Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Microsoft Defender for Endpoint

MICROSOFT_DEFENDER_ENDPOINT

(Raw log telemetry)

JSON

CyberHub

Device Configuration

Please follow the steps below to enable raw log telemetry.

Prerequisites:

  1. An Azure subscription that you can sign in to.

  2. A user with either the Global Administrator or Microsoft Defender Advanced Threat Hunting Administrator role.

  3. Azure Storage Account to store the logs or an Event Hub to stream the logs. 

  4. Log in to your Azure tenant, navigate to Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights.

...

Parameters required from customer for Integration.

Via Azure Storage:

Property

Default Value

Description

Logging Source

N/A

Select Storage

eventHubConnectionString

N/A

N/A (keep blank)

consumerGroupName

N/A

N/A (keep blank)

Account Key

Custome value

Access Key to access storage account

Blob Container

N/A

Storage blob Container name

e.g.
insights-activity-logs

Storage Account Name

Custom Value

Azure storage account name

Subscription

N/A

Subscription ID that customer wants to be monitored

initialReadPolicy

N/A

Select Beginning to start reading from beginning and End to start reading logs from the end

Via Azure EventHub:

Property

Default Value

Description

Logging Source

N/A

Select EventHub

eventHubConnectionString

N/A

Event hub connection string

consumerGroupName

N/A

Optional and used if consumer Group is other than default

Account Key

Custom Value

Access Key to access storage account

Blob Container

N/A

Storage blob Container name

Storage Account Name

Custom Value

Azure storage account name

Subscription

N/A

Set EventHub name

initialReadPolicy

N/A

N/A (keep default selection)