Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

You can use the threat-hunting queries to build custom detection rules. These rules run automatically to check for and then respond to suspected breach activity, misconfigured machines, and other findings.

Device Information

 Entity

Particulars

Vendor Name

Microsoft

Product Name

Defender Advanced Threat Hunting

Type of Device

Cloud

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Microsoft Defender for Endpoint

MICROSOFT_DEFENDER_ENDPOINT

(Raw log telemetry)

JSON

CyberHub

Device Configuration

Please follow the steps below to enable raw log telemetry.

Prerequisites:

  1. An Azure subscription that you can sign in to.

  2. A user who's a with either the Global Administrator or Microsoft or Microsoft Defender Advanced Threat Hunting Administrator Hunting Administrator role.

  3. Azure Storage Account to store the logs or an Event Hub to stream the logs. 

  4. Log in to your Azure tenant, go navigate to Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights.

Reference URLs

How to create storage account: https://docs.microsoft.com/en-us/azure/storage/common/storage-account-create?tabs=azure-portal

How to configure Event Hub: https://docs.microsoft.com/en-us/azure/event-hubs/event-hubs-create

Enable To enable raw data streaming

  1. Log in to Microsoft Defender for Endpoint portal as a Global Administrator or Security Administrator.

  2. Go Navigate to Data export settings page on Microsoft Defender Security Center.

  3. Click on Add data export settings.

  4. Choose a name for your new settings.

  5. As per customer requirement, either you can store logs in Storage Account or stream the logs to Event Hub.

A. Archive To archive to a storage account

  1. Choose Forward events to Azure Storage.

  2. Type your Storage Account Resource ID. In order to get your Storage Account Resource ID, go navigate to your Storage account page on Azure portal > properties tab > copy the text under Storage account resource ID.

...

  1. Choose the events you want to stream and click Save.

...

Each blob contains multiple rows. Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "properties". For more information about the schema of Microsoft Defender for Endpoint events, see Advanced Hunting overview. In Advanced Hunting, the DeviceInfo table has a column named MachineGroup which contains the group of the device. Here every event will be decorated with this column as well. See Device Groups for more information.

B. To Stream logs to an event hub

...

Parameters required from customer for Integration.

Via Azure Storage:

Hostname or IP address of the device which forwards logs to the CyberHub

Property

Default Value

Description

IP Address

Microsoft Defender Advanced Threat Hunting interface IP address

Logging Source

N/A

Select Storage

eventHubConnectionString

N/A

N/A (keep blank)

consumerGroupName

N/A

N/A (keep blank)

Account Key

Custome value

Access Key to access storage account

Blob Container

N/A

Storage blob Container name

e.g.
insights-activity-logs

Storage Account Name

Custom Value

Azure storage account name

Subscription

N/A

Subscription ID that customer wants to be monitored

initialReadPolicy

N/A

Select Beginning to start reading from beginning and End to start reading logs from the end

Via Azure EventHub:

Property

Default Value

Description

Logging Source

N/A

Select EventHub

eventHubConnectionString

N/A

Event hub connection string

consumerGroupName

N/A

Optional and used if consumer Group is other than default

Account Key

Custom Value

Access Key to access storage account

Blob Container

N/A

Storage blob Container name

Storage Account Name

Custom Value

Azure storage account name

Subscription

N/A

Set EventHub name

initialReadPolicy

N/A

N/A (keep default selection)