Integrate Microsoft Defender External Attack Surface Management (Defender EASM) with Microsoft Sentinel

Rohit R Alaraddi 21 Reputation points
2022-08-22T13:32:12.963+00:00

Do anyone have any idea to get the data from Microsoft Defender External Attack Surface Management (Defender EASM) into the log analytics workspace , so that we can create rules based on it in Microsoft Sentinel ?

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,139 questions
{count} votes

1 answer

Sort by: Most helpful
  1. JamesTran-MSFT 36,626 Reputation points Microsoft Employee
    2024-02-13T20:54:54.86+00:00

    @Rohit R Alaraddi

    Thank you for your post!

    When it comes to integrating Microsoft Defender External Attack Surface Management (Defender EASM) with Microsoft Sentinel, you should be able to leverage the data connections feature to help you seamlessly integrate your attack surface data into other Microsoft solutions.

    Screenshot that shows the Data connections page.

    For more info - Defender EASM Data Connections Configuration overviews

    Configure Log Analytics permissions

    1. Open the Log Analytics workspace that will ingest your Defender EASM data or create a new workspace.
    2. On the leftmost pane, under Settings, select Agents.
    3. Expand the Log Analytics agent instructions section to view your workspace ID and primary key. These values are used to set up your data connection.

    Add a data connection

    You can connect your Defender EASM data to either Log Analytics or Azure Data Explorer. To do so, select Add connection for the appropriate tool from the Data Connections page.

    A configuration pane opens on the right side of the Data Connections page. The following fields are required for each respective tool.

    Log Analytics:

    • Name: Enter a name for this data connection.
    • Workspace ID: Enter the workspace ID for the Log Analytics instance where you want to export Defender EASM data.
    • API key: Enter the API key for the Log Analytics instance.
    • Content: Select to integrate asset data, attack surface insights, or both datasets.
    • Frequency: Select the frequency that the Defender EASM connection uses to send updated data to the tool of your choice. Available options are daily, weekly, and monthly.

    Screenshot that shows the Add data connection screen for Log Analytics.

    I hope this helps!

    If you have any other questions, please let me know. Thank you for your time and patience throughout this issue.


    If the information helped address your question, please Accept the answer. This will help us and also improve searchability for others in the community who might be researching similar information.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.