Microsoft Defender

Zero Trust

FastTrack provides comprehensive guidance on implementing Zero Trust security principles. The Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. This approach ensures robust security across your networks, applications, and environment. FastTrack accomplishes this by focusing on identity, devices, applications, data, infrastructure, and networks. With FastTrack, you can confidently advance your Zero Trust security journey and protect your digital assets effectively.

With Microsoft Defender, you can implement Zero Trust principles by providing extended detection and response (XDR) capabilities. This includes automatically collecting, correlating, and analyzing signal, threat, and alert data from across your Microsoft 365 environment, including endpoints, email, applications, and identities. By integrating with Microsoft Sentinel, you can create a comprehensive XDR and security information and event management (SIEM) solution that enhances your organization's security posture.

Microsoft Defender XDR

Microsoft Defender XDR is a unified pre- and post-breach enterprise defense suite. Defender XDR natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against sophisticated attacks.

FastTrack provides remote guidance for:

  • Providing an overview of the Microsoft Defender portal.
    • Providing an overview of cross-product incidents, including focusing on what's critical by ensuring the full attack scope, impacted assets, and automated remediation actions that are grouped together.
    • Demonstrating how Microsoft Defender XDR can orchestrate the investigation of assets, users, devices, and mailboxes that become compromised through automated self-healing.
    • Explaining and providing examples of how customers can proactively hunt for intrusion attempts and breach activity affecting your email, data, devices, and accounts across multiple data sets.
    • Showing customers how they can review and improve their security posture holistically using Microsoft Secure Score.
  • Provide education and configuration guidance on Unified Security Operations Platform
    • Connecting of a Sentinel Workspace
    • Review of the following capabilities within the Defender portal.
      • Search
      • Threat management
      • Content management
      • Configuration
  • Provide education and configuration guidance on Defender XDR Attack Disruption capabilities.

Note

For customers provisioned with Security Compute Units (SCUs), FastTrack provides a walkthrough of the embedded Microsoft Copilot in Microsoft Defender experiences within the scope covered in this topic.

Out of scope

  • Deployment guidance or education on:
    • How to remediate or interpret the various alert types and monitored activities.
    • How to investigate a user, computer, lateral movement path, or entity.
    • Custom threat hunting.
  • Security information and event management (SIEM) or API integration.
  • Preview features.

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.

Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps is a multi-purpose software-as-a-service (SaaS) security solution. It combines SaaS security posture management, data loss prevention, app-to-app protection, and integrated threat protection to ensure holistic coverage for your apps. By adopting a SaaS security approach, you can easily identify misconfigurations. This improves your overall app posture, implements policies to protect sensitive data, and protects app-to-app scenarios to ensure that only apps have the acceptable permissions to access other app data. When you natively integrate into Microsoft Defender XDR, organizations like yours benefit from using the signal from SaaS to actively hunt in their environments and combat incidents across their apps, devices, identities, and email.

FastTrack provides remote guidance for:

  • Configuring the portal, including:
    • Importing user groups.
    • Managing admin access and settings.
    • Scoping your deployment to select certain user groups to monitor or exclude from monitoring.
    • How to set up IP ranges and tags.
    • Personalizing the end-user experience with your logo and custom messaging.
  • Integrating first-party services including:
    • Microsoft Defender for Endpoint.
    • Microsoft Defender for Identity.
    • Microsoft Entra ID Protection.
    • Microsoft Purview Information Protection.
  • Setting up cloud discovery using:
    • Microsoft Defender for Endpoints.
    • Zscaler.
    • iboss.
  • Creating app tags and categories.
  • Customizing app risk scores based on your organization’s priorities.
  • Sanctioning and unsanctioning apps.
  • Reviewing the Defender for Cloud Apps and Cloud Discovery dashboards.
  • Enabling app governance.
    • Guide the customer through the overview page and create up to five (5) app governance policies.
  • Connecting featured apps using app connectors.
  • Protecting apps with Conditional Access App Control in the Conditional Access within Microsoft Entra ID and Defender for Cloud Apps portals.
  • Deploying Conditional Access App Control for featured apps.
  • Reviewing SaaS Security Posture Management (SSPM) capabilities in Secure Score recommendations for available apps.
  • Using the activity and file logs.
  • Managing OAuth apps.
  • Reviewing and configuring policy templates.
  • Providing configuration assistance with the top SaaS use cases (including the creation or updating of up to six (6) policies).
  • Understanding incident correlation in the Microsoft Defender portal.

Out of scope

  • Discussions comparing Defender for Cloud Apps to other Cloud Access Security Broker (CASB) or SaaS security offerings.
  • Configuring Defender for Cloud Apps to meet specific compliance or regulatory requirements.
  • Deploying the service to a nonproduction test environment.
  • Deploying Cloud App Discovery as a proof of concept.
  • Setting up the infrastructure, installation, or deployment of automatic log uploads for continuous reports using Docker or a log collector.
  • Creating a Cloud Discovery snapshot report.
  • Blocking app usage using block scripts.
  • Adding custom apps to Cloud Discovery.
  • Connecting custom apps with Conditional Access App Control.
  • Onboarding and deploying Conditional Access App Control for any app.
  • Integrating with third-party identity providers (IdPs) and data loss prevention (DLP) providers.
  • Training or guidance covering advanced hunting.
  • Automated investigation and remediation including Microsoft Power Automate playbooks.
  • SIEM or API integration (including Microsoft Sentinel).

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

FastTrack provides remote guidance for:

  • Assessing the OS version and device management approach (including Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, and third-party configurations) as well as the status of your endpoint security software.
  • Onboarding Microsoft Defender for Endpoint P1 and P2 using:
    • Local script.
    • Group Policy.
    • Intune.
    • Configuration Manager.
    • Defender for Endpoint security settings management.
  • Providing recommended configuration guidance for Microsoft traffic to travel through proxies and firewalls, restricting network traffic for devices that aren't able to connect directly to the internet.
  • Enabling the Defender for Endpoint service by explaining how to deploy an endpoint detection and response (EDR) agent profile using one of the supported management methods.
  • Deployment guidance, configuration assistance, and education on:
    • Vulnerability management core features.
    • Attack surface reduction capabilities, including:
      • Attack surface reduction rules.
      • Controlled folder access.
      • Device control for removable media devices.
      • Network protection.
    • Next-generation protection.
    • Endpoint detection and response.
    • Automated investigation and remediation.
    • Secure score for devices.
    • Microsoft Defender SmartScreen configuration using Intune.
    • Device discovery.1
  • Reviewing simulations and tutorials (like practice scenarios, fake malware, and automated investigations).
  • Overview of reporting and threat analytics features.
  • Integrating Microsoft Defender for Office 365, Microsoft Defender for Identity, and Defender for Cloud Apps with Defender for Endpoint.
  • Conduct walkthroughs of the Microsoft Defender portal.
  • Onboarding and configuration of the following operating systems:
    • Windows 10/11, including Windows 365 Cloud PCs.
    • Windows Server 2012 R2.2
    • Windows Server 2016.2
    • Windows Server 2019.2
    • Windows Server 2022.2
    • Windows Server 2019 Core Edition.2
    • Supported macOS versions.
    • Supported Linux server distributions.
    • Android.3
    • iOS.3

1 Only some aspects are device discovery are supported. For more information, see the following Out of scope section.

2 Windows Server 2012 R2 and 2016 support is limited to onboarding and configuration of the unified agent.

3 For more information, see the following Out of scope section for mobile threat defense details.

Out of scope

  • Onboarding and enablement guidance for preview features.
  • Troubleshooting issues encountered during engagement (including devices that fail to onboard). FastTrack directs customers to Microsoft Support for assistance.
  • Supporting Microsoft Defender for Business.
  • Onboarding to Defender for Endpoint using Azure Arc.
  • Onboarding or configuration for the following Defender for Endpoint agents:
    • Windows Server 2008.
    • Linux distributions not supported by Defender for Endpoint.
    • Linux instances using customized kernels.
    • Windows Subsystem for Linux (WSL).
    • Virtual Desktop Infrastructure (VDI) (persistent or non-persistent), including Azure Virtual Desktop and third party VDI solutions.
  • Server onboarding and configuration.
    • Configuring a proxy server for offline communications.
    • Configuring Configuration Manager deployment packages on down-level Configuration Manager instances and versions.
    • Servers not managed by Configuration Manager or Defender for Endpoint security settings management.
    • Integrating Defender for Endpoint with Microsoft Defender for Servers (Microsoft Defender for Cloud).
  • Linux server onboarding and configuration.
    • Prescriptive assistance with any non-Microsoft systems management tools or products (including development of configuration files associated with them), including:
      • Chef
      • Puppet.
      • Ansible.
      • Saltstack.
    • FastTrack refers customers to applicable technical guidance whenever possible.
  • macOS onboarding and configuration.
    • JAMF-based deployment.
    • Other mobile device management (MDM) product-based deployment.
    • Manual deployment.
  • Mobile threat defense onboarding and configuration (Android and iOS).
    • Unmanaged bring your own devices (BYOD) or devices managed by other enterprise mobility management systems.
    • Set up app protection policies (like mobile app management (MAM)).
    • Android devices admin-enrolled devices.
    • Assistance with coexistence of multiple VPN profiles.
    • Onboarding devices to Intune. For more information on onboarding assistance, see Microsoft Intune.
  • Configuration of the following attack surface reduction capabilities:
    • Hardware-based application and browser isolation (including Application Guard).
    • Application control, including AppLocker and Windows Defender Application Control.
    • The following device control functions:
      • Device installation restrictions.
      • Data protection.
      • Storage.
      • Windows Portable Devices (WPD) removable storage access.
      • Connectivity.
      • Bluetooth.
      • Direct Memory Access (DMA) guard.
    • Exploit protection.
    • Network and endpoint firewalls.
  • Configuration or management of account protection features like:
    • Credential Guard.
    • Local user group membership.
  • Configuration or management of BitLocker.

Note

For information on BitLocker assistance with Windows 11, see Windows 11.

  • Configuration or management of network device discovery.
  • Configuration or management of the following device discovery capabilities:
    • Onboarding of unmanaged devices not in scope for FastTrack (like Linux).
    • Configuring or remediating internet-of-things (IoT) devices including vulnerability assessments of IoT devices through Defender for IoT.
    • Integration with third-party tooling.
    • Exclusions for device discovery.
    • Preliminary networking assistance.
    • Troubleshooting network issues.
  • Attack simulations (including penetration testing).
  • Enrollment or configuration of Microsoft Threat Experts.
  • Configuration or training guidance for API or SIEM connections.
  • Training or guidance covering advanced hunting.
  • Training or guidance covering the use of or creation of Kusto queries.
  • Training or guidance covering Defender SmartScreen configuration using Group Policy Objects (GPOs), Windows Security, or Microsoft Edge.
  • Defender Vulnerability Management Add-on.
  • Defender Vulnerability Management Standalone.

Contact a Microsoft Partner for assistance with these services.

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.

Microsoft Defender for Identity

Microsoft Defender for Identity is a cloud-based security solution. It uses your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.

FastTrack provides remote guidance for:

  • Running the sizing tool for resource capacity planning.
  • Creating your instance of Defender for Identity.
  • Configuring Windows event collection across Active Directory Domain Services (AD DS), Active Directory Federation Services (AD FS), and Active Directory Certificate Services (AD CS).
  • Managing admin access with role groups.
  • Downloading, deploying, and configuring the sensor on your Active Directory domain controllers for both single and multiple forest environments.
  • Creating and configuring directory service accounts or manage action accounts in Active Directory including group managed service accounts (gMSA).
  • Downloading, deploying, and configuring the sensor on your AD FS servers.
  • Portal configuration, including:
    • Tagging sensitive accounts, devices, or groups.
    • Email notifications for health issues and security alerts.
    • Alert exclusions.
    • Scheduled reports.
  • Providing deployment guidance, configuration assistance, and education on:
    • Identity Security Posture Assessment reports within Microsoft Secure Score.
    • User Investigation Priority Score and User Investigation ranking reports.
    • Inactive user reports.
    • Remediation options on a compromised account.
  • Facilitating the migration from Advanced Threat Analytics (ATA) to Defender for Identity (if applicable).

Out of scope

  • Deploying Defender for Identity as a proof of concept.
  • Deploying or performing the following Defender for Identity sensor activities:
    • Manual capacity planning.
    • Deploying the standalone sensor.
    • Deploying the unified sensor (in preview).
    • Deploying the sensor using a Network Interface Card (NIC) Teaming adaptor.
    • Deploying the sensor through a third-party tool.
    • Connecting to the Defender for Identity cloud service through a web proxy connection.
  • Creating and configuring permissions for the AD FS database.
  • Creation and management of honeytokens accounts or devices.
  • Enabling Network Name Resolution (NNR).
  • Enabling and configuration of the Deleted Objects container.
  • Deployment guidance or education on:
    • Remediating or interpreting various alert types and monitored activities.
    • Investigating a user, computer, lateral movement path, or entity.
    • Threat or advanced hunting.
    • Incident response.
  • Providing a security alert lab tutorial for Defender for Identity.
  • Providing notification when Defender for Identity detects suspicious activities by sending security alerts to your syslog server through a nominated sensor.
  • Configuring Defender for Identity to perform queries using security account manager remote (SAMR) protocol to identify local admins on specific machines.
  • Configuring VPN solutions to add information from the VPN connection to a user’s profile page.
  • SIEM or API integration (including Microsoft Sentinel).

Source environment expectations

  • Aligned with Defender for Identity prerequisites.
  • Active Directory, AD FS, and AD CS deployed.
  • The Active Directory domain controllers you intend to install Defender for Identity sensors on have internet connectivity to the Defender for Identity cloud service.
    • Your firewall and proxy must be open to communicate with the Defender for Identity cloud service (*.atp.azure.com port 443 must be open).
  • Domain controllers running on one of the following servers:
    • Windows Server 2016.
    • Windows Server 2019 with KB4487044 (OS Build 17763.316 or later).
    • Windows Server 2022.
  • Microsoft .NET Framework 4.7 or later.
  • A minimum of six (6) GB of disk space is required and 10 GB is recommended.
  • Two (2) cores and six (6) GB of RAM installed on the domain controller.

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.

Microsoft Defender for Office 365

Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), attachments, and collaboration tools like Microsoft Teams, SharePoint, and Outlook. With real-time views of threats and tools like Threat Explorer, you can hunt and stay ahead of potential threats. Use attack simulation training to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.

FastTrack provides remote guidance for:

  • Reviewing the Configuration analyzer and/or Defender for Office 365 Recommended Configuration Analyzer (ORCA).
  • Setting up evaluation mode.
  • Enabling preset policies, Safe Links (including Safe Documents), Safe Attachments, anti-malware, anti-phishing, anti-spam, anti-spoofing, impersonation, and quarantine policies.
  • Enabling Teams protection.
  • Configuring user-reported message settings.
  • Using Attack Simulator and configuring an advanced delivery policy
  • Overview of Tenant Allow/Block List (TABL) submissions, email entity page, reporting, campaigns, threat explorer, and threat analytics.
  • Overview of zero-hour auto purge (ZAP) automation and investigation and response (AIR).
  • Understanding incident correlation in the Microsoft Defender portal.
  • Transitioning from a third-party provider following the Microsoft best practice guidance except for creating an inventory of your current settings, moving features that modify messages into Microsoft 365, and configuring enhanced filtering for connectors.

Out of scope

  • Discussions comparing Defender for Office 365 to other security offerings.
  • Deploying Defender for Office 365 as a proof of concept.
  • Mail flow analysis.
  • Enhanced filtering.
  • Training or guidance covering advanced hunting.
  • Integration with Microsoft Power Automate playbooks.
  • SIEM or API integration (including Microsoft Sentinel).

Source environment expectations

In addition to FastTrack core onboarding, Exchange Online must also be configured.

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.

Microsoft Defender for Cloud

Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) that's made up of security measures and practices designed to protect cloud-based applications from various cyber threats and vulnerabilities.

When you enable Defender for Cloud, you automatically gain access to Microsoft Defender XDR. FastTrack enhances the integration between Defender XDR and Defender for Cloud by assisting in improving your security posture with Defender for Cloud Foundational CSPM (cloud security posture management), a free new feature. FastTrack also helps you extend your protection of cloud workloads by deploying Microsoft Defender for Servers on Windows devices that run in Microsoft Azure and on-premises. Defender for Servers integrates with Microsoft Defender for Endpoint to provide endpoint detection and response (EDR) and other threat protection features.

FastTrack provides remote guidance for:

  • Providing an overview of Defender for Cloud, including:
    • Scoping pre-deployment best practices.
      • Ensuring the basic environment setup and knowledge is in place.
      • Defining and implementing a management group hierarchy in the Azure environment.
    • Validating roles and permissions.
      • Creating a central team responsible for tracking and enforcing security in the Azure environment.
      • Assigning the necessary role-based access control (RBAC) permissions for the central security team.
    • Providing policy management.
      • Assigning and customizing the Defender for Cloud default policy.
      • Choosing standards for the compliance dashboard.
      • Ensuring resources are secure by default using Azure policy.
    • Onboarding Defender for Cloud features for Azure.
      • Enabling all Microsoft Defender plans.
      • Configuring security contact and email settings.
      • Deploying required agents
    • Exporting Defender for Cloud data to Microsoft Sentinel.
  • Deploying Foundational CSPM, including:
    • Windows servers running in Azure and on-premises.
    • Security recommendations.
    • Asset inventory.
    • Microsoft Secure Score.
    • Data visualization and reporting.
    • Data exporting.
    • Workflow automation.
    • Remediation tools.
    • Microsoft cloud security benchmark (MCSB).
  • Deploying Defender for Servers P1, including:
    • Configuring Windows servers running in Azure and on-premises.
    • Provisioning Defender for Servers.
    • Onboarding to Azure Arc.
    • Provisioning and integrating Defender for Endpoint.
    • Configuring unified view.
    • Configuring OS-level, agent-based threat detection.

Out of scope

  • Detailed pricing information. Contact your account team for more information.
  • Deploying features on Linux servers that run in Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
  • Onboarding Defender for Cloud, including:
    • Management.
      • Reviewing additional Defender for Cloud data ingested into Microsoft Sentinel following Defender for Servers P2 enablement.
      • Preparing and deploying Logic Apps.
      • Deploying workflow automation.
      • Exporting data for additional reporting.
      • Exporting Defender for Cloud data to other security information and event management (SIEM) or information technology service management (ITSM) solutions.
      • Setting alert suppression rules.
    • Policy management.
      • Ensuring resources are secure through Azure Blueprints (Preview) which will be deprecated July 11, 2026.
      • Assigning custom policies.
  • Deploying Defender for Cloud Foundational CSPM, including:
    • Deploying agentless scanning capability.
    • Managing governance.
    • Deploying the risk-based Recommendation dashboard.
    • Reviewing attack path analysis.
    • Deploying Azure DevOps security capabilities.
    • Deploying the data aware security posture.
  • Deploying Defender for Server P2, including:
    • Configuring Windows servers running in Azure and on-premises.
    • Deploying agentless scanning for both Defender for Cloud Foundational CSPM and Defender for Servers.
    • Enabling File Integrity Monitoring (FIM) through the Defender for Endpoint sensor.
    • Customizing and optimizing FIM.
    • Configuring just-in-time virtual machine access.
    • Managing Azure Update Manager remediation for Azure Arc devices.
    • Managing free data ingestion using Azure Monitor Agent (AMA) to ingest logs.
    • Deploying the Microsoft Defender Vulnerability Management add-on.
    • Configuring security policy and regulatory compliance.
    • Managing docker host hardening.
    • Deploying a network map.
  • Deploying any of the following Microsoft Defender workloads:
    • Microsoft Defender for Storage.
    • Microsoft Defender for Resource Manager.
    • Microsoft Defender for Key Vault.
    • Microsoft Defender for App Service.
    • Microsoft Defender for APIs.
    • Microsoft Defender for Containers.
    • Microsoft Defender External Attack Surface Management (Defender EASM).
    • Microsoft Defender for Databases.
    • Microsoft Defender for Azure SQL databases.
    • Microsoft Defender for SQL servers on devices.
    • Microsoft Defender for open-source relational databases (including Postgre SQL, MySQL, and MariaDB).
    • Microsoft Defender for Azure Cosmos DB
  • Deploying any of the following deprecated Microsoft Defender workloads:
    • Microsoft Defender for DNS.
    • Microsoft Defender for Kubernetes.
    • Microsoft Defender for Container Registries.

Note

If you need further assistance with remote guidance for Defender for Cloud beyond the current scope, contact your account team.

Microsoft Sentinel

Microsoft Sentinel is a scalable, cloud-native solution that provides security information and event management (SIEM) and security orchestration, automation, and response (SOAR). It delivers intelligent security analytics and threat intelligence across your enterprise. With Microsoft Sentinel, you get a single solution for attack detection, threat visibility, proactive hunting, and threat response.

Microsoft Sentinel provides a view across your enterprise, alleviating the stress of increasingly sophisticated attacks, increasing volumes of alerts, and long resolution time frames.

FastTrack provides remote guidance for:

  • Providing an overview of the prerequisites for Microsoft Sentinel deployment.
  • Providing conceptual workspace architecture best practices and considerations, including multi-tenancy scenarios.*
  • Assisting in prioritizing data connectors to optimize Microsoft Sentinel configuration, including:
    • Explaining data transformation and collection customization to assist with optimization.*
  • Planning roles and permissions.
  • Conducting cost expectation analysis based on planned configuration.*
  • Enabling the Microsoft Sentinel service.
  • Discussing and configuring data retention.
  • Configuring data connectors, including:
    • Setting up Microsoft data connectors.
    • Demonstrating how to configure third-party data connectors.*
    • Exploring ingestion cost expectations.*
  • Configuring analytics rules, including;
    • Built-in analytics rules.
    • A query starter pack.
    • Additional rules for Zero Trust and insider threats.
    • User entity behavior analytics rules.
    • Apache Log4J enhancements.
  • Providing an overview of the following:
    • Security operations center (SOC) optimization.
    • Workbooks.
    • Watchlists.
    • User and entity behavior analytics (UEBA).
    • Logic app playbooks.
    • Incident response capabilities*, simulations, and tutorials (like practice scenarios, fake malware, and automated investigations).

*Supported with limitations.

Out of scope

  • Attack simulations (including penetration testing).
  • Diagnosis of threats and threat hunting.
  • Creation and configuration of Log Analytics workspaces.
  • Troubleshooting issues encountered during engagement (including networking issues)
  • Configuration of third-party or custom connectors.
  • Configuration of data transformation.
  • Migration from Microsoft Monitoring Agent (MMA) to Azure Monitor Agent (AMA).
  • Compete conversations around third-party SIEM and SOAR solutions.
  • Assisting with third-party SIEM and SOAR configuration.
  • Migrations from third-party SIEM and SOAR solutions.
  • Advanced SIEM Information Model (ASIM) parsers.
  • Jupyter Notebooks.
  • Azure Synapse and Azure Data Lake solutions.
  • Preview features.
  • Common Event Format (CEF)- and Syslog-filtered ingestion through AMA.

Microsoft advanced deployment guides

Microsoft provides customers with technology and guidance to assist with deploying your Microsoft 365, Microsoft Viva, and security services. We encourage our customers to start their deployment journey with these offerings.

For non-IT admins, see Microsoft 365 Setup.