Forum Discussion
SecurityAlert (MDATP) showing disable and we are not receiving logs In sentinel from M365 Defender
elieelkarkafi yes as you can see i have already created this but unfortunately didnt get any logs . i have tried every possible way but all in vain
Humza_Bukhari did you verified the permissions as well?
try to run the below query on your analytic workspace to see if there is any logs ingested from defender
let Now = now();
(range TimeGenerated from ago(14d) to Now-1d step 1d
| extend Count = 0
| union isfuzzy=true (
SecurityIncident
| where ProviderName == "Microsoft 365 Defender"
| summarize Count = count() by bin_at(TimeGenerated, 1d, Now)
)
| summarize Count=max(Count) by bin_at(TimeGenerated, 1d, Now)
| sort by TimeGenerated
| project Value = iff(isnull(Count), 0, Count), Time = TimeGenerated, Legend = "Events")
| render timechart
- Oct 18, 2023
LauriK000 thats means you have data ingested to the your analytics workspace through the connector . did you try to simulate an alert in MDE to check if your will get an incident created in MDE ? Dont forget to enable the Analytic rule to trigger incidents
- LauriK000Oct 18, 2023Copper Contributor
- Humza_BukhariSep 26, 2023Copper Contributorokay elieelkarkafi thank you for your support
- Sep 26, 2023if you configured and checked all the above option and you triggered an alert and still no data ingested to sentinel to MDE , than you have something wrong in the backend and the only way is to contact the Microsoft security support team to check your tenant
- Humza_BukhariSep 26, 2023Copper ContributorPlease guide me how can i get these logs into the sentinel.
- Humza_BukhariSep 26, 2023Copper Contributor
elieelkarkafi hi bro, i have configured and connect the data connector of defender with microsoft sentinel but i am still unable to receive these data
- Humza_BukhariSep 22, 2023Copper Contributorokay i have tried this , lets c what happened and will update you
- Sep 22, 2023
Humza_Bukhari ok let's do this exercise, from one of your devices onboarded to MDE create a malicious test file using the below link, save it as EICAR.com on the desktop and let MDE catch it and remediate it and check the alerts in the portal and keep an eye at the same time in Sentinel to see if this will trigger the signal
How to Create a Malicious Test File (EICAR) - Carbon Black Community
- Humza_BukhariSep 22, 2023Copper Contributor
elieelkarkafi yes i have verified the permissions i have . plus this is what i get response by running this query which you provide .