Microsoft Defender for Endpoint Alerts in Microsoft Sentinel

Anand R Menon 301 Reputation points
2022-01-31T12:26:56.66+00:00

Hi,

Currently I have enabled Microsoft Defender for Endpoint Alerts to flow to Sentinel by enabling it in the corresponding Sentinel Connector. Is it possible to configure such that Defender incidents appear in Sentinel with all the correlated alerts in the same way as it appear in Defender instead of generating a Sentinel incident for each Defender alert flown into Sentinel. Also want to know enabling this alert/incident flow through Connector or Microsoft Incident Creation Rule is the best option or whether both needs to be enabled? Thank you.

Regards,
Anand

Microsoft Security | Microsoft Sentinel
0 comments No comments
{count} votes

Accepted answer
  1. Andrew Blumhardt 10,051 Reputation points Microsoft Employee
    2022-01-31T13:03:06.91+00:00

    I believe you will see better aggregation when switching over to the Microsoft 365 Defender (Preview) connector. This connects to M365D rather than the individual services. When you activate this connector it will ask to turn off the other alert forwarding rules that it replaces. You will also have the option to stream the raw logs from the M365D advanced hunting tables. I think you need the SecurityIncidents and SecurityAlerts tables at a minimum. This also provides 2-way alerts integration. These raw tables are not free unfortunately. They will incur ingestion changes. Most of the tables are fairly small but you might find that some tables are more expensive than expected. Definitely monitor ingestion volume/price for a few weeks after activation. Also, there are about a dozen alert rule templates in Sentinel that add additional checks on MDE device tables. Mostly static threat intel checks.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.