Connect Microsoft Sentinel to Microsoft Defender XDR
Microsoft Sentinel is generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. When you onboard Microsoft Sentinel to the Defender portal, you unify capabilities with Microsoft Defender XDR like incident management and advanced hunting. Reduce tool switching and build a more context-focused investigation that expedites incident response and stops breaches faster. For more information, see:
- Blog post: General availability of the Microsoft unified security operations platform
- Blog post: Frequently asked questions about the unified security operations platform
- Microsoft Sentinel in the Microsoft Defender portal
- Microsoft Defender XDR integration with Microsoft Sentinel
Prerequisites
Before you begin, review the feature documentation to understand the product changes and limitations:
- Microsoft Sentinel in the Microsoft Defender portal
- Advanced hunting in the Microsoft Defender portal
- Alerts, incidents, and correlation in Microsoft Defender XDR
- Automation with the unified security operations platform
The Microsoft Defender portal supports a single Microsoft Entra tenant and the connection to one workspace at a time. In the context of this article, a workspace is a Log Analytics workspace with Microsoft Sentinel enabled.
To onboard and use Microsoft Sentinel in the Microsoft Defender portal, you must have the following resources and access:
A Log Analytics workspace that has Microsoft Sentinel enabled
The data connector for Microsoft Defender XDR (formerly named Microsoft 365 Defender) enabled in Microsoft Sentinel for incidents and alerts. For more information, see Connect data from Microsoft Defender XDR to Microsoft Sentinel.
Access to Microsoft Defender XDR in the Defender portal
Microsoft Defender XDR onboarded to the Microsoft Entra tenant
An Azure account with the appropriate roles to onboard, use, and create support requests for Microsoft Sentinel in the Defender portal. The following table highlights some of the key roles needed.
Task Azure built-in role required Scope Connect or disconnect a workspace with Microsoft Sentinel enabled Owner or
User Access Administrator and Microsoft Sentinel Contributor- Subscription for Owner or User Access Administrator roles
- Subscription, resource group, or workspace resource for Microsoft Sentinel ContributorView Microsoft Sentinel in the Defender portal Microsoft Sentinel Reader Subscription, resource group, or workspace resource Query Sentinel data tables or view incidents Microsoft Sentinel Reader or a role with the following actions:
- Microsoft.OperationalInsights/workspaces/read
- Microsoft.OperationalInsights/workspaces/query/read
- Microsoft.SecurityInsights/Incidents/read
- Microsoft.SecurityInsights/incidents/comments/read
- Microsoft.SecurityInsights/incidents/relations/read
- Microsoft.SecurityInsights/incidents/tasks/readSubscription, resource group, or workspace resource Take investigative actions on incidents Microsoft Sentinel Contributor or a role with the following actions:
- Microsoft.OperationalInsights/workspaces/read
- Microsoft.OperationalInsights/workspaces/query/read
- Microsoft.SecurityInsights/incidents/read
- Microsoft.SecurityInsights/incidents/write
- Microsoft.SecurityInsights/incidents/comments/read
- Microsoft.SecurityInsights/incidents/comments/write
- Microsoft.SecurityInsights/incidents/relations/read
- Microsoft.SecurityInsights/incidents/relations/write
- Microsoft.SecurityInsights/incidents/tasks/read
- Microsoft.SecurityInsights/incidents/tasks/writeSubscription, resource group, or workspace resource Create a support request Owner or
Contributor or
Support request contributor or a custom role with Microsoft.Support/*Subscription After you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal. Any Azure RBAC changes are reflected in the Defender portal. For more information about Microsoft Sentinel permissions, see Roles and permissions in Microsoft Sentinel | Microsoft Learn and Manage access to Microsoft Sentinel data by resource | Microsoft Learn.
Onboard Microsoft Sentinel
To connect a workspace that has Microsoft Sentinel enabled to Defender XDR, complete the following steps:
Go to the Microsoft Defender portal and sign in.
In Microsoft Defender XDR, select Overview.
Select Connect a workspace.
Choose the workspace you want to connect and select Next.
Read and understand the product changes associated with connecting your workspace. These changes include:
- Log tables, queries, and functions in the Microsoft Sentinel workspace are also available in advanced hunting within Defender XDR.
- The Microsoft Sentinel Contributor role is assigned to the Microsoft Threat Protection and WindowsDefenderATP apps within the subscription.
- Active Microsoft security incident creation rules are deactivated to avoid duplicate incidents. This change only applies to incident creation rules for Microsoft alerts and not to other analytics rules.
- All alerts related to Defender XDR products are streamed directly from the main Defender XDR data connector to ensure consistency. Make sure you have incidents and alerts from this connector turned on in the workspace.
Select Connect.
After your workspace is connected, the banner on the Overview page shows that your unified security information and event management (SIEM) and extended detection and response (XDR) is ready. The Overview page is updated with new sections that include metrics from Microsoft Sentinel like the number of data connectors and automation rules.
Explore Microsoft Sentinel features in the Defender portal
After you connect your workspace to the Defender portal, Microsoft Sentinel is on the left-hand side navigation pane. Pages like Overview, Incidents, and Advanced Hunting have unified data from Microsoft Sentinel and Defender XDR. For more information about the unified capabilities and differences between portals, see Microsoft Sentinel in the Microsoft Defender portal.
Many of the existing Microsoft Sentinel features are integrated into the Defender portal. For these features, notice that the experience between Microsoft Sentinel in the Azure portal and Defender portal are similar. Use the following articles to help you start working with Microsoft Sentinel in the Defender portal. When using these articles, keep in mind that your starting point in this context is the Defender portal instead of the Azure portal.
- Search
- Threat management
- Visualize and monitor your data by using workbooks
- Conduct end-to-end threat hunting with Hunts
- Use hunting bookmarks for data investigations
- Use hunting Livestream in Microsoft Sentinel to detect threat
- Hunt for security threats with Jupyter notebooks
- Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file
- Work with threat indicators in Microsoft Sentinel
- Understand security coverage by the MITRE ATT&CK framework
- Content management
- Configuration
- Find your Microsoft Sentinel data connector
- Create custom analytics rules to detect threats
- Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel
- Create watchlists
- Manage watchlists in Microsoft Sentinel
- Create automation rules
- Create and customize Microsoft Sentinel playbooks from content templates
Find Microsoft Sentinel settings in the Defender portal under System > Settings > Microsoft Sentinel.
Offboard Microsoft Sentinel
You can only have one workspace connected to the Defender portal at a time. If you want to connect to a different workspace that has Microsoft Sentinel enabled, disconnect the current workspace and connect the other workspace.
Go to the Microsoft Defender portal and sign in.
In the Defender portal, under System, select Settings > Microsoft Sentinel.
On the Workspaces page, select the connected workspace and Disconnect workspace.
Provide a reason why you're disconnecting the workspace.
Confirm your selection.
When your workspace is disconnected, the Microsoft Sentinel section is removed from the left-hand side navigation of the Defender portal. Data from Microsoft Sentinel is no longer included on the Overview page.
If you want to connect to a different workspace, from the Workspaces page, select the workspace and Connect a workspace.