Tenant-based Microsoft Defender for Cloud (Preview) connector for Microsoft Sentinel
Microsoft Defender for Cloud is a security management tool that allows you to detect and quickly respond to threats across Azure, hybrid, and multi-cloud workloads. This connector allows you to stream your MDC security alerts from Microsoft 365 Defender into Microsoft Sentinel, so you can can leverage the advantages of XDR correlations connecting the dots across your cloud resources, devices and identities and view the data in workbooks, queries and investigate and respond to incidents. For more information, see the Microsoft Sentinel documentation.
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Log Analytics table(s) | SecurityAlert(ASC) |
Data collection rules support | Not currently supported |
Supported by | Microsoft Corporation |
Query samples
All logs
SecurityAlert
| where ProductName == "Azure Security Center"
| sort by TimeGenerated
Summarize by severity
SecurityAlert
| where ProductName == "Azure Security Center"
| summarize count() by AlertSeverity
Vendor installation instructions
Connect Tenant-based Microsoft Defender for Cloud to Microsoft Sentinel
After connecting this connector, all your Microsoft Defender for Cloud subscriptions' alerts will be sent to this Microsoft Sentinel workspace.
Your Microsoft Defender for Cloud alerts are connected to stream through the Microsoft 365 Defender. To benefit from automated grouping of the alerts into incidents, connect the Microsoft 365 Defender incidents connector. Incidents can be viewed in the incidents queue.
Next steps
For more information, go to the related solution in the Azure Marketplace.