New

The executive guide to generative AI

Read more
Loading

M365 Defender integration

Version 3.2.0 (View all)
Compatible Kibana version(s) 8.18.0 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

The Microsoft 365 Defender integration allows you to monitor Alert, Incident (Microsoft Graph Security API) and Event (Streaming API) Logs. Microsoft 365 Defender is a unified pre and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.

Use the Microsoft 365 Defender integration to collect and parse data from the Microsoft Azure Event Hub, and the Microsoft Graph Security v1.0 REST API. Then visualise that data in Kibana.

For example, you could use the data from this integration to consolidate and correlate security alerts from multiple sources. Also, by looking into the alert and incident, a user can take an appropriate action in the Microsoft 365 Defender Portal.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

The Microsoft 365 Defender integration collects logs for three types of events: Alert, Event, and Incident.

Alert: This data streams leverages the Microsoft Graph Security API to collect alerts including suspicious activities in a customer's tenant that Microsoft or partner security providers have identified and flagged for action.

Event (Recommended): This data stream leverages the M365 Defender Streaming API to collect Alert, Device, Email, App and Identity Events. Events are streamed to an Azure Event Hub. For a list of Supported Events exposed by the Streaming API and supported by Elastic's integration, please see Microsoft's documentation here.

Incidents and Alerts (Recommended): This data streams leverages the Microsoft Graph Security API to ingest a collection of correlated alert instances and associated metadata that reflects the story of an attack in M365D. Incidents stemming from Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Purview Data Loss Prevention are supported by this integration.

You need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.

This module has used Microsoft Azure Event Hub for Streaming Event, and Microsoft Graph Security v1.0 REST API for Incident data stream.

For Event, using filebeat's Azure Event Hub input, state such as leases on partitions and checkpoints in the event stream are shared between receivers using an Azure Storage container. For this reason, as a prerequisite to using this input, users will have to create or use an existing storage account.

  • Supported Microsoft 365 Defender streaming event types have been supported in the current integration version:

    Resource types Description
    AlertEvidence Files, IP addresses, URLs, users, or devices associated with alerts.
    AlertInfo Alerts from M365 Defender XDR services, including severity and threat categorization.
    DeviceEvents Event types, including events triggered by security controls.
    DeviceFileCertificateInfo Certificate information of signed files obtained from certificate verification events on endpoints.
    DeviceFileEvents File creation, modification, and other file system events.
    DeviceImageLoadEvents DLL loading events.
    DeviceInfo Machine information, including OS information.
    DeviceLogonEvents Sign-ins and other authentication events on devices.
    DeviceNetworkEvents Network connection and related events.
    DeviceNetworkInfo Network properties of devices, as well as connected networks and domains.
    DeviceProcessEvents Process creation and related events.
    DeviceRegistryEvents Creation and modification of registry entries.
    EmailAttachmentInfo Information about files attached to emails.
    EmailEvents Microsoft 365 email events, including email delivery and blocking events.
    EmailPostDeliveryEvents Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox.
    EmailUrlInfo Information about URLs in emails.
    IdentityInfo Account information from various sources, including Microsoft Entra ID.
    IdentityLogonEvents Authentication events on Active Directory and Microsoft online services.
    IdentityQueryEvents Queries for Active Directory objects, such as users, groups, devices, and domains.
    IdentityDirectoryEvents Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller.
    CloudAppEvents Events involving accounts and objects in Office 365 and other cloud apps and services.
    UrlClickEvent Safe Links clicks from email messages, Teams, and Office 365 apps.
  1. Configure Microsoft 365 Defender to stream Advanced Hunting events to your Azure Event Hub.
  1. Register a new Azure Application.
  2. Permission required for accessing Incident API would be SecurityIncident.Read.All. See more details here
  3. After the application has been created, it will generate Client ID, Client Secret and Tenant ID values that are required for alert and incident data collection.

This is the alert dataset.

This is the event dataset.

This is the incident dataset.