I believe you will see better aggregation when switching over to the Microsoft 365 Defender (Preview) connector. This connects to M365D rather than the individual services. When you activate this connector it will ask to turn off the other alert forwarding rules that it replaces. You will also have the option to stream the raw logs from the M365D advanced hunting tables. I think you need the SecurityIncidents and SecurityAlerts tables at a minimum. This also provides 2-way alerts integration. These raw tables are not free unfortunately. They will incur ingestion changes. Most of the tables are fairly small but you might find that some tables are more expensive than expected. Definitely monitor ingestion volume/price for a few weeks after activation. Also, there are about a dozen alert rule templates in Sentinel that add additional checks on MDE device tables. Mostly static threat intel checks.
Microsoft Defender for Endpoint Alerts in Microsoft Sentinel
Anand R Menon
301
Reputation points
Hi,
Currently I have enabled Microsoft Defender for Endpoint Alerts to flow to Sentinel by enabling it in the corresponding Sentinel Connector. Is it possible to configure such that Defender incidents appear in Sentinel with all the correlated alerts in the same way as it appear in Defender instead of generating a Sentinel incident for each Defender alert flown into Sentinel. Also want to know enabling this alert/incident flow through Connector or Microsoft Incident Creation Rule is the best option or whether both needs to be enabled? Thank you.
Regards,
Anand
Microsoft Security | Microsoft Sentinel
1,296 questions
Accepted answer
-
Andrew Blumhardt 10,051 Reputation points Microsoft Employee
2022-01-31T13:03:06.91+00:00