checkboxes of the event types you wish to collect, and then select **Apply Changes**.
76+
77+
---
78+
79+
## Important considerations
80+
81+
**Microsoft incident creation rules**: To avoid creating duplicate incidents for the same alerts, the Microsoft incident creation rules setting is turned off for Defender XDR-integrated products when connecting Defender XDR. Microsoft incident creation rules aren't supported in the Defender portal because it has its own incident creation engine. To preserve alert filtering capability, configure alert tuning in the Microsoft Defender portal or use automation rules to suppress or close incidents you don't want.
82+
83+
> [!NOTE]
84+
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may receive duplicate incidents in the incidents queue.

learn-pr/wwl-sci/connect-microsoft-defender-365-to-azure-sentinel/index.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,17 @@ uid: learn.wwl.connect-microsoft-defender-365-to-azure-sentinel
33
metadata:
44
title: Connect Microsoft Defender XDR to Microsoft Sentinel
55
description: "Connect Microsoft Defender XDR to Microsoft Sentinel"
6-
ms.date: 9/30/2024
7-
author: wwlpublish
6+
ms.date: 1/29/2026
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
11+
ai-usage: ai-assisted
1112
title: Connect Microsoft Defender XDR to Microsoft Sentinel
1213
summary: Learn about the configuration options and data provided by Microsoft Sentinel connectors for Microsoft Defender XDR.
1314
abstract: |
1415
Upon completion of this module, the learner is able to:
16+
* Understand the connectivity options for the Microsoft Defender XDR connector when Microsoft Sentinel is onboarded to Defender XDR, versus Microsoft Sentinel in the Azure portal
1517
* Activate the Microsoft Defender XDR connector in Microsoft Sentinel
1618
* Activate the Microsoft Defender for Cloud connector in Microsoft Sentinel
1719
* Activate the Microsoft Defender for IoT connector in Microsoft Sentinel

0 commit comments

Comments
 (0)