You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Microsoft Defender extended detection and response (XDR) connector, with incident integration, allows you to stream all Microsoft Defender XDR incidentsand alerts into Microsoft Sentinel. The connector keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They're grouped together, and are enriched by, alerts from Microsoft Defender XDR's component services, Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps. Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the *Unified Security Operations Platform* or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
1
+
The Microsoft Defender extended detection and response (XDR) connector enables you to stream all Microsoft Defender XDR incidents, alerts, and advanced hunting events into Microsoft Sentinel. The connector keeps incidents synchronized between both portalsand enriches them with alerts from Microsoft Defender XDR's component services:
2
2
3
-
The connector also lets you stream advanced hunting events from all of the above components into Microsoft Sentinel. This allows you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide more insights, and store the logs with increased retention in Log Analytics.
3
+
- Microsoft Defender for Endpoint
4
+
- Microsoft Defender for Identity
5
+
- Microsoft Defender for Office 365
6
+
- Microsoft Defender for Cloud Apps
7
+
- Microsoft Defender for Cloud
4
8
5
-
To deploy the connector, do the following steps:
9
+
Other services whose alerts are included:
10
+
11
+
- Microsoft Purview Data Loss Prevention
12
+
- Microsoft Entra ID Protection
13
+
- Microsoft Purview Insider Risk Management
14
+
15
+
Connecting the Microsoft Defender XDR connector is a prerequisite for configuring the Unified Security Operations Platform or unified security information and event management (SIEM) and XDR experience in Microsoft Defender XDR.
16
+
17
+
## Integration methods
18
+
19
+
There are two methods to integrate Microsoft Defender XDR with Microsoft Sentinel:
20
+
21
+
**Defender portal integration**: If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you. This provides a unified security operations experience directly in the Microsoft Defender portal.
22
+
23
+
**Azure portal integration**: If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel.
If you onboard Microsoft Sentinel to the Defender portal and are licensed for Defender XDR, Microsoft Sentinel is automatically connected to Defender XDR. The data connector for Defender XDR is automatically set up for you, and any data connectors for the alert providers included in the Defender XDR connector are automatically disconnected. This includes:
28
+
29
+
- Microsoft Defender for Cloud Apps (alerts)
30
+
- Microsoft Defender for Endpoint
31
+
- Microsoft Defender for Identity
32
+
- Microsoft Defender for Office 365
33
+
- Microsoft Entra ID Protection
34
+
35
+
In this integration method, you view Microsoft Sentinel data directly with the rest of your Defender incidents, alerts, vulnerabilities, and other security data in the Microsoft Defender portal. Defender XDR incidents appear in the Microsoft Sentinel incidents queue with the product name Microsoft Defender XDR, and each incident contains a link back to the parallel incident in the Microsoft Defender portal.
36
+
37
+
Changes made to certain fields or attributes of a Defender XDR incident in either portal are synchronized immediately to the other, with no delay. The following fields are synchronized between the Defender portal and Microsoft Sentinel:
If you want to sync Defender XDR data to Microsoft Sentinel in the Azure portal, you must enable the Microsoft Defender XDR connector in Microsoft Sentinel. Follow these steps:
51
+
52
+
1. Install the Microsoft Defender XDR solution for Microsoft Sentinel from the Content hub.
53
+
54
+
1. Enable the Microsoft Defender XDR data connector to collect incidents and alerts.
6
55
7
56
1. From the Microsoft Sentinel left navigation menu, expand **Configuration** and then select **Data connectors**.
8
57
@@ -12,15 +61,24 @@ To deploy the connector, do the following steps:
12
61
13
62
1. Under the *Instructions* tab, review the *Prerequisites* to confirm you have the required permissions and licenses.
14
63
15
-
1.Next, in the *Configuration* section, select the **Connect incidents & alerts** button.
64
+
1.In the *Configuration* section, select the **Connect incidents & alerts** button.
16
65
17
66
:::image type="content" source="../media/03-connect-microsoft-defender-xdr-data-connector.png" alt-text="Screen capture of the Defender XDR data connector configuration." lightbox="../media/03-connect-microsoft-defender-xdr-data-connector.png":::
18
67
19
68
> [!NOTE]
20
-
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may may recieve duplications in the incidents queue.
69
+
> When you enable alert and incident collection in the Defender XDR data connector, Defender XDR incidents appear in the Microsoft Sentinel incidents queue shortly after they're generated in Defender XDR. Under normal operating conditions, incidents typically appear in the Microsoft Sentinel UI and API within five minutes. Ingestion into the `securityIncident` table might take a few additional minutes.
21
70
22
71
You can also connect (user and entity behavior analytics) *UEBA entities* and *events* logs from specific products.
23
72
24
73
1. Select the **Connect entities** and **Connect events** sections.
25
74
26
75
1. For *events*, mark the checkboxes of the event types you wish to collect, and then select **Apply Changes**.
76
+
77
+
---
78
+
79
+
## Important considerations
80
+
81
+
**Microsoft incident creation rules**: To avoid creating duplicate incidents for the same alerts, the Microsoft incident creation rules setting is turned off for Defender XDR-integrated products when connecting Defender XDR. Microsoft incident creation rules aren't supported in the Defender portal because it has its own incident creation engine. To preserve alert filtering capability, configure alert tuning in the Microsoft Defender portal or use automation rules to suppress or close incidents you don't want.
82
+
83
+
> [!NOTE]
84
+
> If you uncheck the *Turn off all Microsoft incident creation rules for these products. Recommended* checkbox, you may receive duplicate incidents in the incidents queue.
title: Connect Microsoft Defender XDR to Microsoft Sentinel
5
5
description: "Connect Microsoft Defender XDR to Microsoft Sentinel"
6
-
ms.date: 9/30/2024
7
-
author: wwlpublish
6
+
ms.date: 1/29/2026
7
+
author: KenMAG
8
8
ms.author: kelawson
9
9
ms.topic: module
10
10
ms.service: microsoft-sentinel
11
+
ai-usage: ai-assisted
11
12
title: Connect Microsoft Defender XDR to Microsoft Sentinel
12
13
summary: Learn about the configuration options and data provided by Microsoft Sentinel connectors for Microsoft Defender XDR.
13
14
abstract: |
14
15
Upon completion of this module, the learner is able to:
16
+
* Understand the connectivity options for the Microsoft Defender XDR connector when Microsoft Sentinel is onboarded to Defender XDR, versus Microsoft Sentinel in the Azure portal
15
17
* Activate the Microsoft Defender XDR connector in Microsoft Sentinel
16
18
* Activate the Microsoft Defender for Cloud connector in Microsoft Sentinel
17
19
* Activate the Microsoft Defender for IoT connector in Microsoft Sentinel
0 commit comments