Microsoft 365 Defender integration with Azure Sentinel
Microsoft 365 Defender was formerly known as Microsoft Threat Protection or MTP.
Microsoft Defender for Endpoint was formerly known as Microsoft Defender Advanced Threat Protection or MDATP.
You may see the old names still in use for a period of time.
Azure Sentinel's Microsoft 365 Defender (M365D) incident integration allows you to stream all M365D incidents into Azure Sentinel and keep them synchronized between both portals. Incidents from M365D (formerly known as Microsoft Threat Protection or MTP) include all associated alerts, entities, and relevant information, providing you with enough context to perform triage and preliminary investigation in Azure Sentinel. Once in Sentinel, Incidents will remain bi-directionally synced with M365D, allowing you to take advantage of the benefits of both portals in your incident investigation.
This integration gives Microsoft 365 security incidents the visibility to be managed from within Azure Sentinel, as part of the primary incident queue across the entire organization, so you can see – and correlate – M365 incidents together with those from all of your other cloud and on-premises systems. At the same time, it allows you to take advantage of the unique strengths and capabilities of M365D for in-depth investigations and an M365-specific experience across the M365 ecosystem. M365 Defender enriches and groups alerts from multiple M365 products, both reducing the size of the SOC’s incident queue and shortening the time to resolve. The component services that are part of the M365 Defender stack are:
- Microsoft Defender for Endpoint (MDE, formerly MDATP)
- Microsoft Defender for Identity (MDI, formerly AATP)
- Microsoft Defender for Office 365 (MDO, formerly O365ATP)
- Microsoft Cloud App Security (MCAS)
In addition to collecting alerts from these components, M365 Defender generates alerts of its own. It creates incidents from all of these alerts and sends them to Azure Sentinel.
Common use cases and scenarios
One-click connect of M365 Defender incidents, including all alerts and entities from M365 Defender components, into Azure Sentinel.
Bi-directional sync between Sentinel and M365D incidents on status, owner and closing reason.
Leverage M365 Defender alert grouping and enrichment capabilities in Azure Sentinel, thus reducing time to resolve.
In-context deep link between an Azure Sentinel incident and its parallel M365 Defender incident, to facilitate investigations across both portals.
Connecting to Microsoft 365 Defender
Once you have enabled the Microsoft 365 Defender data connector to collect incidents and alerts, M365D incidents will appear in the Azure Sentinel incidents queue, with Microsoft 365 Defender in the Product name field, shortly after they are generated in M365 Defender.
It can take up to 10 minutes from the time an incident is generated in M365 Defender to the time it appears in Azure Sentinel.
Incidents will be ingested and synchronized at no extra cost.
Once the M365 Defender integration is connected, all the component alert connectors (MDE, MDI, MDO, MCAS) will be automatically connected in the background if they weren't already. If any component licenses were purchased after M365 Defender was connected, the alerts and incidents from the new product will still flow to Azure Sentinel with no additional configuration or charge.
M365 Defender incidents and Microsoft incident creation rules
Incidents generated by M365 Defender, on the basis of alerts coming from M365 security products, are created using custom M365 logic.
Microsoft incident-creation rules in Azure Sentinel also create incidents from the same alerts, using (a different) custom Azure Sentinel logic.
Using both mechanisms together is completely supported, and this configuration can be used to facilitate the transition to the new M365 Defender incident creation logic. This will, however, create duplicate incidents for the same alerts.
To avoid creating duplicate incidents for the same alerts, we recommend that customers turn off all Microsoft incident creation rules for M365 products (MDE, MDI, and MDO - see MCAS below) when connecting M365 Defender. This can be done by marking the relevant check box in the connector page. Keep in mind that if you do this, any filters that were applied by the incident creation rules will not be applied to M365 Defender incident integration.
For Microsoft Cloud App Security (MCAS) alerts, not all alert types are currently onboarded to M365 Defender. To make sure you are still getting incidents for all MCAS alerts, you must keep or create Microsoft incident creation rules for the alert types not onboarded to M365D.
Working with M365 Defender incidents in Azure Sentinel and bi-directional sync
M365 Defender incidents will appear in the Azure Sentinel incidents queue with the product name Microsoft 365 Defender, and with similar details and functionality to any other Sentinel incidents. Each incident contains a link back to the parallel incident in the M365 Defender portal.
As the incident evolves in M365 Defender, and more alerts or entities are added to it, the Azure Sentinel incident will update accordingly.
Changes made to the status, closing reason, or assignment of an M365 incident, in either M365D or Azure Sentinel, will likewise update accordingly in the other's incidents queue. The synchronization will take place in both portals immediately after the change to the incident is applied, with no delay. A refresh might be required to see the latest changes.
In M365 Defender, all alerts from one incident can be transferred to another, resulting in the incidents being merged. When this happens, the Azure Sentinel incidents will reflect the changes. One incident will contain all the alerts from both original incidents, and the other incident will be automatically closed, with a tag of "redirected" added.
Incidents in Azure Sentinel can contain a maximum of 150 alerts. M365D incidents can have more than this. If an M365D incident with more than 150 alerts is synchronized to Azure Sentinel, the Sentinel incident will show as having “150+” alerts and will provide a link to the parallel incident in M365D where you will see the full set of alerts.
Advanced hunting event collection
The Microsoft 365 Defender connector also lets you stream advanced hunting events - a type of raw event data - from Microsoft 365 Defender and its component services into Azure Sentinel. You can currently collect Microsoft Defender for Endpoint (MDATP) advanced hunting events, and stream them straight into purpose-built tables in your Azure Sentinel workspace. These tables are built on the same schema that is used in the Microsoft 365 Defender portal, giving you complete access to the full set of advanced hunting events, and allowing you to do the following:
Easily copy your existing Microsoft Defender for Endpoint advanced hunting queries into Azure Sentinel.
Use the raw event logs to provide additional insights for your alerts, hunting, and investigation, and correlate these events with others from additional data sources in Azure Sentinel.
Store the logs with increased retention, beyond Microsoft Defender for Endpoint or Microsoft 365 Defender’s default retention of 30 days. You can do so by configuring the retention of your workspace or by configuring per-table retention in Log Analytics.
In this document, you learned how to benefit from using Microsoft 365 Defender together with Azure Sentinel, using the Microsoft 365 Defender connector.