What’s new: Microsoft 365 Defender connector now in Public Preview for Azure Sentinel

Published 11-09-2020 11:16 AM 9,619 Views
Microsoft

This installment is part of a broader series to keep you up to date with the latest features in Azure Sentinel. The installments will be bite-sized to enable you to easily digest the new content.

 

NOTE: Microsoft 365 Defender was formerly known as Microsoft Threat Protection or MTP. Microsoft Defender for Endpoint was formerly known as Microsoft Defender Advanced Threat Protection or MDATP.

 

We’re very pleased to announce that the public preview of the new Microsoft 365 Defender connector is now available, alongside a new Azure Sentinel benefit for Microsoft 365 E5 customers! The M365 Defender connector lets you stream advanced hunting logs - a type of raw event data - from Microsoft 365 Defender into Azure Sentinel. Click here to look at Microsoft documentation page on this connector.

 

With the integration of Microsoft Defender for Endpoint (MDATP) into the Microsoft 365 Defender security umbrella, you can now collect your Microsoft Defender for Endpoint advanced hunting events using the Microsoft 365 Defender connector, and stream them straight into new purpose-built tables in your Azure Sentinel workspace. These tables are built on the same schema that is used in the Microsoft 365 Defender portal, giving you complete access to the full set of advanced hunting logs, and allowing you to do the following:

 

  • Easily copy your existing Microsoft Defender ATP advanced hunting queries into Azure Sentinel.
  • Use the raw event logs to provide additional insights for your alerts, hunting, and investigation, and correlate events with data from additional data sources in Azure Sentinel.
  • Store the logs with increased retention, beyond Microsoft Defender for Endpoint or Microsoft 365 Defender’s default retention of 30 days. You can do so by configuring the retention of your workspace or by configuring per-table retention in Log Analytics.

2020-11-04_11-04-28.png

 

How to enable the Microsoft 365 Defender connector in Azure Sentinel

 

Prerequisites

  • You must have a valid license for Microsoft Defender for Endpoint, as described in Set up Microsoft Defender for Endpoint deployment.
  • Your user must be assigned the Global Administrator role on the tenant (in Azure Active Directory).

 

  1. From the Azure Sentinel navigation menu, select Data connectors.2020-09-07_13-51-38.png
  2. Select Microsoft 365 Defender from the data connectors gallery, and then select Open Connector Page on the preview pane.2020-11-04_11-02-11.png
  3. On the Microsoft 365 Defender connector page, under Connect events and Microsoft Defender for Endpoint tick the boxes for the types of logs you would like to be sent to Azure Sentinel and select Apply Changes.2020-11-04_11-04-28.png

 

And that’s it! You will now have Microsoft Defender for Endpoint logs connected to your Sentinel workspace.

 

 

A new Azure Sentinel benefit for Microsoft 365 E5 customers

 

With this new offer, you can take advantage of end-to-end integrated security and save significant costs when ingesting Microsoft 365 data into Azure Sentinel. From November 1, 2020 through May 1, 2021, Microsoft 365 E5 and Microsoft 365 E5 Security customers can receive a data grant of up to 100 MB per user/month to ingest Microsoft 365 data, including Microsoft 365 advanced hunting data (including Microsoft Defender for Endpoint logs) described in this blog. For more details, please visit the M365 E5 Sentinel benefit website.

 

 

Get started today!

 

Try out the new connector and let us know your feedback using any of the channels listed in the Resources.

 

You can also contribute new connectors, workbooks, analytics and more in Azure Sentinel. Get started now by joining the Azure Sentinel Threat Hunters GitHub community!

21 Comments
Occasional Contributor

Thank  you @Sarah_Young  .This is great to see the schema being exposed in Sentinel. 

Thank you for Sharing with the Community @Sarah_Young :cool:
Awesome!

Occasional Contributor

Thank you @Sarah_Young 

Contributor

Excellent work.

 

Thank you

Occasional Contributor

thanks for the info. I was getting used to the ATP terminologies and well MS came up with a simplified name. Thanks.

New Contributor

@Sarah_Young thanks for posting! Could anyone tell me if there are any cost benefits by implementing suite data connector in Sentinel instead of per product? Thank you!

 

Kind Regards,

Kerim Tupkovic

Microsoft

Hi @KerimTupkovic, could you explain what you mean by "suite data connector"?

Occasional Contributor

@Sarah_Young What @KerimTupkovic  meant by "suite data connector" is this new M365 Defender connector which supports all Defender products under one connector. Defender suite of products.

 

@KerimTupkovic  This new connector will not replace the individual Data connectors for all the four security solution under this new umbrella connector.

 

Microsoft 365 Defender (New Connector) : Is meant to collect advanced hunting logs only.

https://docs.microsoft.com/en-us/azure/sentinel/connect-microsoft-365-defender

 

While the individual connectors like Microsoft Defender for Endpoint / MDATP : 

These are for collecting the alerts alone

https://docs.microsoft.com/en-us/azure/sentinel/connect-microsoft-defender-advanced-threat-protectio...

 

@Sarah_Young I too was a bit confused initially as I thought that this would collect alerts too and so would replace the separate connector.

Maybe a good idea to update the post with a note on the above point, for those who don't reach the comments section :)

 

Also maybe as a feedback on the design of connectors why not bring in the option to have a checkbox with "Alerts" under the new connector and do away with multiple different connectors. One place to rule them all. :)

Established Member

That's very nice to have advanced hunting queries and raw logs to Azure Sentinel.

However, I am thinking that by bringing all your organization's "telemetry" to Log Analytics tables it would increase the cost extremely. Is it true or not?

 

Thank you,

Grigorios

Microsoft

@gregoval ingesting these logs will increase your ingestion rate on your Sentinel workspace, but by how much will depend on a number of factors. You can use our calculator to help estimate this. 

 

Also if you have E5 there is currently a benefit you can read more about - https://azure.microsoft.com/en-us/offers/sentinel-microsoft-365-offer/ 

 

Thanks!

Sarah

New Contributor

Hi @Sarah_Young , 
I apologies for the late reaction. Somehow my old response did not proceed. As @Joseph-Abraham mentioned is exactly what I was asking. I was confused because indeed the link Joseph shared states only about advanced hunting logs. So I was wondering about the alerts. I was asking this because I am currently implementing Azure Sentinel with different data connectors. But it is clear now.

I also have my questions about the pricing solved in case IF the alerts and advanced hunting logs would merge into the suites. Thank you very much for the quick response. Have a great day! 

 

Best Regards,
Kerim Tupkovic

 

PS: @Joseph-Abraham thank you for clarifying my question! 

New Contributor

Hi all,
Hereby a small update regarding the Defender suite connector questions above. Microsoft is updating the suite so that you will be able to see incidents and alerts. In some regions it's already available. See the screenshot below.

 

KerimTupkovic_0-1608025338913.png

 

 

Regards,

Kerim Tupkovic

Occasional Contributor

Thanks @KerimTupkovic for the update.

@Sarah_Young Could you please confirm if we can expect this to actually replace the individual connectors that fetch the alerts and incidents.

Microsoft

@Joseph-Abraham no, this will not replace the individual connectors that fetch alerts.

Frequent Visitor

Hello @Sarah_Young and @KerimTupkovic,

Can you share if there is any plan for a feature to clear/delete data such as logs, incidents, and alerts through the connector? This would be quite valuable for R&D, testing and training environments. Thanks.

Microsoft

Hello @CraigK_, did you mean clearing/deleting data from the product that originated the alert? You can do this using a LogicApp that will interact with the product's API. Here's an example for ASC:

 

Azure-Sentinel/Playbooks/Close-Incident-ASCAlert at master · Azure/Azure-Sentinel (github.com)

New Contributor

Hi @CraigK_ ,
You could also achieve this with a KQL query. For example, you could collect all Informationals and close them all in once with KQL query. Is this what you were asking? or did I get it wrong.

 

Also I don't know where you are located but there is an Sentinel update coming where you will be able to filter all alerts per severity (informationals, low, medium so on). I am currently stated in the Netherlands and for us it's not available jet. In USA it is I think. Please let me know if Sara or me were able to solve your question.

 

Best regards,

Kerim Tupkovic

Occasional Contributor

Once activated we are unable to deactivate the connector GUI or URI.  The connector is is not available through URI commands so we can not disable it that way either.

 

What is the process for disconnecting this?

 

Thanks!

Microsoft

@Lance_Peterson the process for disconnecting should be the same as any other Sentinel connector in the UI - unselect the log types and then hit "Apply Changes". If this button is greyed out this means you don't have permissions to add/remove connectors on the account you're using. 

 

If this doesn't help, I suggest you raise a support ticket so they can look into why you can't remove the connector.                 

Senior Member
Microsoft

Hi @RamonMunoz 

 

You are correct: incidents (including alerts and entities) are imported for free through the M365D connector, you only pay for log ingestion if you chose enable those logs being ingested.

%3CLINGO-SUB%20id%3D%22lingo-sub-1865651%22%20slang%3D%22en-US%22%3EWhat%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1865651%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20installment%20is%20part%20of%20a%20broader%20series%20to%20keep%20you%20up%20to%20date%20with%20the%20latest%20features%20in%20Azure%20Sentinel.%20The%20installments%20will%20be%20bite-sized%20to%20enable%20you%20to%20easily%20digest%20the%20new%20content.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CEM%3E%3CSTRONG%3ENOTE%3A%20Microsoft%20365%20Defender%20was%20formerly%20known%20as%20Microsoft%20Threat%20Protection%20or%20MTP.%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CEM%3E%3CSTRONG%3EMicrosoft%20Defender%20for%20Endpoint%20was%20formerly%20known%20as%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20or%20MDATP.%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20very%20pleased%20to%20announce%20that%20the%20public%20preview%20of%20the%20new%20Microsoft%20365%20Defender%20connector%20is%20now%20available%2C%20alongside%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fm365-sentinel-offer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ea%26nbsp%3Bnew%20Azure%20Sentinel%20benefit%20for%20Microsoft%20365%20E5%20customers%3C%2FA%3E!%20The%20M365%20Defender%20connector%20lets%20you%20stream%20advanced%20hunting%20logs%20-%20a%20type%20of%20raw%20event%20data%20-%20from%20Microsoft%20365%20Defender%20into%20Azure%20Sentinel.%20Click%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fconnect-microsoft-365-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20to%20look%20at%20Microsoft%20documentation%20page%20on%20this%20connector.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20the%20integration%20of%20Microsoft%20Defender%20for%20Endpoint%20(MDATP)%20into%20the%20Microsoft%20365%20Defender%20security%20umbrella%2C%20you%20can%20now%20collect%20your%20Microsoft%20Defender%20for%20Endpoint%20advanced%20hunting%20events%20using%20the%20Microsoft%20365%20Defender%20connector%2C%20and%20stream%20them%20straight%20into%20new%20purpose-built%20tables%20in%20your%20Azure%20Sentinel%20workspace.%20These%20tables%20are%20built%20on%20the%20same%20schema%20that%20is%20used%20in%20the%20Microsoft%20365%20Defender%20portal%2C%20giving%20you%20complete%20access%20to%20the%20full%20set%20of%20advanced%20hunting%20logs%2C%20and%20allowing%20you%20to%20do%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EEasily%20copy%20your%20existing%20Microsoft%20Defender%20ATP%20advanced%20hunting%20queries%20into%20Azure%20Sentinel.%3C%2FLI%3E%0A%3CLI%3EUse%20the%20raw%20event%20logs%20to%20provide%20additional%20insights%20for%20your%20alerts%2C%20hunting%2C%20and%20investigation%2C%20and%20correlate%20events%20with%20data%20from%20additional%20data%20sources%20in%20Azure%20Sentinel.%3C%2FLI%3E%0A%3CLI%3EStore%20the%20logs%20with%20increased%20retention%2C%20beyond%20Microsoft%20Defender%20for%20Endpoint%20or%20Microsoft%20365%20Defender%E2%80%99s%20default%20retention%20of%2030%20days.%20You%20can%20do%20so%20by%20configuring%20the%20retention%20of%20your%20workspace%20or%20by%20configuring%20per-table%20retention%20in%20Log%20Analytics.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222020-11-04_11-04-28.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232387iD8E0C5AD40470A53%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222020-11-04_11-04-28.png%22%20alt%3D%222020-11-04_11-04-28.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1210279921%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1210279893%22%20id%3D%22toc-hId--1209534929%22%3E%3CSTRONG%3EHow%20to%20enable%20the%20Microsoft%20365%20Defender%20connector%20in%20Azure%20Sentinel%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EPrerequisites%20%3C%2FEM%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CEM%3EYou%20must%20have%20a%20valid%20license%20for%20Microsoft%20Defender%20for%20Endpoint%2C%20as%20described%20in%20Set%20up%20Microsoft%20Defender%20for%20Endpoint%20deployment.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EYour%20user%20must%20be%20assigned%20the%20Global%20Administrator%20role%20on%20the%20tenant%20(in%20Azure%20Active%20Directory).%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EFrom%20the%20Azure%20Sentinel%20navigation%20menu%2C%20select%26nbsp%3B%3CSTRONG%3EData%20connectors%3C%2FSTRONG%3E.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-09-07_13-51-38.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232216i260FBE67298083E9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222020-09-07_13-51-38.png%22%20alt%3D%222020-09-07_13-51-38.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3ESelect%20%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%22%3EMicrosoft%20365%20Defender%3C%2FSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%20from%20the%20data%20connectors%20gallery%2C%20and%20then%20select%20%3C%2FSPAN%3E%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%22%3EOpen%20Connector%20Page%3C%2FSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%20on%20the%20preview%20pane.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-11-04_11-02-11.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232217i47D1398B65C84A0E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222020-11-04_11-02-11.png%22%20alt%3D%222020-11-04_11-02-11.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3EOn%20the%20%3CSTRONG%3EMicrosoft%20365%20Defender%3C%2FSTRONG%3E%20connector%20page%2C%20under%20%3CSTRONG%3EConnect%20events%20%3C%2FSTRONG%3Eand%3CSTRONG%3E%20Microsoft%20Defender%20for%20Endpoint%20%3C%2FSTRONG%3Etick%20the%20boxes%20for%20the%20types%20of%20logs%20you%20would%20like%20to%20be%20sent%20to%20Azure%20Sentinel%20and%20select%20%3CSTRONG%3EApply%20Changes.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222020-11-04_11-04-28.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232218i6D306B1805170FF3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%222020-11-04_11-04-28.png%22%20alt%3D%222020-11-04_11-04-28.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnd%20that%E2%80%99s%20it!%20You%20will%20now%20have%20Microsoft%20Defender%20for%20Endpoint%20logs%20connected%20to%20your%20Sentinel%20workspace.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1277232912%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277232940%22%20id%3D%22toc-hId-1277977904%22%3E%3CSTRONG%3EA%20new%20Azure%20Sentinel%20benefit%20for%20Microsoft%20365%20E5%20customers%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20this%20new%20offer%2C%20you%20can%20take%20advantage%20of%20end-to-end%20integrated%20security%20and%20save%20significant%20costs%20when%20ingesting%20Microsoft%20365%20data%20into%20Azure%20Sentinel.%20From%20November%201%2C%202020%20through%20May%201%2C%202021%2C%20Microsoft%20365%20E5%20and%20Microsoft%20365%20E5%20Security%20customers%20can%20receive%20a%20data%20grant%20of%20up%20to%20100%20MB%20per%20user%2Fmonth%20to%20ingest%20Microsoft%20365%20data%2C%20including%20Microsoft%20365%20advanced%20hunting%20data%20(including%20Microsoft%20Defender%20for%20Endpoint%20logs)%20described%20in%20this%20blog.%20For%20more%20details%2C%20please%20visit%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fm365-sentinel-offer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethe%20M365%20E5%20Sentinel%20benefit%20website%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--530221551%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--530221523%22%20id%3D%22toc-hId--529476559%22%3E%3CSTRONG%3EGet%20started%20to%3C%2FSTRONG%3E%3CSTRONG%3Eday!%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETry%20out%20the%20new%20connector%20and%20let%20us%20know%20your%20feedback%20using%20any%20of%20the%20channels%20listed%20in%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Sentinel%2Fwiki%23resources%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EResources%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20also%20contribute%20new%20connectors%2C%20workbooks%2C%20analytics%20and%20more%20in%20Azure%20Sentinel.%20Get%20started%20now%20by%20joining%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fthreathunters%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Sentinel%20Threat%20Hunters%20GitHub%20community!%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1865651%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20public%20preview%20of%20the%20new%20Microsoft%20365%20Defender%20connector%20is%20now%20available%2C%20alongside%20a%26nbsp%3Bnew%20Azure%20Sentinel%20benefit%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3Efor%20Microsoft%20365%20E5%20customers.%20This%20connector%20lets%20you%20stream%20advanced%20hunting%20logs%20-%20a%20type%20of%20raw%20event%20data%20-%20from%20Microsoft%20365%20Defender%20into%20Azure%20Sentinel.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22windows-defender-atp-banner-3.png%22%20style%3D%22width%3A%20550px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232388iB09E5EA3B92524D7%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22windows-defender-atp-banner-3.png%22%20alt%3D%22windows-defender-atp-banner-3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1865651%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDetection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EHunting%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInvestigation%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWhat's%20new%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1868615%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1868615%22%20slang%3D%22en-US%22%3E%3CP%3EThank%26nbsp%3B%20you%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3B%20.This%20is%20great%20to%20see%20the%20schema%20being%20exposed%20in%20Sentinel.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1870689%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1870689%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20Sharing%20with%20the%20Community%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Fhtml%2Fimages%2Femoticons%2Fcool_40x40.gif%22%20alt%3D%22%3Acool%3A%22%20title%3D%22%3Acool%3A%22%20%2F%3E%3CBR%20%2F%3EAwesome!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1872397%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1872397%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1879193%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1879193%22%20slang%3D%22en-US%22%3E%3CP%3Ethanks%20for%20the%20info.%20I%20was%20getting%20used%20to%20the%20ATP%20terminologies%20and%20well%20MS%20came%20up%20with%20a%20simplified%20name.%20Thanks.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1883084%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1883084%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F644375%22%20target%3D%22_blank%22%3E%40KerimTupkovic%3C%2FA%3E%2C%20could%20you%20explain%20what%20you%20mean%20by%20%22suite%20data%20connector%22%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1921853%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1921853%22%20slang%3D%22en-US%22%3E%3CP%3EThat's%20very%20nice%20to%20have%20advanced%20hunting%20queries%20and%20raw%20logs%20to%20Azure%20Sentinel.%3C%2FP%3E%3CP%3EHowever%2C%20I%20am%20thinking%20that%20by%20bringing%20all%20your%20organization's%20%22telemetry%22%20to%20Log%20Analytics%20tables%20it%20would%20increase%20the%20cost%20extremely.%20Is%20it%20true%20or%20not%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%2C%3C%2FP%3E%3CP%3EGrigorios%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1951625%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1951625%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3B%2C%26nbsp%3B%3CBR%20%2F%3EI%20apologies%20for%20the%20late%20reaction.%20Somehow%20my%20old%20response%20did%20not%20proceed.%20As%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F387181%22%20target%3D%22_blank%22%3E%40Joseph-Abraham%3C%2FA%3E%26nbsp%3Bmentioned%20is%20exactly%20what%20I%20was%20asking.%20I%20was%20confused%20because%20indeed%20the%20link%20Joseph%20shared%20states%20only%20about%20advanced%20hunting%20logs.%20So%20I%20was%20wondering%20about%20the%20alerts.%20I%20was%20asking%20this%20because%20I%20am%20currently%20implementing%20Azure%20Sentinel%20with%20different%20data%20connectors.%20But%20it%20is%20clear%20now.%3CBR%20%2F%3E%3CBR%20%2F%3EI%20also%20have%20my%20questions%20about%20the%20pricing%20solved%20in%20case%20IF%20the%20alerts%20and%20advanced%20hunting%20logs%20would%20merge%20into%20the%20suites.%20Thank%20you%20very%20much%20for%20the%20quick%20response.%20Have%20a%20great%20day!%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20Regards%2C%3CBR%20%2F%3EKerim%20Tupkovic%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPS%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F387181%22%20target%3D%22_blank%22%3E%40Joseph-Abraham%3C%2FA%3E%26nbsp%3Bthank%20you%20for%20clarifying%20my%20question!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1988407%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1988407%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20all%2C%3CBR%20%2F%3EHereby%20a%20small%20update%20regarding%20the%20Defender%20suite%20connector%20questions%20above.%20Microsoft%20is%20updating%20the%20suite%20so%20that%20you%20will%20be%20able%20to%20see%20incidents%20and%20alerts.%20In%20some%20regions%20it's%20already%20available.%20See%20the%20screenshot%20below.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22KerimTupkovic_0-1608025338913.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F240665iE95B4103C0EB4337%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22KerimTupkovic_0-1608025338913.png%22%20alt%3D%22KerimTupkovic_0-1608025338913.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3EKerim%20Tupkovic%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1872639%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1872639%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%20work.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2028421%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2028421%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F644375%22%20target%3D%22_blank%22%3E%40KerimTupkovic%3C%2FA%3E%26nbsp%3Bfor%20the%20update.%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3BCould%20you%20please%20confirm%20if%20we%20can%20expect%20this%20to%20actually%20replace%20the%20individual%20connectors%20that%20fetch%20the%20alerts%20and%20incidents.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2043640%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2043640%22%20slang%3D%22en-US%22%3E%3CP%3EHello%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F644375%22%20target%3D%22_blank%22%3E%40KerimTupkovic%3C%2FA%3E%2C%3C%2FP%3E%3CP%3ECan%20you%20share%20if%20there%20is%20any%20plan%20for%20a%20feature%20to%20clear%2Fdelete%20data%20such%20as%20logs%2C%20incidents%2C%20and%20alerts%20through%20the%20connector%3F%20This%20would%20be%20quite%20valuable%20for%20R%26amp%3BD%2C%20testing%20and%20training%20environments.%20Thanks.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2051849%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2051849%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F871789%22%20target%3D%22_blank%22%3E%40CraigK_%3C%2FA%3E%26nbsp%3B%2C%3CBR%20%2F%3EYou%20could%20also%20achieve%20this%20with%20a%20KQL%20query.%20For%20example%2C%20you%20could%20collect%20all%20Informationals%20and%20close%20them%20all%20in%20once%20with%20KQL%20query.%20Is%20this%20what%20you%20were%20asking%3F%20or%20did%20I%20get%20it%20wrong.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAlso%20I%20don't%20know%20where%20you%20are%20located%20but%20there%20is%20an%20Sentinel%20update%20coming%20where%20you%20will%20be%20able%20to%20filter%20all%20alerts%20per%20severity%20(informationals%2C%20low%2C%20medium%20so%20on).%20I%20am%20currently%20stated%20in%20the%20Netherlands%20and%20for%20us%20it's%20not%20available%20jet.%20In%20USA%20it%20is%20I%20think.%20Please%20let%20me%20know%20if%20Sara%20or%20me%20were%20able%20to%20solve%20your%20question.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%2C%3C%2FP%3E%3CP%3EKerim%20Tupkovic%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2080862%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2080862%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F578735%22%20target%3D%22_blank%22%3E%40Lance_Peterson%3C%2FA%3E%26nbsp%3Bthe%20process%20for%20disconnecting%20should%20be%20the%20same%20as%20any%20other%20Sentinel%20connector%20in%20the%20UI%20-%20unselect%20the%20log%20types%20and%20then%20hit%20%22Apply%20Changes%22.%20If%20this%20button%20is%20greyed%20out%20this%20means%20you%20don't%20have%20permissions%20to%20add%2Fremove%20connectors%20on%20the%20account%20you're%20using.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20this%20doesn't%20help%2C%20I%20suggest%20you%20raise%20a%20support%20ticket%20so%20they%20can%20look%20into%20why%20you%20can't%20remove%20the%20connector.%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1880082%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1880082%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F538161%22%20target%3D%22_blank%22%3E%40Sarah_Young%3C%2FA%3E%26nbsp%3Bthanks%20for%20posting!%20Could%20anyone%20tell%20me%20if%20there%20are%20any%20cost%20benefits%20by%20implementing%20%3CSTRONG%3Esuite%20data%20connector%3C%2FSTRONG%3E%20in%20Sentinel%20instead%20of%20%3CSTRONG%3Eper%20product%3C%2FSTRONG%3E%3F%20Thank%20you!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EKind%20Regards%2C%3C%2FP%3E%3CP%3EKerim%20Tupkovic%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2198902%22%20slang%3D%22en-US%22%3ERe%3A%20What%E2%80%99s%20new%3A%20Microsoft%20365%20Defender%20connector%20now%20in%20Public%20Preview%20for%20Azure%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2198902%22%20slang%3D%22en-US%22%3E%3CDIV%20class%3D%22fxc-gc-row%20fxc-gc-row_3%20azc-br-muted%20fxs-portal-hover%22%3E%3CDIV%20class%3D%22fxc-gc-row-footer%20fxc-gc-row-footert_3%22%3E%3CP%3EHi%2C%20I%20am%20also%20worried%20about%20the%20cost%20of%20the%20data%20ingestion.%3C%2FP%3E%3CP%3EAs%20far%20as%20I%20understand%20you%20can%20enable%20the%20connector%20but%20let%20the%20different%20log%20sources%20disabled%3C%2FP%3E%3CP%3EDeviceInfo%20-%26nbsp%3BMachine%20information%20(including%20OS%20information)%3CBR%20%2F%3EDeviceNetworkInfo%20-%26nbsp%3BNetwork%20properties%20of%20machines%3CBR%20%2F%3EDeviceProcessEvents%20-%26nbsp%3BProcess%20creation%20and%20related%20events%3CBR%20%2F%3EDeviceNetworkEvents%20-%26nbsp%3BNetwork%20connection%20and%20related%20events%3CBR%20%2F%3EDeviceFileEvents%20-%26nbsp%3BFile%20creation%2C%20modification%2C%20and%20other%20file%20system%20events%3CBR%20%2F%3EDeviceRegistryEvents%20-%26nbsp%3BCreation%20and%20modification%20of%20registry%20entries%3CBR%20%2F%3EDeviceLogonEvents%20-%26nbsp%3BSign-ins%20and%20other%20authentication%20events%3CBR%20%2F%3EDeviceImageLoadEvents%20-%26nbsp%3BDLL%20loading%20events%3CBR%20%2F%3EDeviceEvents%20-%26nbsp%3BAdditional%20events%20types%3CBR%20%2F%3EDeviceFileCertificateInfo%20-%26nbsp%3BCertificate%20information%20of%20signed%20files%3C%2FP%3E%3CP%3EThis%20should%20give%20you%20the%20Alert%20grouping%20and%20incident%20sync%20but%20will%20not%20add%20additional%26nbsp%3Bcosts%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3E(If%20i%20am%20wrong%20please%20correct%20me)%3CBR%20%2F%3EThe%20pricing%20is%20confusing%20and%20adding%20things%20like%20%22temporal%20offers%22%20with%20discounts%20for%20X%20months%2C%20do%20not%20help.%3C%2FP%3E%3C%2FDIV%3E%3CDIV%20class%3D%22fxc-gc-row-footer%20fxc-gc-row-footert_3%22%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%20class%3D%22fxc-gc-row-footer%20fxc-gc-row-footert_3%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Nov 09 2020 11:18 AM
Updated by: