<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/ct-p/microsoft-defender-xdr</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Thu, 16 Apr 2026 00:22:59 GMT</pubDate>
    <dc:creator>microsoft-defender-xdr</dc:creator>
    <dc:date>2026-04-16T00:22:59Z</dc:date>
    <item>
      <title>Microsoft Sentinel MCP Entity Analyzer: Explainable risk analysis for URLs and identities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/microsoft-sentinel-mcp-entity-analyzer-explainable-risk-analysis/m-p/4511606#M2664</link>
      <description>&lt;P class="lia-align-justify"&gt;What makes this release important is not just that it adds another AI feature to Sentinel. It changes the implementation model for enrichment and triage. Instead of building and maintaining a chain of custom playbooks, KQL lookups, threat intel checks, and entity correlation logic, SOC teams can call a single analyzer that returns a reasoned verdict and supporting evidence. Microsoft positions the analyzer as available through Sentinel MCP server connections for agent platforms and through Logic Apps for SOAR workflows, which makes it useful both for interactive investigations and for automated response pipelines.&lt;/P&gt;&lt;img /&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Why this matters&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;First, it formalizes Entity Analyzer as a production feature rather than a preview experiment. Second, it introduces a real cost model, which means organizations now need to govern usage instead of treating it as a free enrichment helper. Third, Microsoft’s documentation is now detailed enough to support repeatable implementation patterns, including prerequisites, limits, required tables, Logic Apps deployment, and cost behavior.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;From a SOC engineering perspective, Entity Analyzer is interesting because it focuses on explainability. Microsoft describes the feature as generating clear, explainable verdicts for URLs and user identities by analyzing multiple modalities, including threat intelligence, prevalence, and organizational context. That is a much stronger operational model than simple point-enrichment because it aims to return an assessment that analysts can act on, not just more raw evidence&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;What Entity Analyzer actually does&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;The Entity Analyzer tools are described as AI-powered tools that analyze data in the Microsoft Sentinel data lake and provide a verdict plus detailed insights on URLs, domains, and user entities. Microsoft explicitly says these tools help eliminate the need for manual data collection and complex integrations usually required for investigation and enrichment&lt;/P&gt;&lt;P class="lia-align-justify"&gt;hat positioning is important. In practice, many SOC teams have built enrichment playbooks that fetch sign-in history, query TI feeds, inspect click data, read watchlists, and collect relevant alerts. Those workflows work, but they create maintenance overhead and produce inconsistent analyst experiences. Entity Analyzer centralizes that reasoning layer.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;For user entities, Microsoft’s preview architecture explains that the analyzer retrieves sign-in logs, security alerts, behavior analytics, cloud app events, identity information, and Microsoft Threat Intelligence, then correlates those signals and applies AI-based reasoning to produce a verdict. Microsoft lists verdict examples such as &lt;STRONG&gt;Compromised&lt;/STRONG&gt;, &lt;STRONG&gt;Suspicious activity found&lt;/STRONG&gt;, and &lt;STRONG&gt;No evidence of compromise&lt;/STRONG&gt;, and also warns that AI-generated content may be incorrect and should be checked for accuracy.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;That warning matters. The right way to think about Entity Analyzer is not “automatic truth,” but “high-value, explainable triage acceleration.” It should reduce analyst effort and improve consistency, while still fitting into human review and response policy.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Under the hood: the implementation model&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;Technically, Entity Analyzer is delivered through the &lt;STRONG&gt;Microsoft Sentinel MCP data exploration tool collection&lt;/STRONG&gt;. Microsoft documents that entity analysis is asynchronous: you start analysis, receive an identifier, and then poll for results. The docs note that analysis may take a few minutes and that the retrieval step may need to be run more than once if the internal timeout is not enough for long operations.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;That design has two immediate implications for implementers.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;First, this is not a lightweight synchronous enrichment call you should drop carelessly into every automation branch. Second, any production workflow should include retry logic, timeouts, and concurrency controls. If you ignore that, you will create fragile playbooks and unnecessary SCU burn.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;The supported access path for the data exploration collection requires Microsoft Sentinel data lake and one of the supported MCP-capable platforms. Microsoft also states that access to the tools is supported for identities with at least Security Administrator, Security Operator, or Security Reader. The data exploration collection is hosted at the Sentinel MCP endpoint, and the same documentation notes additional Entity Analyzer roles related to Security Copilot usage.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;The prerequisite many teams will miss&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;The most important prerequisite is easy to overlook: &lt;STRONG&gt;Microsoft Sentinel data lake is required&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;This is more than a licensing footnote. It directly affects data quality, analyzer usefulness, and rollout success. If your organization has not onboarded the right tables into the data lake, Entity Analyzer will either fail or return reduced-confidence output.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;For user analysis,&amp;nbsp; the following tables are required to ensure accuracy: AlertEvidence, SigninLogs, CloudAppEvents, and IdentityInfo. also notes that IdentityInfo depends on Defender for Identity, Defender for Cloud Apps, or Defender for Endpoint P2 licensing. The analyzer works best with AADNonInteractiveUserSignInLogs and BehaviorAnalytics as well.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;For URL analysis,&amp;nbsp; the analyzer works best with EmailUrlInfo, UrlClickEvents, ThreatIntelIndicators, Watchlist, and DeviceNetworkEvents. If those tables are missing, the analyzer returns a disclaimer identifying the missing sources&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;A practical architecture view&lt;/H2&gt;&lt;/DIV&gt;&lt;OL class="lia-align-justify"&gt;&lt;LI&gt;An incident, hunting workflow, or analyst identifies a high-interest URL or user.&lt;/LI&gt;&lt;LI&gt;A Sentinel MCP client or Logic App calls Entity Analyzer.&lt;/LI&gt;&lt;LI&gt;Entity Analyzer queries relevant Sentinel data lake sources and correlates the findings.&lt;/LI&gt;&lt;LI&gt;AI reasoning produces a verdict, evidence narrative, and recommendations.&lt;/LI&gt;&lt;LI&gt;The result is returned to the analyst, incident record, or automation workflow for next-step action.&lt;/LI&gt;&lt;/OL&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;This model is especially valuable because it collapses a multi-query, multi-tool investigation pattern into a single explainable decisioning step.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Where it fits in real Sentinel operations&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;Entity Analyzer is not a replacement for analytics rules, UEBA, or threat intelligence. It is a force multiplier for them.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;For identity triage, it fits naturally after incidents triggered by sign-in anomaly detections, UEBA signals, or Defender alerts because it already consumes sign-in logs, cloud app events, and behavior analytics as core evidence sources. For URL triage, it complements phishing and click-investigation workflows because it uses TI, URL activity, watchlists, and device/network context.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Implementation path 1: MCP clients and security agents&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;Microsoft states that Entity Analyzer integrates with agents through Sentinel MCP server connections to first-party and third-party AI runtime platforms. In practice, this makes it attractive for analyst copilots, engineering-side investigation agents, and guided triage experiences&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;The benefit of this model is speed. A security engineer or analyst can invoke the analyzer directly from an MCP-capable client without building a custom orchestration layer. The tradeoff is governance: once you make the tool widely accessible, you need a clear policy for who can run it, when it should be used, and how results are validated before action is taken.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Implementation path 2: Logic Apps and SOAR playbooks&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;For SOC teams, Logic Apps is likely the most immediately useful deployment model. Microsoft documents an &lt;STRONG&gt;entity analyzer&lt;/STRONG&gt; action inside the Microsoft Sentinel MCP tools connector and provides the required parameters for adding it to an existing logic app. These include:&lt;/P&gt;&lt;UL class="lia-align-justify"&gt;&lt;LI&gt;Workspace ID&lt;/LI&gt;&lt;LI&gt;Look Back Days&lt;/LI&gt;&lt;LI&gt;Properties payload for either URL or User&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-align-justify"&gt;The documented payloads are straightforward:&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN lia-align-justify"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.913%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;"entityType": "Url",&lt;/P&gt;&lt;P&gt;"url": "[URL]"&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;And&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN lia-align-justify"&gt;&lt;table border="1" style="width: 100%; height: 35px; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.913%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr style="height: 35px;"&gt;&lt;td style="height: 35px;"&gt;&lt;P&gt;{&lt;/P&gt;&lt;P&gt;"entityType": "User",&lt;/P&gt;&lt;P&gt;"userId": "[Microsoft Entra object ID or User Principal Name]"&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Also states that the connector supports Microsoft Entra ID, service principals, and managed identities, and that the Logic App identity requires Security Reader to operate.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;This makes playbook integration a strong pattern for incident enrichment. A high-severity incident can trigger a playbook, extract entities, invoke Entity Analyzer, and post the verdict back to the incident as a comment or decision artifact.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;The concurrency lesson most people will learn the hard way&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;Unusually direct guidance on concurrency: to avoid timeouts and threshold issues, turn on Concurrency control in Logic Apps loops and start with a degree of parallelism of &lt;STRONG&gt;. The data exploration doc repeats the same guidance, stating that running multiple instances at once can increase latency and recommending starting with a maximum of five concurrent analyses.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;This is a strong indicator that the correct implementation pattern is &lt;STRONG&gt;selective analysis&lt;/STRONG&gt;, not blanket analysis. Do not analyze every entity in every incident. Analyze the entities that matter most:&lt;/P&gt;&lt;UL class="lia-align-justify"&gt;&lt;LI&gt;external URLs in phishing or delivery chains&lt;/LI&gt;&lt;LI&gt;accounts tied to high-confidence alerts&lt;/LI&gt;&lt;LI&gt;entities associated with high-severity or high-impact incidents&lt;/LI&gt;&lt;LI&gt;suspicious users with multiple correlated signals&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-align-justify"&gt;That keeps latency, quota pressure, and SCU consumption under control.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;KQL still matters&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;Entity Analyzer does not eliminate KQL. It changes where KQL adds value.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Before running the analyzer, KQL is still useful for scoping and selecting the right entities. After the analyzer returns, KQL is useful for validation, deeper hunting, and building custom evidence views around the analyzer’s verdict.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;For example, a simple sign-in baseline for a target user:&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN lia-align-justify"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.913%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;let TargetUpn = "email address removed for privacy reasons";&lt;/P&gt;&lt;P&gt;SigninLogs&lt;/P&gt;&lt;P&gt;| where TimeGenerated between (ago(7d) .. now())&lt;/P&gt;&lt;P&gt;| where UserPrincipalName == TargetUpn&lt;/P&gt;&lt;P&gt;| summarize&lt;/P&gt;&lt;P&gt;Total=count(),&lt;/P&gt;&lt;P&gt;Failures=countif(ResultType != "0"),&lt;/P&gt;&lt;P&gt;Successes=countif(ResultType == "0"),&lt;/P&gt;&lt;P&gt;DistinctIPs=dcount(IPAddress),&lt;/P&gt;&lt;P&gt;Apps=make_set(AppDisplayName, 20)&lt;/P&gt;&lt;P&gt;by bin(TimeGenerated, 1d)&lt;/P&gt;&lt;P&gt;| order by TimeGenerated desc&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;And a lightweight URL prevalence check:&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN lia-align-justify"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.913%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;let TargetUrl = "omicron-obl.com";&lt;/P&gt;&lt;P&gt;UrlClickEvents&lt;/P&gt;&lt;P&gt;| where TimeGenerated between (ago(7d) .. now())&lt;/P&gt;&lt;P&gt;| search TargetUrl&lt;/P&gt;&lt;P&gt;| take 50&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Cost, billing, and governance&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;GA is where technical excitement meets budget reality.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Microsoft’s Sentinel billing documentation says there is no extra cost for the MCP server interface itself. However, for Entity Analyzer, customers are charged for the SCUs used for AI reasoning and also for the KQL queries executed against the Microsoft Sentinel data lake. Microsoft further states that existing Security Copilot entitlements apply&lt;/P&gt;&lt;P class="lia-align-justify"&gt;The April 2026 “What’s new” entry also explicitly says that starting April 1, 2026, customers are charged for the SCUs required when using Entity Analyzer.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;That means every rollout should include a governance plan:&lt;/P&gt;&lt;UL class="lia-align-justify"&gt;&lt;LI&gt;define who can invoke the analyzer&lt;/LI&gt;&lt;LI&gt;decide when playbooks are allowed to call it&lt;/LI&gt;&lt;LI&gt;monitor SCU consumption&lt;/LI&gt;&lt;LI&gt;limit unnecessary repeat runs&lt;/LI&gt;&lt;LI&gt;preserve results in incident records so you do not rerun the same analysis within a short period&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-align-justify"&gt;Microsoft’s MCP billing documentation also defines service limits: &lt;STRONG&gt;200 total runs per hour&lt;/STRONG&gt;, &lt;STRONG&gt;500 total runs per day&lt;/STRONG&gt;, and &lt;STRONG&gt;around 15 concurrent runs every five minutes&lt;/STRONG&gt;, with analysis results available for &lt;STRONG&gt;one hour&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Those are not just product limits. They are design requirements.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Limitations you should state clearly&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;The analyze_user_entity supports a maximum time window of seven days and only works for users with a Microsoft Entra object ID. On-premises Active Directory-only users are not supported for user analysis. Microsoft also says Entity Analyzer results expire after one hour and that the tool collection currently supports English prompts only.&lt;/P&gt;&lt;DIV class="lia-align-justify"&gt;&lt;H2&gt;Recommended rollout pattern&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="lia-align-justify"&gt;If I were implementing this in a production SOC, I would phase it like this:&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Start with a narrow set of high-value use cases, such as suspicious user identities and phishing-related URLs. Confirm that the required tables are present in the data lake. Deploy a Logic App enrichment pattern for incident-triggered analysis. Add concurrency control and retry logic. Persist returned verdicts into incident comments or case notes. Then review SCU usage and analyst value before expanding coverage.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 13:45:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/microsoft-sentinel-mcp-entity-analyzer-explainable-risk-analysis/m-p/4511606#M2664</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-04-15T13:45:20Z</dc:date>
    </item>
    <item>
      <title>Monthly news -  April 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-april-2026/ba-p/4508050</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Monthly news - April 2026 Edition&lt;/P&gt;
&lt;P&gt;This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from March 2026. We are now including news related to Defender for Cloud in the Defender portal. For all other Defender for Cloud news, have a look at the dedicated Defender for Cloud Monthly News&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/microsoft-defender-for-cloud-customer-newsletter/4491637" target="_blank" rel="noopener" data-lia-auto-title="here" data-lia-auto-title-active="0"&gt;here&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;🚀 New Virtual Ninja Show episode:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/live/sCv_iPAxMBY?si=PvnM_k5dZ6JMQb-J" target="_blank" rel="noopener"&gt;New skills in Microsoft Defender&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/live/Uf1bMc4vVKY?si=Tfs07p3YLeQOo6AE" target="_blank" rel="noopener"&gt;Autonomous AI Agents in Microsoft Defender&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://youtu.be/xJTw_Q2WVD8?si=5x9fbSZ2zW16jJ1h" target="_blank" rel="noopener"&gt; Beyond KQL: Unlocking SOC Insights with Sentinel data lake Jupyter Notebooks&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://youtu.be/-Mi-Rw3zCE0?si=p7lKt-rTxcggplW5" target="_blank" rel="noopener"&gt; Extending Attack Disruption beyond Microsoft: third‑party signals in action&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://youtu.be/5ZrrhPgzLn0?si=IqNidWLE-vfK0htV" target="_blank" rel="noopener"&gt; A new home for Microsoft Defender for Cloud&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;RSA blog posts:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/security-copilot-in-defender-empowering-the-soc-with-assistive-and-autonomous-ai/4503047" target="_blank" rel="noopener"&gt;Security Copilot in Defender: empowering the SOC with assistive and autonomous AI&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/rsa-2026-what%E2%80%99s-new-in-microsoft-defender/4503046" target="_blank" rel="noopener"&gt;RSA 2026: What’s new in Microsoft Defender?&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Actionable threat insights&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/" target="_blank"&gt;Inside an AI‑enabled device code phishing campaign&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/" target="_blank"&gt;Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/04/02/cookie-controlled-php-webshells-tradecraft-linux-hosting-environments/" target="_blank"&gt;Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/" target="_blank"&gt;Mitigating the Axios npm supply chain compromise&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;We’re introducing &lt;STRONG&gt;a chat experience for Security Copilot directly within Microsoft Defender&lt;/STRONG&gt;. Copilot is already embedded across Microsoft Defender experiences today, but now you can interact with it through an ongoing, two-way conversation. Ask questions, explore hypotheses, and follow your investigation threads across incidents, alerts, identities, devices, IPs, and other evidence. Read more about it in this &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/security-copilot-in-defender-empowering-the-soc-with-assistive-and-autonomous-ai/4503047" target="_blank" rel="noopener" data-lia-auto-title="blog post" data-lia-auto-title-active="0"&gt;blog post&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;We are &lt;STRONG&gt;expanding agentic triage to identity and cloud alerts&lt;/STRONG&gt; - bringing triage for phish, identity and cloud together within a single agent. &lt;STRONG&gt;The Security Alert Triage Agent &lt;/STRONG&gt;helps you autonomously determine whether these alerts represent real threats or false alarms, delivering natural language findings and transparent, step-by-step decision analysis.&amp;nbsp;Read more about it in this &lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/security-copilot-in-defender-empowering-the-soc-with-assistive-and-autonomous-ai/4503047" target="_blank" rel="noopener" data-lia-auto-title="blog post" data-lia-auto-title-active="0"&gt;blog post&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity security enhancements&lt;/STRONG&gt;: New identity security capabilities help you monitor and manage identity security for human and non-human identities:
&lt;UL&gt;
&lt;LI&gt;(Public Preview) Identity Security dashboard: The&amp;nbsp;&lt;STRONG&gt;Identity Security&lt;/STRONG&gt;&amp;nbsp;dashboard provides summary cards for identity providers, on-premises identities, SaaS identities, PAM and IGA integrations, and non-human identities. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/dashboard" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;The Identity Security dashboard&lt;/A&gt;. The&amp;nbsp;&lt;STRONG&gt;Identity Security&lt;/STRONG&gt;&amp;nbsp;dashboard is being rolled out gradually to customers, and might not yet be available in your organization.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) Coverage and maturity page: The&amp;nbsp;&lt;STRONG&gt;Coverage and maturity&lt;/STRONG&gt;&amp;nbsp;page shows your organization's identity security coverage with maturity levels, including Connected, Protected, Fortified, and Resilient, and prioritized setup tasks. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/identity-security/coverage-maturity" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Coverage and maturity&lt;/A&gt;. The&amp;nbsp;&lt;STRONG&gt;Coverage and maturity&lt;/STRONG&gt;&amp;nbsp;page is being rolled out gradually to customers, and might not yet be available in your organization. If you don't see this feature in your environment yet, check back soon.&lt;/LI&gt;
&lt;LI&gt;Identity inventory: The&amp;nbsp;&lt;STRONG&gt;Identity inventory&lt;/STRONG&gt;&amp;nbsp;page now shows human and non-human identities in separate tabs. Insight cards help you classify critical assets, view highly privileged identities, identify critical Active Directory service accounts, and view cloud application accounts. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/identity-inventory" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;View the Identity inventory&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Preview) Non-human identities: The&amp;nbsp;&lt;STRONG&gt;Non-human identities&lt;/STRONG&gt;&amp;nbsp;tab shows non-human identities, including Microsoft Entra ID apps, Active Directory service accounts, Google Workspace apps, and Salesforce apps. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/identity-inventory" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Identity inventory&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/investigate-non-human-identities" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Investigate non-human identities&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) Identity risk score: A new risk score for identities, ranging from 0 to 100, that indicates the likelihood of compromise and the potential impact based on criticality and privileged roles. The risk score is available in Microsoft Entra ID, where it can be used to inform conditional access policies and identity protection workflows. A new&amp;nbsp;&lt;STRONG&gt;Risk score&lt;/STRONG&gt;&amp;nbsp;tab on the&amp;nbsp;&lt;STRONG&gt;Identity&lt;/STRONG&gt;&amp;nbsp;page provides a detailed breakdown of the risk factors, including percentile comparison and risk trends. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/investigate-users" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Investigate an identity&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) Domain investigation page: The&amp;nbsp;&lt;STRONG&gt;Domain investigation&lt;/STRONG&gt;&amp;nbsp;page shows Active Directory domain security, including domain properties, deployment health, identity summary, service account breakdown, sensitive entities, active recommendations, group policies, and trust relationships. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/investigate-domain" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Investigate a domain&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview)Identity security recommendations: View recommendations from Active Directory, Microsoft Entra ID, SaaS applications, and supported non-Microsoft identity providers. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/identity-security/identity-security-recommendations" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Identity security recommendations&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/whats-new?tabs=defender-portal#call-to-action-update-older-microsoft-sentinel-content-as-code-sentinel-repositories-api-versions-before-june-15-2026" target="_blank" rel="noopener" data-linktype="self-bookmark"&gt;Call to action: update older Microsoft Sentinel content as code (Sentinel repositories) API versions before June 15, 2026&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;(Public Preview) The following advanced hunting schema tables are now available for preview:
&lt;UL&gt;
&lt;LI&gt;The&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-clouddnsevents-table" target="_blank" rel="noopener" data-linktype="relative-path"&gt;CloudDnsEvents&lt;/A&gt;&amp;nbsp;table contains information about DNS activity events from cloud infrastructure environments.&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-cloudpolicyenforcementevents-table" target="_blank" rel="noopener" data-linktype="relative-path"&gt;CloudPolicyEnforcementEvents&lt;/A&gt;&amp;nbsp;table contains policy enforcement evaluation decisions and metadata of security gating events for various cloud platforms protected by the organization's Microsoft Defender for Cloud.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;To improve accuracy and better protect organizational identities, we've made &lt;STRONG&gt;updates to the Secure Score category calculations&lt;/STRONG&gt;. Some security recommendations categorized as&amp;nbsp;&lt;STRONG&gt;Cloud apps&lt;/STRONG&gt;&amp;nbsp;recommendations are now considered identity‑related and grouped under the&amp;nbsp;&lt;STRONG&gt;Identity&lt;/STRONG&gt;&amp;nbsp;category. While the total Secure Score remains unchanged, individual identity and app scores may change.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) Customers can now use filters on very large incidents with many alerts and entities or hide specific entities to simplify complex incident graphs. By simplifying the graphs, they can focus their investigations on what matters most.&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/investigate-incidents#filter-and-focus-the-incident-graph-preview" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Learn more&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/respond-machine-alerts#contain-user-from-the-network" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;proactive user containment (contain user)&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;action as part of the predictive shielding feature is &lt;STRONG&gt;now generally available&lt;/STRONG&gt;. This action infuses activity data with exposure data to identify exposed credentials at risk of being compromised and reused to conduct malicious activity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint / Microsoft Defender Vulnerability Management&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Library management for live response is now generally available&lt;/STRONG&gt;. This feature provides a centralized view for managing files and scripts used during live response sessions.&lt;/LI&gt;
&lt;LI&gt;Microsoft&amp;nbsp;&lt;STRONG&gt;Secure Score now includes new recommendations:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Block outbound network connections from Microsoft HTML Application Host (mshta.exe):&lt;/STRONG&gt; Helps mitigate attacks that leverage mshta.exe (a trusted Windows binary) to execute malicious scripts and communicate with external command-and-control (C2) infrastructure. Blocking outbound connections from mshta.exe disrupts common attack chains, prevents payload download and data exfiltration, and reduces the risk of living-off-the-land attacks. This is relevant for emerging attack campaigns, for example, ClickFix campaigns, where attackers abuse legitimate tools like mshta.exe to execute malicious content delivered through user interaction.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Block file transfer over RDP&lt;/STRONG&gt;: Restricts file transfer capabilities in Remote Desktop Protocol (RDP) sessions. This helps prevent attackers from using RDP sessions to transfer malicious files into the environment or exfiltrate sensitive data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SMB server security hardening against authentication relay attacks&lt;/STRONG&gt;: Helps protect servers from credential relay attacks by strengthening Server Message Block (SMB) authentication protections, including enforcing Extended Protection for Authentication (EPA), SMB signing, and SMB encryption to ensure authentication integrity and protect SMB traffic from tampering or interception.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/respond-machine-alerts#contain-user-from-the-network" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;proactive user containment (contain user)&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;action as part of the predictive shielding feature is &lt;STRONG&gt;now generally available&lt;/STRONG&gt;. This action infuses activity data with exposure data to identify exposed credentials at risk of being compromised and reused to conduct malicious activity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Identity&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;New identity security capabilities help you monitor and manage identity security for human and non-human identities:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) Identity Security dashboard&lt;/STRONG&gt;: The&amp;nbsp;&lt;STRONG&gt;Identity Security&lt;/STRONG&gt;&amp;nbsp;dashboard provides summary cards for identity providers, on-premises identities, SaaS identities, PAM and IGA integrations, and non-human identities. Widgets show deployment status, highly privileged identities, users at risk, and domains with unsecured configurations. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/dashboard" target="_blank" rel="noopener" data-linktype="relative-path"&gt;The Identity Security dashboard&lt;/A&gt;.&amp;nbsp;The&amp;nbsp;&lt;STRONG&gt;Identity Security&lt;/STRONG&gt;&amp;nbsp;dashboard is being rolled out gradually to customers, and might not yet be available in your organization.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) &lt;/STRONG&gt;The&amp;nbsp;&lt;STRONG&gt;Coverage and maturity&lt;/STRONG&gt;&amp;nbsp;page shows your organization's identity security coverage for identity providers, on-premises identities, SaaS identities, and PAM and IGA integrations. Each source displays a maturity level, including Connected, Protected, Fortified, and Resilient, with identity counts, coverage scores, and prioritized setup tasks. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/identity-security/coverage-maturity" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Coverage and maturity&lt;/A&gt;.&amp;nbsp;The&amp;nbsp;&lt;STRONG&gt;Coverage and maturity&lt;/STRONG&gt;&amp;nbsp;page is being rolled out gradually to customers, and might not yet be available in your organization. If you don't see this feature in your environment yet, check back soon.&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;Identity inventory&lt;/STRONG&gt;&amp;nbsp;page now shows human and non-human identities in separate tabs. Insight cards help you classify critical assets, view highly privileged identities, identify critical Active Directory service accounts, and view cloud application accounts. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/identity-inventory" target="_blank" rel="noopener" data-linktype="relative-path"&gt;View the Identity inventory&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) &lt;/STRONG&gt;The&amp;nbsp;&lt;STRONG&gt;Non-human identities&lt;/STRONG&gt;&amp;nbsp;tab on the&amp;nbsp;&lt;STRONG&gt;Identity inventory&lt;/STRONG&gt;&amp;nbsp;page shows non-human identities, including Microsoft Entra ID apps, Active Directory service accounts, Google Workspace apps, and Salesforce apps. The tab includes statistics for risky, highly privileged, overprivileged, unused, and externally published identities. A separate investigation page lets you view details for each identity. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/identity-inventory" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Identity inventory&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/investigate-non-human-identities" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Investigate non-human identities&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) A new risk score for identities&lt;/STRONG&gt;, ranging from 0 to 100, that indicates the likelihood of compromise and the potential impact based on criticality and privileged roles. The risk score is available in Microsoft Entra ID, where it can be used to inform conditional access policies and identity protection workflows. A new&amp;nbsp;&lt;STRONG&gt;Risk score&lt;/STRONG&gt;&amp;nbsp;tab on the&amp;nbsp;&lt;STRONG&gt;Identity&lt;/STRONG&gt;&amp;nbsp;page provides a detailed breakdown of the risk factors, including percentile comparison and risk trends. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/investigate-users" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Investigate an identity&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) Identity security recommendations&lt;/STRONG&gt;: View recommendations for Active Directory, Microsoft Entra ID, and SaaS applications such as Microsoft, Atlassian, GitHub, Google Workspace, Salesforce, and ServiceNow. Recommendations are also available for non-Microsoft identity providers such as Okta, PingOne, CyberArk, and SailPoint. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/identity-security/identity-security-recommendations" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Identity security recommendations&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) Domain investigation page&lt;/STRONG&gt;: The&amp;nbsp;&lt;STRONG&gt;Domain investigation&lt;/STRONG&gt;&amp;nbsp;page shows Active Directory domain security, including domain properties, deployment health, identity summary, service account breakdown, sensitive entities, active recommendations, group policies, and trust relationships. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/investigate-domain" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Investigate a domain&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Public Preview) Password protection page&lt;/STRONG&gt;: The&amp;nbsp;&lt;STRONG&gt;Password protection&lt;/STRONG&gt;&amp;nbsp;page shows identity password risk from Active Directory, Microsoft Entra ID, and Okta, with tabs for password hygiene, password policies, leaked credentials, and exposed passwords. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/password-protection" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Password protection&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To improve accuracy and better protect organizational identities, we've made &lt;STRONG&gt;updates to the Secure Score category calculations&lt;/STRONG&gt;. Some security recommendations categorized as&amp;nbsp;&lt;STRONG&gt;Cloud apps&lt;/STRONG&gt;&amp;nbsp;recommendations are now considered identity‑related and grouped under the&amp;nbsp;&lt;STRONG&gt;Identity&lt;/STRONG&gt;&amp;nbsp;category. While the total Secure Score remains unchanged, individual identity and app scores may change.&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspected-pass-the-ticket-attack" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspected pass-the-ticket attack&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;alert is now &lt;STRONG&gt;generally available&lt;/STRONG&gt;. This alert was previously available in public preview as&amp;nbsp;&lt;EM&gt;Pass-the-Ticket (PtT) attack&lt;/EM&gt;. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Lateral movement alerts&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;These new alerts were added to the Defender for Identity security alerts:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New alerts related to Entra ID&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#attempt-to-disable-defender-for-identity-service-principal-observed" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Attempt to disable Defender for Identity service principal observed&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-entra-account-enablement-after-disruption" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious Entra account enablement after disruption&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-intune-device-registration-activity" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious Intune device registration activity&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-os-switch-sign-in" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious OS switch sign-in&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-shared-client-infrastructure-activity" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious shared client infrastructure activity&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-sign-in-from-unusual-user-agent-and-ip-address-using-powershell" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious sign-in from unusual user agent and IP address using PowerShell&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-sign-in-from-unusual-user-agent-and-ip-address-using-device-code-flow" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious sign-in from unusual user agent and IP address using device code flow&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;New alerts related to Active Directory&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-on-prem-account-enablement-after-disruption" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious on-premises account enablement after disruption&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-resource-based-constrained-delegation-rbcd-attribute-change" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious resource-based constrained delegation (RBCD) attribute change&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr#suspicious-resource-based-constrained-delegation-rbcd-authentication" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Suspicious resource-based constrained delegation (RBCD) authentication&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Office 365&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanding User reporting in Teams to include Calls&lt;/STRONG&gt;: Users can reported completed or missed one-to-one&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-teams" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Microsoft Teams calls&lt;/A&gt;&amp;nbsp;from the call history as malicious (scam) or non malicious (non-scam) to the specified reporting mailbox, or Microsoft and the reporting mailbox via&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-user-reported-messages-custom-mailbox" target="_blank" rel="noopener" data-linktype="relative-path"&gt;user reported settings&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Added support for contextual Teams messages in User reported Teams Messages&lt;/STRONG&gt;: When Users report&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-teams" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Microsoft Teams messages&lt;/A&gt;&amp;nbsp;from chats, channels (standard, shared, and private), and meeting conversations to Microsoft as malicious (security risk), up to fifteen messages before and after the reported message are shared for analysis.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Cloud Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;To improve accuracy and better protect organizational identities, some security recommendations categorized as&amp;nbsp;&lt;STRONG&gt;Cloud apps&lt;/STRONG&gt;&amp;nbsp;recommendations are now considered identity‑related and grouped under the&amp;nbsp;&lt;STRONG&gt;Identity&lt;/STRONG&gt; category. While the total Secure Score remains unchanged, individual identity and app scores may change.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 08 Apr 2026 08:18:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-april-2026/ba-p/4508050</guid>
      <dc:creator>HeikeRitter</dc:creator>
      <dc:date>2026-04-08T08:18:07Z</dc:date>
    </item>
    <item>
      <title>Fishing linking passwords and data</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/fishing-linking-passwords-and-data/m-p/4508090#M2654</link>
      <description>&lt;P&gt;activar control de seguridad mejorada antivirus maleware and fishing data&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 15:06:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/fishing-linking-passwords-and-data/m-p/4508090#M2654</guid>
      <dc:creator>79470Valen</dc:creator>
      <dc:date>2026-04-02T15:06:48Z</dc:date>
    </item>
    <item>
      <title>Redefining identity security for the modern enterprise</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/redefining-identity-security-for-the-modern-enterprise/ba-p/4503129</link>
      <description>&lt;P&gt;Every breach has one thing in common: an identity was exploited. Attackers have learned that identity is the fastest path to lateral movement and escalation. The challenge for defenders is that today's identity landscape is vast and fragmented — spanning hybrid environments, SaaS apps, cloud platforms, and autonomous agents. Protecting it demands more than point solutions. It requires continuous visibility, proactive posture reduction, and the ability to detect and disrupt identity threats across the full attack lifecycle.&lt;/P&gt;
&lt;P&gt;Leveraging our expertise as a leader in both Identity and Access Management (IAM) and Security, our focus has been to deliver a fast, comprehensive, and increasingly autonomous approach to identity security. It is designed to continuously strengthen identity posture and help SOC teams act faster with less manual effort. Today, I am excited to announce the next set of innovations including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Reimagined Identity Security dashboard and experiences to surface identity insights&lt;/LI&gt;
&lt;LI&gt;Expanded protection for more elements of modern identity fabrics including non-human identities.&lt;/LI&gt;
&lt;LI&gt;Streamlined detections including a new identity-level risk score that can be applied directly within risk-based conditional access policies.&lt;/LI&gt;
&lt;LI&gt;Unified identity view &amp;amp; protection across Active Directory, Entra ID, IAM solutions, SaaS and Cloud – with improved at-scale identity correlations&lt;/LI&gt;
&lt;LI&gt;New autonomous response capabilities to further speed identity threat triage, disruption and response.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Below is a deeper look at what’s new.&lt;/P&gt;
&lt;H4&gt;Turning identity sprawl into clarity&lt;/H4&gt;
&lt;P&gt;Security teams don’t suffer from a lack of identity data — they suffer from a lack of insight across that data. Without context, the flood of activity from various directories, SaaS platforms, cloud services, and on‑premises infrastructure simply becomes noise.&amp;nbsp; Disconnected alerts, isolated accounts, and fragmented investigations make it harder, not easier, to determine what actually matters.&lt;/P&gt;
&lt;P&gt;The updated Identity security dashboard is one of the new experiences designed to help with just that. It serves as the starting point for the SOC to gain a birds eye view of their entire identity security status, surfacing critical information on the human and non-human identities from across on-premises, SaaS and cloud environments.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Fueling this, and other identity security experiences within Defender, are the advancements we have made in unifying the identity inventories. First, for human users we have expanded the &lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/enhancing-visibility-into-your-identity-fabric-with-microsoft-defender/4470662" target="_blank" rel="noopener"&gt;account correlation&lt;/A&gt;&amp;nbsp; capabilities we released at Ignite to include SaaS and cloud accounts. This means that security professionals will have an even more comprehensive view of related accounts, their holistic posture and identity risk. Additionally, we are also introducing new, policy-based linkage to help organizations customize these connections at scale.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But modern identity fabrics extend far beyond human users. To address this shift, we are also expanding identity security coverage to include a greater focus on non‑human identities. The new non‑human identity inventory helps security teams to discover, understand, and protect these critical identities within the same identity‑centric view as human accounts.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Defender helps teams see the full identity fabric — not as disconnected components, but as an interconnected system — so they can reduce blind spots, prioritize exposure, and apply consistent protection across the identities attackers increasingly rely on.&lt;/P&gt;
&lt;H4&gt;Expanded coverage across the modern identity fabric&lt;/H4&gt;
&lt;P&gt;Staying one step ahead of attackers starts with having a better understanding of what makes you vulnerable and closing those gaps before they can be exploited. With this mission in mind, I am excited to announce a &lt;STRONG&gt;new coverage and &lt;/STRONG&gt;&lt;STRONG&gt;maturity &lt;/STRONG&gt;&lt;STRONG&gt;view&lt;/STRONG&gt; that shows how identity infrastructure, protections, and risk actually connect across your environment. This view serves as a snapshot revealing which access paths are protected, which are exposed, and what to fix next to meaningfully reduce blast radius.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Rather than treating coverage as a static checklist, this experience surfaces actionable insights that show both current status and prioritized next steps, helping teams understand not only what needs to be protected, but also how to systematically improve identity security posture over time. With this clear guidance Defender empowers SOC teams to move from fragmented awareness to confident, identity‑centric protection.&lt;/P&gt;
&lt;P&gt;This new view is powered by the native integration available out-of-the-box with Microsoft Entra ID and the dedicated sensors and connectors available for other identity components like Privilege Access Management (PAM) solutions and other identity providers. Given this, I am pleased to share that we are adding new integrations with solutions like SailPoint and CyberArk that further our commitment to bringing additional depth and coverage for more elements of modern identity landscapes within Defender.&lt;/P&gt;
&lt;P&gt;In this same vein, we're making it easier for customers to activate protections across their on-premises identity infrastructure. Today we are excited to share that the &lt;A href="https://aka.ms/unified-sensor-ga-community-blog" target="_blank" rel="noopener"&gt;unified identity and endpoint agent&lt;/A&gt; is extending support for more identity infrastructure and releasing a streamlined experience for existing customers looking to &lt;A href="https://aka.ms/defender-sensor-migration" target="_blank" rel="noopener"&gt;migrate to the new sensor.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In addition to all this we are also adding a new identity explorer experience that is designed to help security professionals uncover identity-based exposures and lateral movement paths within their organization. Leveraging the graph capabilities within Defender and a robust set of pre-defined queries, SOC teams gain new visibility into potential exposure scenarios and end-to-end attack paths.&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;Streamlined protections and workflows across Defender and Entra&lt;/H4&gt;
&lt;P&gt;Security teams need to understand how the individual role, privilege, activity and alerts for each individual account relate to the risk of the identity as a whole. To address this, we’re introducing a new &lt;STRONG&gt;unified risk score&lt;/STRONG&gt; that aggregates signals across all linked accounts to calculate a single risk score for the identity.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;As you can see in the image above the score considers the observed activity, criticality, privilege and likelihood of compromise for each linked account and produces a single, actionable view of risk. This means analysts no longer need to decipher various alerts themselves, they can quickly prioritize investigations based on the potential impact and urgency of identity‑driven threats.&lt;/P&gt;
&lt;P&gt;But the value of this new unified risk score doesn’t stop at investigation. Entra ID customers can now leverage these new risk signals directly within their risk-based conditional access policies. This gives admins a stronger signal for access decisions, resulting in earlier prevention, detection, and response across the identity control plane. This powers the feedback loop between identity and SOC teams, ensuring that insights gained in the SOC can immediately reduce exposure across the identity fabric.&lt;/P&gt;
&lt;P&gt;Together, these advances transform identity sprawl into clarity. By automatically connecting the dots and surfacing insights instead of raw data Defender is elevating what matters most, helping security teams cut through noise, focus on true risk, and respond to identity‑based threats with greater speed and confidence.&lt;/P&gt;
&lt;H4&gt;New Identity detections using novel and unique sensor capabilities&lt;/H4&gt;
&lt;P&gt;Detection opportunities start with visibility and sensor capabilities and we are excited to share a new capability that significantly improves how we see identity-based attacks on Domain Controllers. We work closely with the Windows team within Microsoft and are introducing a new Event Tracking for Windows (ETW) that gives us richer insight into Kerberos activity. This allows us to safely access important ticket details that were previously hidden while the ticket was in use, without needing to break or decrypt the ticket itself.&lt;/P&gt;
&lt;P&gt;With this additional context, we can spot unusual behavior that points to forged or tampered Kerberos tickets more accurately than before. By connecting this new operating system signal directly into our identity threat detection capabilities, we unlock a unique level of protection. It also opens up new investigation and hunting scenarios for SOC analysts who want deeper visibility into Kerberos related activity.&lt;/P&gt;
&lt;P&gt;Our first detection using this new sensor capability (&lt;EM&gt;“&lt;/EM&gt;&lt;EM&gt;Possible golden ticket attack (suspicious ticket)”&lt;/EM&gt;) is now generally available, and further exemplifies why our strategy is so revolutionary. Previously detecting these types of attacks would require decrypting the ticket/token itself, introducing even more potential for exposure. With this ETW however we have the same visibility without the risk.&lt;/P&gt;
&lt;P&gt;We know that Identity attacks no longer stop at the perimeter. Recognizing that modern adversaries target on‑premises, hybrid, and cloud identities alike, we invested heavily in expanding also our detection capabilities across this full spectrum. In particular, we introduced new detections for emerging attack techniques targeting Entra ID as a platform. While Entra ID Protection continues to deliver broad, native protection for Entra users and identities, the core mission of Identity Threat Protection products is to go further— detecting also sophisticated post‑breach activity and lateral movements where attackers directly target the identity provider itself, often by exploiting the hybrid trust and linkage between on‑premises and cloud environments. We are excited to announce the availability of the following new detections:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;4 new detections for anomalies and attacks targeting Entra ID sync application in hybrid environments&lt;/LI&gt;
&lt;LI&gt;2 new detections for suspicious device registration/join across Entra and Intune&lt;/LI&gt;
&lt;LI&gt;1 new detection for techniques abusing Oauth Authorization Flow for browser-based attacks, as observed in-the-wild recently (“ConsentFix”)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Powering autonomous Identity Threat Protection&lt;/H4&gt;
&lt;P&gt;When a security incident is unfolding, every second matters. Attackers are already operating at machine speed, and human response alone can’t keep up, which is why AI-powered capabilities are essential for detecting, triaging and remediating identity threats in time.&lt;/P&gt;
&lt;P&gt;As part of our push toward autonomous Identity Threat Protection, we’re extending Security Copilot’s agentic triage capabilities to identity. We’ve already seen the impact of outcome-driven autonomous workflows in phishing, where our agent identifies 6.5 times more malicious alerts than human analysts working alone. Today, that same capability is extending beyond phishing to include identity alerts.&lt;/P&gt;
&lt;P&gt;The new Security Alert Triage Agent autonomously evaluates high‑volume identity alerts, distinguishing true threats from noise, and surfacing clear, explainable verdicts so analysts can focus immediately on what requires action. At Public Preview, it supports triage of alert types involving password spray attempts, suspicious inbox rules associated with business email compromise (BEC), and accounts potentially compromised following a password spray attack. Learn more about Security Copilot in Defender announcements &lt;A href="https://aka.ms/CiD-RSAC26" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;In parallel, we’re expanding identity takeover predictive shielding, using real‑time exposure and attack path insights to proactively harden the identity attack surface during an active incident—blocking attacker progression before high‑value identities can be compromised. Together, these capabilities shift identity defense from reactive investigation to real‑time disruption, helping security teams contain attacks faster, reduce blast radius, and stay ahead of adversaries when it matters most.&lt;/P&gt;
&lt;P&gt;At Ignite, we introduced &lt;A href="https://aka.ms/predictiveshielding" target="_blank" rel="noopener"&gt;predictive shielding,&lt;/A&gt; an AI-powered capability in automatic attack disruption that predicts an attacker’s next move in an active attack and applies targeted, just-in-time hardening to block them before they can pivot. Today, predictive shielding proactively hardens many of the controls attackers most often rely on to regain access, such as SafeBoot abuse and Group Policy Objects. We’ve already seen tremendous impact across our customers, including &lt;STRONG&gt;a large public university&lt;/STRONG&gt;:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;“During a ransomware incident, Microsoft Defender’s attack disruption stopped the attack before it could progress. In parallel, predictive shielding applied Safe Boot hardening across key devices, helping protect against a common evasion tactic—rebooting endpoints into Safe Mode to try and bypass protections like disruption. Together, these layers increased our confidence and resilience during the incident.”&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This speed and accuracy matter because identity-based attacks now operate at massive scale, with each user tied to many accounts across the environment, making it increasingly difficult to protect every identity.&lt;/P&gt;
&lt;P&gt;We are excited to share that we’re expanding this set of just-in-time hardening actions tailored for identity-based attacks. This includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;RemoteOps hardening: &lt;/STRONG&gt;restricts high-risk remote administrative operations such as RPC-based actions that attackers rely on for lateral movement and hands-on-keyboard control. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Remote Registry hardening&lt;/STRONG&gt;: prevents attackers from remotely modifying sensitive registry settings often used to weaken security controls or enable credential theft.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;What makes these controls unique is their precision: Defender shields only the specific assets at risk, rather than applying broad, organization-wide restrictions, maximizing security while minimizing business impact.&lt;/P&gt;
&lt;H4&gt;Looking ahead&lt;/H4&gt;
&lt;P&gt;Identity has become the foundation of access, trust, and control in modern enterprises—and the primary target for attackers. The announcements detailed throughout this blog reflect our continued commitment to advancing identity security and to helping customers stay ahead of rapidly evolving identity-based threats.&lt;/P&gt;
&lt;P&gt;We’re excited to share more throughout the week at RSA, and we look forward to partnering with customers as they continue their journey toward comprehensive, identity centric security.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/redefining-identity-security-for-the-modern-enterprise/ba-p/4503129</guid>
      <dc:creator>YaronParyanty</dc:creator>
      <dc:date>2026-03-20T16:00:00Z</dc:date>
    </item>
    <item>
      <title>RSA 2026: What’s new in Microsoft Defender?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/rsa-2026-what-s-new-in-microsoft-defender/ba-p/4503046</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Modern attacks increasingly exploit the sprawl of today’s digital environments.&lt;/STRONG&gt; In the identity space alone, over half of today’s organizations say each person now has more than 21 distinct accounts. Each one of these accounts is a potential entry point that an attacker can exploit. As organizations adopt cloud, SaaS, AI, and autonomous agents, the rapid growth of non‑human identities accelerates sprawl, expanding the attack surface and increasing gaps in protection. At the same time, agents help accelerate the SOC by automating high‑volume tasks, reducing noise, and enabling analysts to act faster and more consistently.&lt;/P&gt;
&lt;P&gt;This shift demands a new approach: comprehensive identity security paired with agentic AI to help the SOC better reason across signals, predict risk, and act earlier, while augmenting human analysts to keep pace with increasingly fast and complex attacks.&lt;/P&gt;
&lt;P&gt;At RSA, we’re excited to announce innovations in Microsoft Defender and Security Copilot to help customers defend against the latest threats. These include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity Security&lt;/STRONG&gt;: expanded capabilities and enhanced experiences to help the SOC better prepare for, detect and autonomously respond to identity-related threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Collaboration Security&lt;/STRONG&gt;: protect&lt;STRONG&gt; &lt;/STRONG&gt;against voice‑based attacks in Teams with real‑time user warnings, SOC‑ready investigation, and new threat &amp;amp; posture insights reporting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accelerate the SOC with Security Copilot&lt;/STRONG&gt;: expansion of the Security Triage Agent to identity and cloud alerts, a new Security Analyst agent to uncover risk and a new chat experience directly in Microsoft Defender.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud Security&lt;/STRONG&gt;: expansion of multi-cloud visibility to new AWS and GCP services, near real-time container runtime protection to eliminate binary drift, and introducing AI model scanning. Learn more &lt;A href="https://aka.ms/MDCblog_RSA" target="_blank"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Reshaping Identity Security&lt;/H4&gt;
&lt;P&gt;Today’s identity landscape is no longer defined by a single directory and a single set of users. It’s a fast-changing fabric of human, non-human, and emerging agentic identities spread across cloud services, SaaS apps, and on-premises infrastructure—that attackers actively target. To meet this new reality, we’re reshaping identity security in Microsoft Defender to move beyond point defenses and reactive investigation to an autonomous, end-to-end approach that continuously strengthens identity posture, stops active threats while they’re happening, and helps the SOC act faster with less manual effort.&lt;/P&gt;
&lt;P&gt;To start, we’re broadening our coverage across modern identity fabrics, making posture and activity easier to understand quickly, and tightening the operational loop between identity and the SOC. To do this were delivering new detections, a unified risk score that assesses risk across all accounts and identity types, and updated experiences like the new identity security dashboard that brings your most important posture gaps, active exposures, and identity risk into one place - so security teams can move from fragmented signals to shared context and coordinated action. &lt;BR /&gt;&lt;BR /&gt;On top of this improved foundation we are also unveiling autonomous ITDR in two complementary ways. First, &lt;STRONG&gt;we’re extending Security Copilot’s agentic triage capabilities to identity&lt;/STRONG&gt;. With the new Security Alert Triage Agent, Defender can autonomously evaluate high‑volume identity alerts, distinguish true threats from noise, and surface clear, explainable verdicts so analysts can focus immediately on what requires action. Second, we’re bringing the AI-powered just-in-time hardening of &lt;STRONG&gt;predictive shielding&lt;/STRONG&gt; to identity allowing Defender to not only disrupt threats but also anticipate an attacker’s next move and automatically enforces targeted controls to block credential- and token-driven pivots before they succeed.&lt;/P&gt;
&lt;P&gt;Together, these innovations empower security teams to understand their identity footprint, prioritize what matters most, and stop identity-driven attacks earlier:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanded coverage across modern identity fabrics&lt;/STRONG&gt; with new identity-specific detections&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity-level insights that turn sprawl into clarity&lt;/STRONG&gt; via an updated dashboard that provides a unified inventory and improved correlation across SaaS apps and identity types—elevating the SOC view from accounts to the identity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Streamlined protections and aligned workflows across Defender and Entra&lt;/STRONG&gt;, including a new identity-level risk score to help identity and SOC teams prioritize and act from shared signals.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Predictive shielding &lt;/STRONG&gt;applies precise, just-in-time hardening actions used during identity attacks including RemoteOps hardening and Remote Registry hardening —helping prevent lateral movement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Autonomous triage for identity alerts with Security Copilot&lt;/STRONG&gt;, expanding the Security Triage Agent so identity alerts can be investigated consistently and at scale, with clear verdicts and explainable reasoning to speed up response.&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Learn more about these innovations &lt;A href="https://aka.ms/IDSecurity-Defender-RSA" target="_blank"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;Protect collaboration threats and prove security outcomes&lt;/H4&gt;
&lt;P&gt;As collaboration platforms become a new front door for attackers, Microsoft Defender extends protection beyond email to detect and respond to voice‑based social engineering in Microsoft Teams. New Teams calling protection surfaces suspicious and malicious calls, enables SOC teams to investigate and correlate call activity using Advanced Hunting, and delivers real‑time in‑call warnings when a call appears to impersonate a trusted contact, closing the gap between what users experience and what analysts can investigate.&lt;/P&gt;
&lt;P&gt;To help organizations clearly measure and communicate the impact of these protections, Microsoft Defender is introducing the&amp;nbsp;&lt;STRONG&gt;Protection &amp;amp; Posture Insights report&lt;/STRONG&gt;. It gives customers a tenant‑specific view of the threats targeting their environment, highlighting spam, phishing, and malware campaigns observed against users. The report delivers personalized insights and policy recommendations to reduce exposure, while enabling teams to validate results, and share credible, executive‑ready security outcomes—without manual data assembly.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Read more &lt;A href="https://aka.ms/EmailRSA26" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;Accelerate your security operations at scale with Security Copilot&lt;/H4&gt;
&lt;P&gt;Adversaries are using AI to accelerate attacks and increase sophistication. At RSA Conference 2026, we’re expanding our innovation around autonomous and assistive AI in Microsoft Defender with Security Copilot—helping defenders operate with the speed, scale, and intelligence required to stay ahead of modern threats across the entire SOC lifecycle.&lt;/P&gt;
&lt;P&gt;In addition to expanding agentic triage to identity alerts, we’re extending that same capability to cloud—bringing phish, identity and cloud triage together within a single agent. The Security Alert Triage Agent helps analysts autonomously determine whether these alerts represent real threats or false alarms, delivering natural language verdicts and transparent, step-by-step decision reasoning.&lt;/P&gt;
&lt;P&gt;We’re also announcing the Security Analyst Agent, designed to help security teams uncover hidden risk. This agent performs deep, multi-step investigations across Microsoft Defender and Sentinel telemetry to surface high-impact threats, cut through the noise, and deliver prioritized insights in minutes. Every finding is accompanied by transparent reasoning and supporting evidence.&lt;/P&gt;
&lt;P&gt;Lastly, we’re bringing a chat experience for Security Copilot directly within Microsoft Defender. Analysts can ask questions, explore hypotheses, and follow investigative threads across incidents, alerts, identities, devices, IPs, and other evidence without switching tools or manually piecing together context.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;You can learn more about Microsoft Security Copilot news at RSA Conference 2026 &lt;A href="https://aka.ms/CiD-RSAC26" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;Looking ahead&lt;/H4&gt;
&lt;P&gt;The Microsoft Defender announcements at RSA 2026 reflect a clear shift toward agentic and autonomous security, while augmenting the SOC with Security Copilot–driven workflows. Together, these capabilities give defenders clearer context, tighter control, and the ability to stop attacks earlier, before adversaries can escalate privileges or move laterally. Microsoft’s continued investment signals a longer-term evolution toward agentic security operations that anticipate attacker behavior, adapt in real time, and steadily reduce risk as environments and threats continue to evolve.&lt;/P&gt;
&lt;H4&gt;Learn more at RSA Conference 2026!&lt;/H4&gt;
&lt;P&gt;To learn more about Microsoft Defender and Security Copilot, visit us at booth # at RSA Conference 2026. Our team will be demonstrating how autonomous agents and assistive AI experiences are helping SOC teams move faster through alert triage, investigation, and response.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;You can join our booth sessions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Empowering the SOC with assistive and autonomous AI with Yuval Derman | March 23rd at 5.15PM&lt;/LI&gt;
&lt;LI&gt;Predictive Shielding: Protecting identities before attackers pivot | March 24th at 4.30PM&lt;/LI&gt;
&lt;LI&gt;Identity Security with Microsoft | March 25 at 3:30PM&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For a full list of all the ways to connect with us at RSA, check out our dedicated RSAC 2026 &lt;A href="https://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=blog_techcomm" target="_blank" rel="noopener"&gt;page&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 15:45:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/rsa-2026-what-s-new-in-microsoft-defender/ba-p/4503046</guid>
      <dc:creator>Caroline_Lee</dc:creator>
      <dc:date>2026-03-20T15:45:00Z</dc:date>
    </item>
    <item>
      <title>Security Copilot in Defender: empowering the SOC with assistive and autonomous AI</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/security-copilot-in-defender-empowering-the-soc-with-assistive/ba-p/4503047</link>
      <description>&lt;P&gt;Security operations centers are increasingly overwhelmed. Analysts must triage large volumes of alerts, investigate complex signals across multiple environments, and determine which threats require immediate action. Much of this work still involves manually gathering context, reconstructing timelines, and making decisions under time pressure.&lt;/P&gt;
&lt;P&gt;As Microsoft Ignite 2025, we introduced how Security Copilot is bringing agentic AI directly into Microsoft Defender to transform how SOC teams detect, triage, and investigate threats. Building on that vision, Copilot continues to expand its capabilities with two complementary forms of AI: &lt;STRONG&gt;autonomous &lt;/STRONG&gt;agents that reason dynamically to execute complex security tasks, and &lt;STRONG&gt;assistive&lt;/STRONG&gt; experiences that help analysts complete their daily workflows faster and with greater scale.&lt;/P&gt;
&lt;P&gt;Together, these innovations are designed to reduce operational burden while enabling analysts to focus on the decisions that matter most.&lt;/P&gt;
&lt;H4&gt;Autonomous AI: agents that triage alerts and investigate risk&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/security-copilot-for-soc-bringing-agentic-ai-to-every-defender/4470187" target="_blank" rel="noopener"&gt;Our vision is to bring autonomous AI across the SOC lifecycle&lt;/A&gt;, moving from isolated AI-enabled tasks to outcome-driven agentic transformation that elevates SOC teams across all experience levels. By applying frontier LLM reasoning to security telemetry and threat intelligence, Security Copilot is uniquely positioned to embed specialized agents at every stage—from anticipating risk and preventing attacks, to detecting, triaging, investigating, and responding. The result is a SOC that operates at machine speed while keeping humans firmly in control.&lt;/P&gt;
&lt;P&gt;During RSA Conference 2026, we’re expanding that vision within the triage and investigation stage of the SOC lifecycle with the launch of one expanded agent and one new agent.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;We’ve already demonstrated the impact of outcome-driven autonomous workflows with agentic phishing triage: our agent identifies &lt;A class="lia-external-url" href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/bade/documents/products-and-services/en-us/security/randomized-controlled-trial-for-phishing-triage-agent-accessible.pdf" target="_blank" rel="noopener"&gt;6.5 times more malicious alerts than human analysts working alone&lt;/A&gt;. Today, that same capability is extending beyond phishing to identity and cloud alerts.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;The Security Alert Triage Agent helps analysts autonomously determine whether phishing, identity and cloud alerts represent real threats or just false alarms.&lt;/STRONG&gt; The agent provides natural language verdicts and transparent, step-by-step reasoning that explains how it reached each decision. At Public Preview, for identity, it supports triage of alert types involving password spray attempts, suspicious inbox rules associated with business email compromise (BEC), and accounts potentially compromised following a password spray attack. For cloud, it supports more than 30 alert types related to &lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-containers" target="_blank" rel="noopener"&gt;cloud container activity&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This agent is designed to handle alerts that are both high risk and high noise. Identity and cloud alerts often require longer and more complex investigations, and missing them has important implications. For &lt;STRONG&gt;identity alerts&lt;/STRONG&gt;, the challenge is scale—high-volume signals such as password spray generate noise, making it difficult to quickly isolate real compromise. The agent helps by rapidly triaging these alerts and filtering out false positives, allowing analysts to focus on identity activity that truly indicates risk. &lt;STRONG&gt;For cloud alerts&lt;/STRONG&gt;, the challenge is different: alert volume may be lower, but investigations are inherently more complex and require deep expertise. In these cases, the agent applies advanced analysis across multiple signals to investigate alerts that would otherwise be burdensome and difficult to analyze manually, helping ensure critical cloud threats are surfaced quickly and not overlooked.&lt;/P&gt;
&lt;P&gt;By providing natural language verdicts and transparent decision logic, the agent walks teams step-by-step through investigations that would typically require senior-level expertise. Clear explanations and visual decision graphs show how each conclusion was reached, reducing investigation effort and increasing confidence in outcomes. This transparency frees teams to focus on responding to real threats, while giving junior analysts visibility into the reasoning behind each verdict. The result is specialized expertise embedded directly into daily SOC workflows, raising the floor for the entire team.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;At RSA Conference 2026, we’re also announcing the Security Analyst Agent in Microsoft Defender&lt;/STRONG&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;This agent performs deep, multi-step investigations across Microsoft Defender and Sentinel telemetry to surface high-impact risks and deliver prioritized insights in minutes. Each finding includes clear reasoning and supporting evidence, enabling analysts to quickly understand and act on the results.&lt;/P&gt;
&lt;P&gt;Today, teams often rely on advanced hunting to investigate potential threats by writing queries, iteratively refining hypotheses, and correlating results across multiple datasets. While powerful, this process typically requires manually piecing together context across tools, reconstructing timelines, and sifting through large volumes of telemetry to determine whether suspicious activity represents real risk. Given the breadth and complexity of modern threats, these investigations can take days or even weeks.&lt;/P&gt;
&lt;P&gt;The Security Analyst Agent builds on the power of advanced hunting by autonomously orchestrating parts of that investigative process. The agent retrieves and analyzes large volumes of security data (up to ~100MB), correlates signals across telemetry sources, and iteratively explores hypotheses to surface patterns and threats that might otherwise go unnoticed. The results are synthesized into clear, risk-relevant findings with supporting evidence trails, helping analysts quickly understand what matters most. In doing so, the agent performs the kind of deep analytical work typically carried out by experienced security analysts.&lt;/P&gt;
&lt;H4&gt;Assistive AI: Chat experience in the analyst’s flow of work&lt;/H4&gt;
&lt;P&gt;While autonomous agents help execute complex security tasks with dynamic reasoning, Security Copilot also brings assistive AI directly into analysts’ daily workflows. These capabilities are designed to accelerate manual tasks, helping analysts gather context, and make decisions faster.&lt;/P&gt;
&lt;P&gt;Today, Copilot is already embedded across Microsoft Defender experiences. Analysts can generate natural language summaries of incidents, receive guided response recommendations, draft incident reports, generate KQL queries with natural language, and more. These capabilities help accelerate specific tasks, but interactions with Copilot typically occur as individual actions within a side panel or embedded experience.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;We’re now taking the next step by introducing a chat experience for Security Copilot directly within Microsoft Defender,&lt;/STRONG&gt; enabling teams to interact with AI through an ongoing, two-way conversation. Analysts can ask questions, explore hypotheses, and follow investigative threads across incidents, alerts, identities, devices, IPs, and other evidence—without switching tools or manually piecing together context. Copilot understands the analyst’s investigation context, grounding each response in the relevant signals and telemetry already available in Defender.&lt;/P&gt;
&lt;P&gt;Throughout the interaction, Copilot does more than respond. It actively advances the investigation by initiating step-by-step analysis, such as examining a specific entity, while continuously incorporating new signals as they emerge. Analysts can follow up in real time, refining their line of inquiry and digging deeper as the conversation evolves. This creates a more fluid, iterative workflow that lowers the barrier to AI adoption and enables SOC teams to operate with the speed and scale needed to stay ahead of modern threats.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Alongside this new embedded chat experience for Security Copilot, we are also extending conversational capabilities to third-party agents&lt;/STRONG&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;From the Agents library in Defender, teams can start a chat with any eligible agent to validate findings, gather additional context, and accelerate response. For example, users can interact with &lt;A href="https://securitystore.microsoft.com/solutions/xbowinc.xbow-pentest-analysis-agent" target="_blank" rel="noopener"&gt;XBOW’s Pentest Analysis Agent&lt;/A&gt; to determine whether vulnerabilities flagged by Microsoft Defender for Cloud are truly exploitable. The agent can initiate a pentest, explain the results, and recommend next steps—such as improving detection coverage in Microsoft Sentinel—to strengthen defenses.&lt;/P&gt;
&lt;H4&gt;Learn more at RSA Conference 2026!&lt;/H4&gt;
&lt;P&gt;To learn more about Security Copilot in Microsoft Defender, visit us at booth #5744. Our team will be demonstrating how AI is helping SOC teams move faster through alert triage, investigation, and response.&lt;/P&gt;
&lt;P&gt;You can join our booth sessions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Empowering the SOC with assistive and autonomous AI with Yuval Derman | March 23&lt;SUP&gt;rd&lt;/SUP&gt; at 5.15PM&lt;/LI&gt;
&lt;LI&gt;Security Copilot agents: Insight. Action. Impact. with Lizzie Heinze and Donna Lee | March 24th at 3.00PM&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can also register for &lt;EM&gt;Security Copilot in action: An agentic approach to modern security&lt;/EM&gt; on March 24&lt;SUP&gt;th&lt;/SUP&gt; at 8.30AM &lt;A href="https://microsoftsecurityevents.eventbuilder.com/events/11f0faf0203562b0af62159fbd1fe445?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 15:30:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/security-copilot-in-defender-empowering-the-soc-with-assistive/ba-p/4503047</guid>
      <dc:creator>cristinadagamah</dc:creator>
      <dc:date>2026-03-20T15:30:00Z</dc:date>
    </item>
    <item>
      <title>What’s New in Microsoft Sentinel and XDR: AI Automation, Data Lake Innovation, and Unified SecOps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/what-s-new-in-microsoft-sentinel-and-xdr-ai-automation-data-lake/m-p/4503442#M2652</link>
      <description>&lt;P&gt;The most consequential “new” Microsoft Sentinel / Defender XDR narrative for a deeply technical Microsoft Tech Community article is the operational and engineering shift to&amp;nbsp;&lt;STRONG&gt;unified security operations in the Microsoft Defender portal&lt;/STRONG&gt;, including an explicit &lt;STRONG&gt;Azure portal retirement/sunset timeline&lt;/STRONG&gt; and concrete migration implications (data tiering, correlation engine changes, schema differences, and automation behavior changes). Official sources now align on &lt;STRONG&gt;March 31, 2027&lt;/STRONG&gt; as the sunset date for managing Microsoft Sentinel in the Azure portal, with customers being redirected to the Defender portal after that date.&lt;/P&gt;&lt;P&gt;The “headline” feature announcements to anchor your article around (because they create new engineering patterns, not just UI changes) are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;AI playbook generator&lt;/STRONG&gt; (preview): Natural-language-driven authoring of &lt;STRONG&gt;Python&lt;/STRONG&gt; playbooks in an embedded &lt;STRONG&gt;VS Code&lt;/STRONG&gt; environment (Cline), using &lt;STRONG&gt;Integration Profiles&lt;/STRONG&gt; for dynamic API calls and an &lt;STRONG&gt;Enhanced Alert Trigger&lt;/STRONG&gt; for broader automation triggering across Microsoft Sentinel, Defender, and XDR alert sources.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;CCF Push&lt;/STRONG&gt; (public preview): A push-based connector model built on the &lt;STRONG&gt;Azure Monitor Logs Ingestion API&lt;/STRONG&gt;, where deploying via Content Hub can automate provisioning of the typical plumbing (DCR/DCE/app registration/RBAC), enabling near-real-time ingestion plus &lt;STRONG&gt;ingestion-time transformations&lt;/STRONG&gt; and (per announcement) direct delivery into certain system tables.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Data lake tier ingestion for Advanced Hunting tables&lt;/STRONG&gt; (GA): Direct ingestion of specific Microsoft XDR Advanced Hunting tables into the &lt;STRONG&gt;Microsoft Sentinel data lake&lt;/STRONG&gt; without requiring analytics-tier ingestion—explicitly positioned for long-retention, cost-effective storage and retrospective investigations at scale.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Microsoft 365 Copilot data connector&lt;/STRONG&gt; (public preview): Ingests Copilot-related audit/activity events via the Purview Unified Audit Log feed into a dedicated table (CopilotActivity) with explicit admin-role requirements and cost notes.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Multi-tenant content distribution expansion&lt;/STRONG&gt;: Adds support for distributing analytics rules, automation rules, workbooks, and built-in alert tuning rules across tenants via distribution profiles, with stated limitations (for example, automation rules that trigger a playbook cannot currently be distributed).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Alert schema differences for “standalone vs XDR connector”&lt;/STRONG&gt;: A must-cite engineering artifact documenting breaking/behavioral differences (CompromisedEntity semantics, field mapping changes, alert filtering differences) when moving to the consolidated Defender XDR connector path.&lt;/LI&gt;&lt;/UL&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;What’s new and when&lt;/H2&gt;&lt;H3&gt;Feature and release matrix&lt;/H3&gt;&lt;P&gt;The table below consolidates &lt;STRONG&gt;officially documented&lt;/STRONG&gt; Sentinel and Defender XDR features that are relevant to a “new announcements” technical article. If a source does not explicitly state GA/preview or a specific date, it is marked &lt;STRONG&gt;“unspecified.”&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Feature&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Concise description&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Status (official)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Announcement / release date&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Azure portal Sentinel retirement / redirection&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Sentinel management experience shifts to Defender portal; sunset date extended; post-sunset redirection expected&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Date explicitly stated&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Mar 31, 2027&lt;/STRONG&gt; sunset (date stated)&lt;/P&gt;&lt;P&gt;extension published &lt;STRONG&gt;Jan 29, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Sentinel in Defender portal (core GA)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Sentinel is GA in Defender portal, including for customers without Defender XDR/E5; unified SecOps surface&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;GA&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Doc updated &lt;STRONG&gt;Sep 30, 2025&lt;/STRONG&gt;; retirement note reiterated 2026&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;AI playbook generator&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Natural language → &lt;STRONG&gt;Python&lt;/STRONG&gt; playbook, documentation, and a visual flow diagram; VS Code + Cline experience&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 23, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Integration Profiles (playbook generator)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Centralized configuration objects (base URL, auth method, credentials) used by generated playbooks to call external APIs dynamically&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview feature component&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 23, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Enhanced Alert Trigger (generated playbooks)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Tenant-level trigger designed to target alerts across Sentinel + Defender + XDR sources and apply granular conditions&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview feature component&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 23, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;CCF Push&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Push-based ingestion model that reduces setup friction (DCR/DCE/app reg/RBAC), built on Logs Ingestion API; supports transformations and high-throughput ingestion&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Public preview&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 12–13, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Legacy custom data collection API retirement&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Retirement of legacy custom data collection API noted as part of connector modernization&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Retirement date stated&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Sep 2026&lt;/STRONG&gt; (retirement)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Data lake tier ingestion for Microsoft XDR Advanced Hunting tables&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Ingest selected Advanced Hunting tables from MDE/MDO/MDA directly into Sentinel data lake; supports long retention and lake-first analytics&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;GA&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 10, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Microsoft 365 Copilot data connector&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Ingests Copilot activities/audit logs; data lands in CopilotActivity; requires specific tenant roles to enable; costs apply&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Public preview&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 3, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Multi-tenant content distribution: expanded content types&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Adds support for analytics rules, automation rules, workbooks, and built-in alert tuning rules; includes limitations and prerequisites&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Stated as “supported”; feature described as part of public preview experience in monthly update&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Jan 29, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;GKE dedicated connector&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Dedicated connector built on CCF; ingests GKE cluster activity/workload/security events into GKEAudit; supports DCR transformations and lake-only ingestion&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;GA&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Mar 4, 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;UEBA behaviors layer&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;“Who did what to whom” behavior abstraction from raw logs; newer sources state GA; other page sections still label Preview&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;GA &lt;EM&gt;and&lt;/EM&gt; Preview labels appear in official sources (inconsistent)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 2026&lt;/STRONG&gt; (GA statement)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;UEBA widget in Defender portal home&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Home-page widget to surface anomalous user behavior and accelerate workflows&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Jan 2026&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Alert schema differences: standalone vs XDR connector&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Documents field mapping differences, CompromisedEntity behavior changes, and alert filtering/scoping differences&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Doc (behavioral/change reference)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Feb 4, 2026&lt;/STRONG&gt; (last updated)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Defender incident investigation: Blast radius analysis&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Graph visualization built on Sentinel data lake + graph for propagation path analysis&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview (per Defender XDR release notes)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Sep 2025&lt;/STRONG&gt; (release notes section)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Advanced hunting: Hunting graph&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Graph rendering of predefined threat scenarios in advanced hunting&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Preview (per Defender XDR release notes)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Sep 2025&lt;/STRONG&gt; (release notes section)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Sentinel repositories API version retirement&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;“Call to action” to update API versions: older versions retired June 1, 2026; enforcement June 15, 2026 for actions&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Dates explicitly stated&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;March 2026&lt;/STRONG&gt; (noticed); &lt;STRONG&gt;Jun 1 / Jun 15, 2026&lt;/STRONG&gt; (deadline/enforcement)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;H2&gt;Technical architecture and integrations&lt;/H2&gt;&lt;H3&gt;Unified reference architecture&lt;/H3&gt;&lt;P&gt;Microsoft’s official integration documentation describes two “centers of gravity” depending on how you operate:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In &lt;STRONG&gt;Defender portal mode&lt;/STRONG&gt;, Sentinel data is ingested alongside organizational data into the Defender portal, enabling SOC teams to analyze and respond from a unified surface.&lt;/LI&gt;&lt;LI&gt;In &lt;STRONG&gt;Azure portal mode&lt;/STRONG&gt;, Defender XDR incidents/alerts flow via Sentinel connectors and analysts work across both experiences.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Integration model: Defender suite and third-party security tools&lt;/H3&gt;&lt;P&gt;The Defender XDR integration doc is explicit about:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Supported Defender components whose alerts appear through the integration (Defender for Endpoint, Identity, Office 365, Cloud Apps), plus other services such as Purview DLP and Entra ID Protection.&lt;/LI&gt;&lt;LI&gt;Behavior when onboarding Sentinel to the Defender portal &lt;STRONG&gt;with Defender XDR licensing&lt;/STRONG&gt;: the Defender XDR connector is automatically set up and component alert-provider connectors are disconnected.&lt;/LI&gt;&lt;LI&gt;Expected latency: Defender XDR incidents typically appear in Sentinel UI/API within ~5 minutes, with additional lag before securityIncident ingestion is complete.&lt;/LI&gt;&lt;LI&gt;Cost model: Defender XDR &lt;STRONG&gt;alerts and incidents&lt;/STRONG&gt; that populate SecurityAlert / SecurityIncident are synchronized &lt;STRONG&gt;at no charge&lt;/STRONG&gt;, while other data types (for example, Advanced Hunting tables) are charged.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;For third-party tools, Microsoft’s monthly “What’s new” explicitly calls out new GA out-of-the-box connectors/solutions (examples include Mimecast audit logs, Vectra AI XDR, and Proofpoint POD email security) as part of an expanding connector ecosystem intended to unify visibility across cloud, SaaS, and on-premises environments.&lt;/P&gt;&lt;H2&gt;Telemetry, schemas, analytics, automation, and APIs&lt;/H2&gt;&lt;H3&gt;Data flows and ingestion engineering&lt;/H3&gt;&lt;H4&gt;CCF Push and the “push connector” ingestion path&lt;/H4&gt;&lt;P&gt;Microsoft’s CCF Push announcement frames the “old” model as predominantly polling-based (Sentinel periodically fetching from partner/customer APIs) and introduces push-based connectors where partners/customers send data &lt;STRONG&gt;directly&lt;/STRONG&gt; to a Sentinel workspace, emphasizing that “Deploy” can auto-provision the typical prerequisites: DCE, DCR, Entra app registration + secrets, and RBAC assignments.&lt;/P&gt;&lt;P&gt;Microsoft also states that CCF Push is built on the &lt;STRONG&gt;Logs Ingestion API&lt;/STRONG&gt;, with benefits including throughput, ingestion-time transformation, and system-table targeting.&lt;/P&gt;&lt;P&gt;A precise engineering description of the underlying Logs Ingestion API components (useful for your article even if your readers never build a connector) is documented in Azure Monitor:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Sender app authenticates via an app registration that has access to a &lt;STRONG&gt;DCR&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Sender sends JSON matching the DCR’s expected structure to a DCR endpoint or a &lt;STRONG&gt;DCE&lt;/STRONG&gt; (DCE required for Private Link scenarios).&lt;/LI&gt;&lt;LI&gt;The DCR can apply a &lt;STRONG&gt;transformation&lt;/STRONG&gt; to map/filter/enrich before writing to the target table.&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;DCR transformation (KQL)&lt;/H4&gt;&lt;P&gt;Microsoft documents “transformations in Azure Monitor” and provides concrete sample KQL snippets for common needs such as cost reduction and enrichment.&lt;/P&gt;&lt;P&gt;// Keep only Critical events&lt;BR /&gt;source | where severity == "Critical"&lt;BR /&gt;&lt;BR /&gt;// Drop a noisy/unneeded column&lt;BR /&gt;source | project-away RawData&lt;BR /&gt;&lt;BR /&gt;// Enrich with a simple internal/external IP classification (example)&lt;BR /&gt;source | extend IpLocation = iff(split(ClientIp,".")[0] in ("10","192"), "Internal", "External")&lt;/P&gt;&lt;P&gt;These are direct examples from Microsoft’s sample transformations guidance; they are especially relevant because ingestion-time filtering is one of the primary levers for both performance and cost management in Sentinel pipelines.&lt;/P&gt;&lt;P&gt;A Sentinel-specific nuance: Microsoft states that Sentinel-enabled Log Analytics workspaces are not subject to Azure Monitor’s filtering ingestion charge, regardless of how much data a transformation filters (while other Azure Monitor transformation cost rules still exist in general).&lt;/P&gt;&lt;H3&gt;Telemetry schemas and key tables you should call out&lt;/H3&gt;&lt;P&gt;A “new announcements” article aimed at detection engineers should explicitly name the tables that are impacted by new features:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Copilot connector → &lt;/STRONG&gt;&lt;STRONG&gt;CopilotActivity&lt;/STRONG&gt; table, with a published list of record types (for example, CopilotInteraction and related plugin/workspace/prompt-book operations) and explicit role requirements to enable (Global Administrator or Security Administrator).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Defender XDR incident/alert sync → &lt;/STRONG&gt;&lt;STRONG&gt;SecurityAlert&lt;/STRONG&gt;&lt;STRONG&gt; and &lt;/STRONG&gt;&lt;STRONG&gt;SecurityIncident&lt;/STRONG&gt; populated at no charge; other Defender data types (Advanced Hunting event tables such as DeviceInfo/EmailEvents) are charged.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Sentinel onboarding to Defender advanced hunting&lt;/STRONG&gt;: Sentinel alerts tied to incidents are ingested into AlertInfo and accessible in Advanced hunting; SecurityAlert is queryable even if not shown in the schema list in Defender (notable for KQL portability).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;UEBA “core” tables&lt;/STRONG&gt; (engineering relevance: query joins and tuning): IdentityInfo, BehaviorAnalytics, UserPeerAnalytics, Anomalies.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;UEBA behaviors layer tables&lt;/STRONG&gt; (new behavior abstraction): SentinelBehaviorInfo and SentinelBehaviorEntities, created only if behaviors layer is enabled.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Microsoft XDR Advanced Hunting lake tier ingestion GA&lt;/STRONG&gt;: explicit supported tables from MDE/MDO/MDA (for example DeviceProcessEvents, DeviceNetworkEvents, EmailEvents, UrlClickEvents, CloudAppEvents) and an explicit note that MDI support will follow.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Detection and analytics: UEBA and graph&lt;/H3&gt;&lt;H4&gt;UEBA operating model and scoring&lt;/H4&gt;&lt;P&gt;Microsoft’s UEBA documentation gives you citeable technical detail:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;UEBA uses machine learning to build behavioral profiles and detect anomalies versus baselines, incorporating peer group analysis and “blast radius evaluation” concepts.&lt;/LI&gt;&lt;LI&gt;Risk scoring is described with two different scoring models: BehaviorAnalytics.InvestigationPriority (0–10) vs Anomalies.AnomalyScore (0–1), with different processing characteristics (near-real-time/event-level vs batch/behavior-level).&lt;/LI&gt;&lt;LI&gt;UEBA Essentials is positioned as a maintained pack of prebuilt queries (including multi-cloud anomaly detection), and Microsoft’s February 2026 update adds detail about expanded anomaly detection across Azure/AWS/GCP/Okta and the anomalies-table-powered queries.&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;Sentinel data lake and graph as the new “analytics substrate”&lt;/H4&gt;&lt;P&gt;Microsoft’s data lake overview frames a two-tier model:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Analytics tier&lt;/STRONG&gt;: high-performance, real-time analytics supporting alerting/incident management.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Data lake tier&lt;/STRONG&gt;: centralized long-term storage for querying and Python-based analytics, designed for retention up to &lt;STRONG&gt;12 years&lt;/STRONG&gt;, with “single-copy” mirroring (data in analytics tier mirrored to lake tier).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Microsoft’s graph documentation states that if you already have Sentinel data lake, the required graph is auto-provisioned when you sign into the Defender portal, enabling experiences like hunting graph and blast radius. Microsoft also notes that while the experiences are included in existing licensing, enabling data sources can incur ingestion/processing/storage costs.&lt;/P&gt;&lt;H3&gt;Automation: AI playbook generator details that matter technically&lt;/H3&gt;&lt;P&gt;The playbook generator doc contains unusually concrete engineering constraints and required setup. Key technical points to carry into your article:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;: Security Copilot must be enabled with SCUs available (Microsoft states SCUs aren’t billed for playbook generation but are required), and the Sentinel workspace must be onboarded to Defender.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Roles&lt;/STRONG&gt;: Sentinel Contributor is required for authoring Automation Rules, and a Detection tuning role in Entra is required to use the generator; permissions may take up to two hours to take effect.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Integration Profiles&lt;/STRONG&gt;: explicitly defined as Base URL + auth method + required credentials; cannot change API URL/auth method after creation; supports multiple auth methods including OAuth2 client credentials, API key, AWS auth, Bearer/JWT, etc.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Enhanced Alert Trigger&lt;/STRONG&gt;: designed for broader coverage across Sentinel, Defender, and XDR alerts and tenant-level automation consistency.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Limitations&lt;/STRONG&gt;: Python only, alerts as the sole input type, no external libraries, max 100 playbooks/tenant, 10-minute runtime, line limits, and separation of enhanced trigger rules from standard alert trigger rules (no automatic migration).&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;APIs and code/CLI (official)&lt;/H3&gt;&lt;H4&gt;Create/update a DCR with Azure CLI (official)&lt;/H4&gt;&lt;P&gt;Microsoft documents an az monitor data-collection rule create workflow to create/update a DCR from a JSON file, which is directly relevant if your readers build their own “push ingestion” paths outside of CCF Push or need transformations not supported via a guided connector UI.&lt;/P&gt;&lt;P&gt;az monitor data-collection rule create \&lt;BR /&gt;&amp;nbsp; --location 'eastus' \&lt;BR /&gt;&amp;nbsp; --resource-group 'my-resource-group' \&lt;BR /&gt;&amp;nbsp; --name 'my-dcr' \&lt;BR /&gt;&amp;nbsp; --rule-file 'C:\MyNewDCR.json' \&lt;BR /&gt;&amp;nbsp; --description 'This is my new DCR'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Send logs via Azure Monitor Ingestion client (Python) (official)&lt;/H4&gt;&lt;P&gt;Microsoft’s Azure SDK documentation provides a straightforward LogsIngestionClient pattern (and the repo samples document the required environment variables such as DCE, rule immutable ID, and stream name).&lt;/P&gt;&lt;P&gt;import os&lt;BR /&gt;from azure.identity import DefaultAzureCredential&lt;BR /&gt;from azure.monitor.ingestion import LogsIngestionClient&lt;BR /&gt;&lt;BR /&gt;endpoint = os.environ["DATA_COLLECTION_ENDPOINT"]&lt;BR /&gt;rule_id = os.environ["LOGS_DCR_RULE_ID"]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # DCR immutable ID&lt;BR /&gt;stream_name = os.environ["LOGS_DCR_STREAM_NAME"]&amp;nbsp; # stream name in DCR&lt;BR /&gt;&lt;BR /&gt;credential = DefaultAzureCredential()&lt;BR /&gt;client = LogsIngestionClient(endpoint=endpoint, credential=credential)&lt;BR /&gt;&lt;BR /&gt;body = [&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {"Time": "2026-03-18T00:00:00Z", "Computer": "host1", "AdditionalContext": "example"}&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;# Actual upload method name/details depend on SDK version and sample specifics.&lt;BR /&gt;# Refer to official ingestion samples and README for the exact call.&lt;/P&gt;&lt;P&gt;The repo sample and README explicitly define the environment variables and the use of LogsIngestionClient + DefaultAzureCredential.&lt;/P&gt;&lt;H4&gt;Sentinel repositories API version retirement (engineering risk)&lt;/H4&gt;&lt;P&gt;Microsoft’s Sentinel release notes contain an explicit “call to action” that older REST API versions used for Sentinel Repositories will be retired (June 1, 2026) and that Source Control actions using older versions will stop being supported (starting June 15, 2026), recommending migration to specific versions. This is critical for “content-as-code” SOC engineering pipelines.&lt;/P&gt;&lt;H2&gt;Migration and implementation guidance&lt;/H2&gt;&lt;H3&gt;Prerequisites and planning gates&lt;/H3&gt;&lt;P&gt;A technically rigorous migration section should treat this as a set of gating checks. Microsoft’s transition guidance highlights several that can materially block or change behavior:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Portal transition has no extra cost&lt;/STRONG&gt;: Microsoft explicitly states transitioning to the Defender portal has no extra cost (billing remains Sentinel consumption).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Data storage and privacy policies change&lt;/STRONG&gt;: after onboarding, Defender XDR policies apply even when working with Sentinel data (data retention/sharing differences).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Customer-managed keys constraint for data lake&lt;/STRONG&gt;: CMK is not supported for data stored in Sentinel data lake; even broader, Sentinel data lake onboarding doc warns that CMK-enabled workspaces aren’t accessible via data lake experiences and that data ingested into the lake is encrypted with Microsoft-managed keys.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Region and data residency implications&lt;/STRONG&gt;: data lake is provisioned in the primary workspace’s region and onboarding may require consent to ingest Microsoft 365 data into that region if it differs.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Data appearance lag when switching tiers&lt;/STRONG&gt;: enabling ingestion for the first time or switching between tiers can take 90–120 minutes for data to appear in tables.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Step-by-step configuration tasks for the most “new” capabilities&lt;/H3&gt;&lt;H4&gt;Enable lake-tier ingestion for Advanced Hunting tables (GA)&lt;/H4&gt;&lt;P&gt;Microsoft’s GA announcement provides direct UI steps in the Defender portal:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Defender portal → Microsoft Sentinel → Configuration → Tables&lt;/LI&gt;&lt;LI&gt;Select an Advanced Hunting table (from the supported list)&lt;/LI&gt;&lt;LI&gt;Data Retention Settings → choose “Data lake tier” + set retention + save&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Microsoft states that this allows Defender data to remain accessible in the Advanced Hunting table for 30 days while a copy is sent to Sentinel data lake for long-term retention (up to 12 years) and graph/MCP-related scenarios.&lt;/P&gt;&lt;H4&gt;Deploy the Microsoft 365 Copilot data connector (public preview)&lt;/H4&gt;&lt;P&gt;Microsoft’s connector post provides the operational steps and requirements:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Install via Content Hub in the Defender portal (search “Copilot”, install solution, open connector page).&lt;/LI&gt;&lt;LI&gt;Enablement requires tenant-level Global Administrator or Security Administrator roles.&lt;/LI&gt;&lt;LI&gt;Data lands in CopilotActivity.&lt;/LI&gt;&lt;LI&gt;Ingestion costs apply based on Sentinel workspace settings or Sentinel data lake tier pricing.&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;Configure multi-tenant content distribution (expanded content types)&lt;/H4&gt;&lt;P&gt;Microsoft documents:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Navigate to “Content Distribution” in Defender multi-tenant management portal.&lt;/LI&gt;&lt;LI&gt;Create/select a distribution profile; choose content types; select content; choose up to 100 workspaces per tenant; save and monitor sync results.&lt;/LI&gt;&lt;LI&gt;Limitations: automation rules that trigger a playbook cannot currently be distributed; alert tuning rules limited to built-in rules (for now).&lt;/LI&gt;&lt;LI&gt;Prerequisites: access to more than one tenant via delegated access; subscription to Microsoft 365 E5 or Office E5.&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;Prepare for Defender XDR connector–driven changes&lt;/H4&gt;&lt;P&gt;Microsoft explicitly warns that incident creation rules are turned off for Defender XDR–integrated products to avoid duplicates and suggests compensating controls using Defender portal alert tuning or automation rules. It also warns that incident titles will be governed by Defender XDR correlation and recommends avoiding “incident name” conditions in automation rules (tags recommended).&lt;/P&gt;&lt;H3&gt;Common pitfalls and “what breaks”&lt;/H3&gt;&lt;P&gt;A strong engineering article should include a “what breaks” section, grounded in Microsoft’s own lists:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Schema and field semantics drift&lt;/STRONG&gt;: The “standalone vs XDR connector” schema differences doc calls out CompromisedEntity behavior differences, field mapping changes, and alert filtering differences (for example, Defender for Cloud informational alerts not ingested; Entra ID below High not ingested by default).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Automation delays and unsupported actions post-onboarding&lt;/STRONG&gt;: Transition guidance states automation rules might run up to 10 minutes after alert/incident changes due to forwarding, and that some playbook actions (like adding/removing alerts from incidents) are not supported after onboarding—breaking certain playbook patterns.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Incident synchronization boundaries&lt;/STRONG&gt;: incidents created in Sentinel via API/Logic App playbook/manual Azure portal aren’t synchronized to Defender portal (per transition doc).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Advanced hunting differences after data lake enablement&lt;/STRONG&gt;: auxiliary log tables are no longer available in Defender Advanced hunting once data lake is enabled; they must be accessed via data lake exploration KQL experiences.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;CI/CD failures from API retirement&lt;/STRONG&gt;: repository connection create/manage tooling that calls older API versions must migrate by June 1, 2026 to avoid action failures.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Performance and cost considerations&lt;/H3&gt;&lt;P&gt;Microsoft’s cost model is now best explained using tiering and retention:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Sentinel data lake tier is designed for cost-effective long retention up to 12 years, with analytics-tier data mirrored to the lake tier as a single copy.&lt;/LI&gt;&lt;LI&gt;For Defender XDR threat hunting data, Microsoft states it is available in analytics tier for 30 days by default; retaining beyond that and moving beyond free windows drives ingestion and/or storage costs depending on whether you extend analytics retention or store longer in lake tier.&lt;/LI&gt;&lt;LI&gt;Ingesting data directly to data lake tier incurs ingestion, storage, and processing costs; retaining in lake beyond analytics retention incurs storage costs.&lt;/LI&gt;&lt;LI&gt;Ingestion-time transformations are a first-class cost lever, and Microsoft explicitly frames filtering as a way to reduce ingestion costs in Log Analytics.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Sample deployment checklist&lt;/H3&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Phase&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Task&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Acceptance criteria (engineering)&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Governance&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Confirm target portal strategy and dates&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Internal cutover plan aligns with March 31, 2027 retirement; CI/CD deadlines tracked&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Identity/RBAC&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Validate roles for onboarding + automation&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Required Entra roles + Sentinel roles assigned; propagation delays accounted for&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Data lake readiness&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Decide whether to onboard to Sentinel data lake&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;CMK policy alignment confirmed; billing subscription owner identified; region implications reviewed&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Defender XDR integration&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Choose integration mode and test incident sync&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Incidents visible within expected latency; bi-directional sync fields behave as expected&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Schema regression&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Validate queries/rules against XDR connector schema&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;KQL regression tests pass; CompromisedEntity and filtering changes handled&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Connector modernization&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Inventory connectors; plan CCF / CCF Push transitions&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Function-based connectors migration plan; legacy custom data collection API retirement addressed&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Automation&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pilot AI playbook generator + enhanced triggers&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Integration Profiles created; generated playbooks reviewed; enhanced trigger scopes correct&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Multi-tenant operations&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Configure content distribution if needed&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Distribution profiles sync reliably; limitations documented; rollback/override plan exists&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Outage-proofing&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Update Sentinel repos tooling for API retirement&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;All source-control actions use recommended API versions before June 1, 2026&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;H2&gt;Use cases and customer impact&lt;/H2&gt;&lt;H3&gt;Detection and response scenarios that map to the new announcements&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Copilot governance and misuse detection&lt;/STRONG&gt;&lt;BR /&gt;The Copilot connector’s published record types enable detections for scenarios such as unauthorized plugin/workspace/prompt-book operations and anomalous Copilot interactions. Data is explicitly positioned for analytic rules, workbooks, automation, and threat hunting within Sentinel and Sentinel data lake.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Long-retention hunting on high-volume Defender telemetry (lake-first approach)&lt;/STRONG&gt;&lt;BR /&gt;Lake-tier ingestion for Advanced Hunting tables (GA) is explicitly framed around scale, cost containment, and retrospective investigations beyond “near-real-time” windows, while keeping 30-day availability in the Advanced Hunting tables themselves.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Faster automation authoring and customization (SOAR engineering productivity)&lt;/STRONG&gt;&lt;BR /&gt;Microsoft positions the playbook generator as eliminating rigid templates and enabling dynamic API calls across Microsoft and third-party tools via Integration Profiles, with preview-customer feedback claiming faster automation development (vendor-stated).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Multi-tenant SOC standardization (MSSP / large enterprise)&lt;/STRONG&gt;&lt;BR /&gt;Multi-tenant content distribution is explicitly designed to replicate detections, automation, and dashboards across tenants, reducing drift and accelerating onboarding, while keeping execution local to target tenants.&lt;/P&gt;&lt;H3&gt;Measurable benefit dimensions (how to discuss rigorously)&lt;/H3&gt;&lt;P&gt;Most Microsoft sources in this announcement set are descriptive (not benchmark studies). A rigorous article should therefore describe &lt;STRONG&gt;what you can measure&lt;/STRONG&gt;, and label any numeric claims as vendor-stated.&lt;/P&gt;&lt;P&gt;Recommended measurable dimensions grounded in the features as documented:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Time-to-detect / time-to-ingest&lt;/STRONG&gt;: CCF Push is positioned as real-time, event-driven delivery vs polling-based ingestion.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Time-to-triage / time-to-investigate&lt;/STRONG&gt;: UEBA layers (Anomalies + Behaviors) are designed to summarize and prioritize activity, with explicit scoring models and tables for query enrichment.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Incident queue pressure&lt;/STRONG&gt;: Defender XDR grouping/enrichment is explicitly described as reducing SOC queue size and time to resolve.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Cost-per-retained-GB and query cost&lt;/STRONG&gt;: tiering rules and retention windows define cost tradeoffs; ingestion-time transformations reduce cost by dropping unneeded rows/columns.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Vendor-stated metrics: Microsoft’s March 2026 “What’s new” roundup references an external buyer’s guide and reports “44% reduction in total cost of ownership” and “93% faster deployment times” as outcomes for organizations using Sentinel (treat as vendor marketing unless corroborated by an independent study in your environment).&lt;/P&gt;&lt;H2&gt;Comparison of old vs new Microsoft capabilities and competitor XDR positioning&lt;/H2&gt;&lt;H3&gt;Old vs new (Microsoft)&lt;/H3&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Capability&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;“Older” operating model (common patterns implied by docs)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;“New” model emphasized in announcements/release notes&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Primary SOC console&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Split experience (Azure portal Sentinel + Defender portal XDR)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Defender portal as the primary unified SecOps surface; Azure portal sunset&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Incident correlation engine&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Sentinel correlation features (e.g., Fusion in Azure portal)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Defender XDR correlation engine replaces Fusion for incident creation after onboarding; incident provider always “Microsoft XDR” in Defender portal mode&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Automation authoring&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Logic Apps playbooks + automation rules&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Adds AI playbook generator (Python) + Enhanced Alert Trigger, with explicit constraints/limits&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Custom ingestion&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Data Collector API legacy patterns + manual DCR/DCE plumbing&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;CCF Push built on Logs Ingestion API; emphasizes automated provisioning and transformation support&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Long retention&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Primarily analytics-tier retention strategies&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Data lake tier supports up to 12 years; lake-tier ingestion for AH tables GA; explicit tier/cost model&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Graph-driven investigations&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Basic incident graphs&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Blast radius analysis + hunting graph experiences built on Sentinel data lake + graph&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;H3&gt;Competitor XDR offerings (high-level, vendor pages)&lt;/H3&gt;&lt;P&gt;The table below is intentionally “high-level” and marks details as &lt;STRONG&gt;unspecified&lt;/STRONG&gt; unless explicitly stated on the cited vendor pages.&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Vendor&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Positioning claims (from official vendor pages)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Notes / unspecified items&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;CrowdStrike&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Falcon Insight XDR is positioned as “AI-native XDR” for “endpoint and beyond,” emphasizing detection/response and threat intelligence.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Data lake architecture, ingestion transformation model, and multi-tenant content distribution specifics are &lt;STRONG&gt;unspecified&lt;/STRONG&gt; in cited sources.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Palo Alto Networks&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Cortex XDR is positioned as integrated endpoint security with AI-driven operations and broader visibility; vendor site highlights outcome metrics in customer stories and “AI-driven endpoint security.”&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Lake/graph primitives, connector framework model, and schema parity details are &lt;STRONG&gt;unspecified&lt;/STRONG&gt; in cited sources.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;SentinelOne&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Singularity XDR is positioned as AI-powered response with automated workflows across the environment; emphasizes machine-speed incident response.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Specific SIEM-style retention tiering and documented ingestion-time transformations are &lt;STRONG&gt;unspecified&lt;/STRONG&gt; in cited sources.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 15:36:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/what-s-new-in-microsoft-sentinel-and-xdr-ai-automation-data-lake/m-p/4503442#M2652</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-03-18T15:36:22Z</dc:date>
    </item>
    <item>
      <title>Why there is no Signature status for the new process in the DeviceProcessEvent table?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/why-there-is-no-signature-status-for-the-new-process-in-the/m-p/4501503#M2646</link>
      <description>&lt;P&gt;According to the schema, there is only field for checking the initiating (parent) process digital signature, named InitiatingProcessSignatureStatus. So we have information if the process that initiated the execution is signed. However, in many security use-cases it is important to know if the spawned (child) process is digitally signed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's assume that Winword.exe (signed) executed unsigned binary - this is definitely different situation than Winword.exe executing some signed binary (although both may be suspicious, or legitimate).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I feel that some valuable information is not provided, and I'd like to know the reason. Is it related to the logging performance? Or some memory structures, that are present only for the already existing process?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2026 09:22:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/why-there-is-no-signature-status-for-the-new-process-in-the/m-p/4501503#M2646</guid>
      <dc:creator>rstanile</dc:creator>
      <dc:date>2026-03-12T09:22:30Z</dc:date>
    </item>
    <item>
      <title>Endpoint and EDR Ecosystem Connectors in Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/endpoint-and-edr-ecosystem-connectors-in-microsoft-sentinel/m-p/4499697#M2644</link>
      <description>&lt;P class="lia-align-justify"&gt;Most SOCs operate in mixed endpoint environments. Even if Microsoft Defender for Endpoint is your primary EDR, you may still run Cisco Secure Endpoint, WithSecure Elements, Knox, or Lookout in specific regions, subsidiaries, mobile fleets, or regulatory enclaves. The goal is not to replace any tool, but to standardize how signals become detections and response actions. This article explains an engineering-first approach: ingestion correctness, schema normalization, entity mapping, incident merging, and cross-platform response orchestration.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Think of these connectors as four different lenses on endpoint risk. Two provide classic EDR detections (Cisco, WithSecure). Two provide mobile security and posture signals (Knox, Lookout). The highest-fidelity outcomes come from correlating them with Microsoft signals (Defender for Endpoint device telemetry, Entra ID sign-ins, and threat intelligence).&lt;/P&gt;&lt;H2&gt;Cisco Secure Endpoint&lt;/H2&gt;&lt;P&gt;Typical signal types include malware detections, exploit prevention events, retrospective detections, device isolation actions, and file/trajectory context. Cisco telemetry is often hash-centric (SHA256, file reputation) which makes it excellent for IOC matching and cross-EDR correlation.&lt;/P&gt;&lt;H2&gt;WithSecure Elements&lt;/H2&gt;&lt;P&gt;WithSecure Elements tends to provide strong behavioral detections and ransomware heuristics, often including process ancestry and behavioral classification. It complements hash-based detections by providing behavior and incident context that can be joined to Defender process events.&lt;/P&gt;&lt;H2&gt;Samsung Knox Asset Intelligence&lt;/H2&gt;&lt;P&gt;Knox is posture-heavy. Typical signals include compliance state, encryption status, root/jailbreak indicators, patch level, device model identifiers and policy violations. This data is extremely useful for identity correlation: it helps answer whether a successful sign-in came from a device that should be trusted.&lt;/P&gt;&lt;H2&gt;Lookout Mobile Threat Defense&lt;/H2&gt;&lt;P&gt;Lookout focuses on mobile threats such as malicious apps, phishing, risky networks (MITM), device compromise indicators, and risk scores. Lookout signals are critical for identity attack chains because mobile phishing is often the precursor to token theft or credential reuse.&lt;/P&gt;&lt;H1&gt;2. Ingestion architecture: from vendor API to Sentinel tables&lt;/H1&gt;&lt;P&gt;Most third‑party connectors are API-based. In production, treat ingestion as a pipeline with reliability requirements.&lt;/P&gt;&lt;P&gt;The standard pattern is vendor API → connector runtime (codeless connector or Azure Function) → DCE → DCR transform → Log Analytics table.&lt;/P&gt;&lt;P&gt;Key engineering controls:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Secrets and tokens should be stored in Azure Key Vault where supported; rotate and monitor auth failures.&lt;/LI&gt;&lt;LI&gt;Use overlap windows (poll slightly more than the schedule interval) and deduplicate by stable event IDs.&lt;/LI&gt;&lt;LI&gt;Use DCR transforms to normalize fields early (device/user/IP/severity) and to filter obviously low-value noise.&lt;/LI&gt;&lt;LI&gt;Monitor connector health and ingestion lag; do not rely on ‘Connected’ status alone.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Ingestion health checks (KQL)&lt;/H2&gt;&lt;P&gt;// Freshness &amp;amp; lag per connector table (adapt table names to your workspace)&lt;BR /&gt;let lookback = 24h&lt;BR /&gt;union isfuzzy=true&lt;BR /&gt;&amp;nbsp; (&amp;lt;CiscoTable&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend Source="Cisco"),&lt;BR /&gt;&amp;nbsp; (&amp;lt;WithSecureTable&amp;gt; | extend Source="WithSecure"),&lt;BR /&gt;&amp;nbsp; (&amp;lt;KnoxTable&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend Source="Knox"),&lt;BR /&gt;&amp;nbsp; (&amp;lt;LookoutTable&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend Source="Lookout")&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(lookback)&lt;BR /&gt;| summarize LastEvent=max(TimeGenerated), Events=count() by Source&lt;BR /&gt;| extend IngestDelayMin = datetime_diff("minute", now(), LastEvent)&lt;BR /&gt;| order by IngestDelayMin desc&lt;/P&gt;&lt;P&gt;// Schema discovery (run after onboarding and after connector updates)&lt;BR /&gt;Cisco&amp;nbsp; &amp;nbsp; &amp;nbsp; | take 1 | getschema&lt;BR /&gt;WithSecureTable | take 1 | getschema&lt;BR /&gt;Knox&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| take 1 | getschema&lt;BR /&gt;Lookout&amp;nbsp; &amp;nbsp; | take 1 | getschema&lt;/P&gt;&lt;H1&gt;3. Normalization: make detections vendor-agnostic&lt;/H1&gt;&lt;P&gt;The most common failure mode in multi-EDR SOCs is writing separate rules per vendor. Instead, build one normalization function that outputs a stable schema. Then write rules once.&lt;/P&gt;&lt;P&gt;Recommended canonical fields:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Vendor, AlertId, EventTime, SeverityNormalized&lt;/LI&gt;&lt;LI&gt;DeviceName (canonical), AccountUpn (canonical), SourceIP&lt;/LI&gt;&lt;LI&gt;FileHash (when applicable), ThreatName/Category&lt;/LI&gt;&lt;LI&gt;CorrelationKey (stable join key such as DeviceName + FileHash or DeviceName + AlertId)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;// Example NormalizeEndpoint() pattern. Replace column_ifexists(...) mappings after getschema().&lt;BR /&gt;let NormalizeEndpoint = () {&lt;BR /&gt;union isfuzzy=true&lt;BR /&gt;(&lt;BR /&gt;&amp;nbsp; Cisco&lt;BR /&gt;&amp;nbsp; | extend Vendor="Cisco"&lt;BR /&gt;&amp;nbsp; | extend DeviceName=tostring(column_ifexists("hostname","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AccountUpn=tostring(column_ifexists("user","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SourceIP=tostring(column_ifexists("ip","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FileHash=tostring(column_ifexists("sha256","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatName=tostring(column_ifexists("threat_name","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SeverityNormalized=tolower(tostring(column_ifexists("severity","")))&lt;BR /&gt;),&lt;BR /&gt;(&lt;BR /&gt;&amp;nbsp; WithSecure&lt;BR /&gt;&amp;nbsp; | extend Vendor="WithSecure"&lt;BR /&gt;&amp;nbsp; | extend DeviceName=tostring(column_ifexists("hostname","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AccountUpn=tostring(column_ifexists("user","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SourceIP=tostring(column_ifexists("ip","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FileHash=tostring(column_ifexists("file_hash","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatName=tostring(column_ifexists("classification","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SeverityNormalized=tolower(tostring(column_ifexists("risk_level","")))&lt;BR /&gt;),&lt;BR /&gt;(&lt;BR /&gt;&amp;nbsp; Knox&lt;BR /&gt;&amp;nbsp; | extend Vendor="Knox"&lt;BR /&gt;&amp;nbsp; | extend DeviceName=tostring(column_ifexists("device_id","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AccountUpn=tostring(column_ifexists("user","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SourceIP="",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FileHash="",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatName=strcat("Device posture: ", tostring(column_ifexists("compliance_state",""))),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SeverityNormalized=tolower(tostring(column_ifexists("risk","")))&lt;BR /&gt;),&lt;BR /&gt;(&lt;BR /&gt;&amp;nbsp; Lookout&lt;BR /&gt;&amp;nbsp; | extend Vendor="Lookout"&lt;BR /&gt;&amp;nbsp; | extend DeviceName=tostring(column_ifexists("device_id","")),&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;AccountUpn=tostring(column_ifexists("user","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SourceIP=tostring(column_ifexists("source_ip","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FileHash="",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatName=tostring(column_ifexists("threat_type","")),&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SeverityNormalized=tolower(tostring(column_ifexists("risk_level","")))&lt;BR /&gt;)&lt;BR /&gt;| extend CorrelationKey = iff(isnotempty(FileHash), strcat(DeviceName, "|", FileHash), strcat(DeviceName, "|", ThreatName))&lt;BR /&gt;| project TimeGenerated, Vendor, DeviceName, AccountUpn, SourceIP, FileHash, ThreatName, SeverityNormalized, CorrelationKey, *&lt;BR /&gt;}&lt;/P&gt;&lt;H1&gt;4. Entity mapping and incident merging&lt;/H1&gt;&lt;P&gt;Sentinel’s incident experience improves dramatically when alerts include entity mapping. Map Host, Account, IP, and File (hash) where possible. Incident grouping should merge alerts by DeviceName and AccountUpn within a reasonable window (e.g., 6–24 hours) to avoid alert storms.&lt;/P&gt;&lt;H1&gt;5. Correlation patterns that raise confidence&lt;/H1&gt;&lt;P&gt;High-confidence detections come from confirmation across independent sensors. These patterns reduce false positives while catching real compromise chains.&lt;/P&gt;&lt;H2&gt;5.1 Multi-vendor confirmation (two EDRs agree)&lt;/H2&gt;&lt;P&gt;NormalizeEndpoint()&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(24h)&lt;BR /&gt;| summarize Vendors=dcount(Vendor), VendorSet=make_set(Vendor, 10) by DeviceName&lt;BR /&gt;| where Vendors &amp;gt;= 2&lt;/P&gt;&lt;H2&gt;5.2 Third-party detection confirmed by Defender process telemetry&lt;/H2&gt;&lt;P&gt;let tp =&lt;BR /&gt;NormalizeEndpoint()&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(6h)&lt;BR /&gt;| where ThreatName has_any ("powershell","ransom","credential","exploit")&lt;BR /&gt;| project TPTime=TimeGenerated, DeviceName, AccountUpn, Vendor, ThreatName&lt;BR /&gt;&lt;BR /&gt;tp&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceProcessEvents&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where Timestamp &amp;gt; ago(6h)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ProcessCommandLine has_any ("EncodedCommand","IEX","FromBase64String","rundll32","regsvr32")&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project MDETime=Timestamp, DeviceName=tostring(DeviceName), Proc=ProcessCommandLine&lt;BR /&gt;) on DeviceName&lt;BR /&gt;| where MDETime between (TPTime .. TPTime + 30m)&lt;BR /&gt;| project TPTime, MDETime, DeviceName, Vendor, ThreatName, Proc&lt;/P&gt;&lt;H2&gt;5.3 Mobile phishing signal followed by successful sign-in&lt;/H2&gt;&lt;P&gt;let mobile =&lt;BR /&gt;NormalizeEndpoint()&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(24h)&lt;BR /&gt;| where Vendor == "Lookout" and ThreatName has "phish"&lt;BR /&gt;| project MTDTime=TimeGenerated, AccountUpn, DeviceName, SourceIP&lt;BR /&gt;&lt;BR /&gt;mobile&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; SigninLogs&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where TimeGenerated &amp;gt; ago(24h)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ResultType == 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project SigninTime=TimeGenerated, AccountUpn=tostring(UserPrincipalName), IPAddress, AppDisplayName&lt;BR /&gt;) on AccountUpn&lt;BR /&gt;| where SigninTime between (MTDTime .. MTDTime + 30m)&lt;BR /&gt;| project MTDTime, SigninTime, AccountUpn, DeviceName, SourceIP, IPAddress, AppDisplayName&lt;/P&gt;&lt;H2&gt;5.4 Knox posture and high-risk sign-in&lt;/H2&gt;&lt;P&gt;let noncompliant =&lt;BR /&gt;NormalizeEndpoint()&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(7d)&lt;BR /&gt;| where Vendor=="Knox" and ThreatName has "NonCompliant"&lt;BR /&gt;| project DeviceName, AccountUpn, KnoxTime=TimeGenerated&lt;BR /&gt;&lt;BR /&gt;noncompliant&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; SigninLogs&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where TimeGenerated &amp;gt; ago(7d)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where RiskLevelDuringSignIn in ("high","medium")&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project SigninTime=TimeGenerated, AccountUpn=tostring(UserPrincipalName), RiskLevelDuringSignIn, IPAddress&lt;BR /&gt;) on AccountUpn&lt;BR /&gt;| where SigninTime between (KnoxTime .. KnoxTime + 2h)&lt;BR /&gt;| project KnoxTime, SigninTime, AccountUpn, DeviceName, RiskLevelDuringSignIn, IPAddress&lt;/P&gt;&lt;H1&gt;6. Response orchestration (SOAR) design&lt;/H1&gt;&lt;P&gt;Response should be consistent across vendors. Use a scoring model to decide whether to isolate a device, revoke tokens, or enforce Conditional Access. Prefer reversible actions, and log every automation step for audit.&lt;/P&gt;&lt;H2&gt;6.1 Risk scoring to gate playbooks&lt;/H2&gt;&lt;P&gt;let SevScore = (s:string) { case(s=="critical",5,s=="high",4,s=="medium",2,1) }&lt;BR /&gt;NormalizeEndpoint()&lt;BR /&gt;| where TimeGenerated &amp;gt; ago(24h)&lt;BR /&gt;| extend Score = SevScore(SeverityNormalized)&lt;BR /&gt;| summarize RiskScore=sum(Score), Alerts=count(), Vendors=make_set(Vendor, 10) by DeviceName, AccountUpn&lt;BR /&gt;| where RiskScore &amp;gt;= 8&lt;BR /&gt;| order by RiskScore desc&lt;/P&gt;&lt;P&gt;High-severity playbooks typically execute: (1) isolate device via Defender (if onboarded), (2) revoke tokens in Entra ID, (3) trigger Conditional Access block, (4) notify and open ITSM ticket. Medium-severity playbooks usually tag the incident, add watchlist entries, and notify analysts.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2026 10:21:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/endpoint-and-edr-ecosystem-connectors-in-microsoft-sentinel/m-p/4499697#M2644</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-03-05T10:21:30Z</dc:date>
    </item>
    <item>
      <title>Monthly news -  March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-march-2026/ba-p/4498458</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Monthly news - March 2026 Edition&lt;/P&gt;
&lt;P&gt;This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from February 2026. We are now including news related to Defender for Cloud in the Defender portal. For all other Defender for Cloud news, have a look at the dedicated Defender for Cloud Monthly News&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/microsoft-defender-for-cloud-customer-newsletter/4491637" target="_blank" rel="noopener" data-lia-auto-title="here" data-lia-auto-title-active="0"&gt;here&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;🚀 New Virtual Ninja Show episode:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=30e-LU-z5Xg&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=1" target="_blank" rel="noopener"&gt; New AI-powered SIEM migration experience&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;Microsoft Defender for Cloud is expanding to the Defender portal to provide a unified security experience across cloud and code environments&lt;/STRONG&gt;. As part of this expansion, some features are now available in the Microsoft Defender Portal, and additional capabilities will be added to the Defender portal over time. Follow instructions provided here to enable Defender for Cloud experience in XDR. Learn more on how to &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-portal/enable-preview-features" target="_blank" rel="noopener"&gt;enable preview features in the Defender portal&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;Generate playbooks using AI in Microsoft Sentinel&lt;/STRONG&gt;: The SOAR &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/automation/generate-playbook" target="_blank" rel="noopener"&gt;playbook generator&lt;/A&gt; creates python based automation workflows coauthored through a conversational experience with Cline, an AI coding agent. For more information, see &lt;A class="lia-external-url" href="https://aka.ms/PlaybookGenBlog" target="_blank" rel="noopener"&gt;the Playbook Generation blog post&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;The Microsoft Copilot Data Connector for Microsoft Sentinel&lt;/STRONG&gt;. This new connector allows for audit logs and activities generated by Copilot to be ingested into Microsoft Sentinel and Microsoft Sentinel data lake. The data can be used in analytic rules/custom detections, Workbooks, automation, and more.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Update: We are &lt;STRONG&gt;extending the sunset date for managing Microsoft Sentinel in the Azure portal to March 31, 2027&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The upcoming Sentinel update &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/update-changing-the-account-name-entity-mapping-in-microsoft-sentinel/4489040" target="_blank" rel="noopener" data-lia-auto-title="standardizes Account Name in analytics, incidents, and automation" data-lia-auto-title-active="0"&gt;standardizes Account Name in analytics, incidents, and automation&lt;/A&gt;. Starting July 1, 2026 for UPN-based mappings, Account Name will show only the UPN prefix, with new fields for full UPN and UPN suffix.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender Experts for Hunting &lt;STRONG&gt;customers can now set up Notification contacts&lt;/STRONG&gt;. These contacts are the individuals or groups that Microsoft needs to notify if there are critical incidents or service updates. Learn more &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/onboarding-defender-experts-for-hunting#tell-us-who-to-contact-for-important-matters" target="_blank" rel="noopener"&gt;on our docs&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The following &lt;STRONG&gt;advanced hunting schema tables are now generally available&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;IdentityAccountInfo&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;EntraIdSignInEvents&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;EntraIdSpnSignInEvents&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;GraphApiAuditEvents&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Lake only ingestion for Microsoft Defender Advanced Hunting tables is now General Available&lt;/STRONG&gt;. You can &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/lake-only-ingestion-for-microsoft-defender-advanced-hunting-tables-is-now-genera/4494206" target="_blank" rel="noopener" data-lia-auto-title="now ingest Advanced Hunting data into Sentinel Data lake" data-lia-auto-title-active="0"&gt;now ingest Advanced Hunting data into Sentinel Data lake&lt;/A&gt; without the need to ingest into the Microsoft Sentinel Analytics tier.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Custom Guidebooks (SOP) for Copilot Guided Response is now Generally Available! &lt;/STRONG&gt;Custom Guidebooks enable organizations to bring their own Standard Operating Procedures (SOPs) directly into the Copilot Guided Response experience, helping ensure investigations and remediation steps align with internal processes and best practices. Please find more information in &lt;U&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-xdr/security-upload-guide" target="_blank" rel="noopener" data-outlook-id="ccb386e0-2bc7-4365-b7f9-122fcb418beb"&gt;our documentation&lt;/A&gt;&lt;/U&gt;&lt;STRONG&gt;.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;On the new &lt;STRONG&gt;Custom Guidebooks&lt;/STRONG&gt;settings page in the portal, users can &lt;STRONG&gt;upload guidebooks&lt;/STRONG&gt; and review the parsed tasks generated from their SOP files.&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;(Public Preview) &lt;STRONG&gt;The Sentinel Codeless Connector Framework (CCF) Push feature&lt;/STRONG&gt;. CCF addresses a critical need: enabling seamless, automated, and immediate delivery of security data to Microsoft Sentinel, so teams can respond to threats as they happen.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;The UEBA behaviors layer in Microsoft Sentinel is now generally available&lt;/STRONG&gt;, summarizing clear, human‑readable behavioral insights from high-volume, raw security logs. The behaviors layer aggregates and sequences related events into normalized behaviors, helping analysts more quickly understand who did what to whom without manually correlating raw logs. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/entity-behaviors-layer" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel&lt;/A&gt;. &lt;BR /&gt;Watch the &lt;A href="https://www.youtube.com/watch?v=SqbxmGdMP7c" target="_blank" rel="noopener" data-linktype="external"&gt;UEBA behaviors webinar&lt;/A&gt; for a full overview and demo of the UEBA behaviors layer.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;To help SOC teams get value from behaviors from day one, &lt;STRONG&gt;Microsoft Sentinel now provides the&amp;nbsp;behaviors workbook&lt;/STRONG&gt; as part of the UEBA essentials solution. The workbook offers guided views and prebuilt, customizable analytics that turn rich behavioral data into actionable insights across three core SOC workflows. For more information about the workbook, see the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-microsoft-sentinel-ueba-behaviors-workbook/4448398" target="_blank" rel="noopener" data-linktype="external"&gt;Microsoft Sentinel Behaviors Workbook blog post&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint / Microsoft Defender Vulnerability Management&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;Microsoft Defender now has a Library Management for live response!&lt;/STRONG&gt; This is addressing a long standing pain point. You can now centrally manage Live Response scripts and files directly in the Defender portal, not just during a live response session. Read more details in &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/introducing-library-management-in-microsoft-defender/4494434" target="_blank" rel="noopener" data-lia-auto-title="this blog post" data-lia-auto-title-active="0"&gt;this blog post&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(General Availability) &lt;STRONG&gt;Effective Settings:&lt;/STRONG&gt; Effective Settings Reporting for device security settings is now available in GA! &lt;STRONG&gt;This report presents the actual security settings enforced on a specific device, capturing the real configuration&lt;/STRONG&gt; rather than just the admin’s intent. &lt;BR /&gt;This visibility empowers admins to easily track applied configurations and swiftly identify discrepancies.&lt;/P&gt;
&lt;P&gt;A new tab, named "Effective Settings", is now enabled on the device page, under the "Configuration Management" section. This tab displays:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;The actual value of each security setting&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The configuring source for each setting&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Configuration attempts from other sources that were not effectively applied&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;(General Availability) To reflect Defender Vulnerability Management's visibility into all software components identified in your organization, the&amp;nbsp;&lt;STRONG&gt;Vulnerable components&lt;/STRONG&gt;&amp;nbsp;page is now named&amp;nbsp;&lt;STRONG&gt;Software components&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;(General Availability) To provide comprehensive vulnerability management capabilities across all supported Windows versions,&amp;nbsp;&lt;STRONG&gt;Microsoft Defender Vulnerability Management now gathers software product vulnerability data on Windows 7 devices&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;The &lt;STRONG&gt;what's new and OS-specific release notes pages are now updated&lt;/STRONG&gt; to provide better visibility and access to new features, improvements, and fixes:
&lt;UL&gt;
&lt;LI&gt;The &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/whats-new-in-microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;what's new page&lt;/A&gt; is now named &lt;STRONG&gt;New features in Microsoft Defender for Endpoint&lt;/STRONG&gt; and includes both features and links to latest release notes.&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-endpoint-releases" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Release notes page&lt;/A&gt; now consolidates release details for all supported operating systems, including Windows Antivirus. The new page groups updates by platform and date, making it easier to find specific information.&lt;/LI&gt;
&lt;LI&gt;All previous release notes pages redirect to the consolidated release notes page.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Identity&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Webinar recording:&amp;nbsp;&lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=6MoV7SEEkJg" target="_blank" rel="noopener"&gt;Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks&lt;/A&gt; (YouTube)&lt;/STRONG&gt;&lt;BR /&gt;
&lt;P&gt;A new wave of identity attacks abuses legitimate authentication flows, allowing attackers to gain access without stealing passwords or breaking MFA. In this webinar recording the team breaks down how attackers trick users into approving malicious apps, how this leads to silent account takeover, and why traditional phishing defenses often miss it. &lt;SPAN style="color: rgb(30, 30, 30);"&gt;They also dive into the identity sync layer at the heart of hybrid environments. You’ll learn how Entra Connect Sync and Cloud Sync are protected as Tier-0 assets, how Microsoft Defender for Identity secures synchronization flows, and how the new application-based authentication model strengthens Entra Connect Sync against modern threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Office 365&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanding User reporting in Teams to Defender for Office 365 Plan 1&lt;/STRONG&gt;: Users can report external and intra-org&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-teams" data-linktype="relative-path" target="_blank"&gt;Microsoft Teams messages&lt;/A&gt;&amp;nbsp;from chats, standard, shared, and private channels, meeting conversations to Microsoft as malicious (security risk) the specified reporting mailbox, or both via&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-user-reported-messages-custom-mailbox" data-linktype="relative-path" target="_blank"&gt;user reported settings&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Cloud Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;As part of Microsoft's ongoing efforts to increase accuracy in Secure Score, &lt;STRONG&gt;security recommendation categories will be updated in March 2026&lt;/STRONG&gt;. As a result, identity and app Secure Scores may be impacted.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 02 Mar 2026 12:13:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-march-2026/ba-p/4498458</guid>
      <dc:creator>HeikeRitter</dc:creator>
      <dc:date>2026-03-02T12:13:48Z</dc:date>
    </item>
    <item>
      <title>Issues blocking DeepSeek</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/issues-blocking-deepseek/m-p/4497219#M2639</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am investigating DeepSeek usage in our Microsoft security environment and have found inconsistent behaviour between Defender for Cloud Apps, Defender for Endpoint, and IOC controls. I am hoping to understand if others have seen the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Environment&lt;/P&gt;&lt;P&gt;Full Microsoft security and management suite&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are seeing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Cloud Apps&lt;/P&gt;&lt;P&gt;DeepSeek is classified as an Unsanctioned app&lt;/P&gt;&lt;P&gt;Cloud Discovery shows ongoing traffic and active usage&lt;/P&gt;&lt;P&gt;Multiple successful sessions and data activity visible&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Endpoint Indicators&lt;/P&gt;&lt;P&gt;DeepSeek domains and URIs have been added as Indicators with Block action&lt;/P&gt;&lt;P&gt;Indicators show as successfully applied&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Advanced Hunting and Device Timeline&lt;/P&gt;&lt;P&gt;Multiple executable processes are initiating connections to DeepSeek domains&lt;/P&gt;&lt;P&gt;Examples include Edge, Chrome, and other executables making outbound HTTPS connections&lt;/P&gt;&lt;P&gt;Connection status is a mix of Successful and Unsuccessful&lt;/P&gt;&lt;P&gt;No block events recorded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Settings&lt;/P&gt;&lt;P&gt;Network Protection enabled in block mode&lt;/P&gt;&lt;P&gt;Web Content Filtering enabled&lt;/P&gt;&lt;P&gt;SmartScreen enabled&lt;/P&gt;&lt;P&gt;File Hash Computation enabled&lt;/P&gt;&lt;P&gt;Network Protection Reputation mode set to 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else had similar issues when trying to block DeepSeek or other apps via Microsoft security suite?&lt;/P&gt;&lt;P&gt;I am currently working with Microsoft support on this but wanted to ask here as well.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 02:45:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/issues-blocking-deepseek/m-p/4497219#M2639</guid>
      <dc:creator>KevinJohnson1</dc:creator>
      <dc:date>2026-02-26T02:45:18Z</dc:date>
    </item>
    <item>
      <title>Threat Intelligence &amp; Identity Ecosystem Connectors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/threat-intelligence-identity-ecosystem-connectors/m-p/4495200#M2638</link>
      <description>&lt;P&gt;Microsoft Sentinel’s capability can be greatly enhanced by integrating third-party threat intelligence (TI) feeds (e.g. GreyNoise, Team Cymru) with identity and access logs (e.g. OneLogin, PingOne). This article provides a detailed dive into each connector, data types, and best practices for enrichment and false-positive reduction. We cover how GreyNoise (including PureSignal/Scout), Team Cymru, OneLogin IAM, PingOne, and Keeper integrate with Sentinel – including available connectors, ingested schemas, and configuration. We then outline technical patterns for building TI-based lookup pipelines, scoring, and suppression rules to filter benign noise (e.g. GreyNoise’s known scanners), and enrich alerts with context from identity logs. We map attack chains (credential stuffing, lateral movement, account takeover) to Sentinel data, and propose KQL analytics rules and playbooks with MITRE ATT&amp;amp;CK mappings (e.g. T1110: Brute Force, T1595: Active Scanning). The report also includes guidance on deployment (ARM/Bicep examples), performance considerations for high-volume TI ingestion, and comparison tables of connector features. A mermaid flowchart illustrates the data flow from TI and identity sources into Sentinel analytics. All recommendations are drawn from official documentation and industry sources.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Threat Intel &amp;amp; Identity Connectors Overview&lt;/H2&gt;&lt;P&gt;&lt;STRONG&gt;GreyNoise (TI Feed):&lt;/STRONG&gt; GreyNoise provides “internet background noise” intelligence on IPs seen scanning or probing the Internet. The Sentinel &lt;STRONG&gt;GreyNoise Threat Intelligence&lt;/STRONG&gt; connector (Azure Marketplace) pulls data via GreyNoise’s API into Sentinel’s &lt;STRONG&gt;ThreatIntelligenceIndicator&lt;/STRONG&gt; table. It uses a daily Azure Function to fetch indicators (IP addresses and metadata like classification, noise, last_seen) and injects them as STIX-format indicators (Network IPs with provider “GreyNoise”). This feed can then be queried in KQL. Authentication requires a GreyNoise API key and a Sentinel workspace app with Contributor rights. GreyNoise’s goal is to help “filter out known opportunistic traffic” so analysts can focus on real threats. Official docs describe deploying the content pack and workbook template.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Ingested data:&lt;/STRONG&gt; IP-based indicators (malicious vs. benign scans), classifications (noise, riot, etc.), organization names, last-seen dates. All fields from GreyNoise’s IP lookup (e.g. classification, last_seen) appear in ThreatIntelligenceIndicator.NetworkDestinationIP, IndicatorProvider="GreyNoise", and related fields.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Query:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;ThreatIntelligenceIndicator&lt;BR /&gt;| where IndicatorProvider == "GreyNoise"&lt;BR /&gt;| summarize arg_max(TimeGenerated, *) by NetworkDestinationIP&lt;/P&gt;&lt;P&gt;This yields the latest GreyNoise record per IP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Team Cymru Scout (TI Context):&lt;/STRONG&gt; Team Cymru’s PureSignal™ Scout is a TI enrichment platform. The &lt;STRONG&gt;Team Cymru Scout&lt;/STRONG&gt; connector (via Azure Marketplace) ingests &lt;EM&gt;contextual data&lt;/EM&gt; (not raw logs) about IPs, domains, and account usage into Sentinel custom tables. It runs via an Azure Function that, given IP or domain inputs, populates tables like Cymru_Scout_IP_Data_* and Cymru_Scout_Domain_Data_CL. For example, an IP query yields multiple tables: Cymru_Scout_IP_Data_Foundation_CL, ..._OpenPorts_CL, ..._PDNS_CL, etc., containing open ports, passive DNS history, X.509 cert info, fingerprint data, etc. This feed requires a Team Cymru account (username/password) to access the Scout API.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Data types:&lt;/STRONG&gt; Structured TI metadata by IP/domain. No native ThreatIndicator insertion; instead, analysts query these tables to enrich events (e.g. join on SourceIP). The Sentintel TechCommunity notes that Scout “enriches alerts with real-time context on IPs, domains, and adversary infrastructure” and can help “reduce false positives”.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;OneLogin IAM (Identity Logs):&lt;/STRONG&gt; The &lt;STRONG&gt;OneLogin IAM&lt;/STRONG&gt; solution (Microsoft Sentinel content pack) ingests OneLogin platform events and user info via OneLogin’s REST API. Using the Codeless Connector Framework, it pulls from OneLogin’s &lt;EM&gt;Events API&lt;/EM&gt; and &lt;EM&gt;Users API&lt;/EM&gt;, storing data in custom tables OneLoginEventsV2_CL and OneLoginUsersV2_CL. Typical events include user sign-ins, MFA actions, app accesses, admin changes, etc. Prerequisites: create an OpenID Connect app in OneLogin (for client ID/secret) and register it in Azure (Global Admin). The connector queries hourly (or on schedule), within OneLogin’s rate limit of 5000 calls/hour.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Data mapping:&lt;/STRONG&gt; OneLoginEventsV2_CL (CL suffix indicates custom log) holds event records (time, user, IP, event type, result, etc.); OneLoginUsersV2_CL contains user account attributes. These can be joined or used in analytics. For example, a query might look for failed login events:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;OneLoginEventsV2_CL&lt;BR /&gt;| where Event_type_s == "UserSessionStart" and Result_s == "Failed"&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(Actual field names depend on schema.)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PingOne (Identity Logs):&lt;/STRONG&gt; The &lt;STRONG&gt;PingOne Audit&lt;/STRONG&gt; connector ingests audit activity from the PingOne Identity platform via its REST API. It creates the table PingOne_AuditActivitiesV2_CL. This includes administrator actions, user logins, console events, etc. You configure a PingOne API client (Client ID/Secret) and set up the Codeless Connector Framework. Logs are retrieved (with attention to PingOne’s license-based rate limits) and appended to the custom table. Analysts can query, for instance, PingOne_AuditActivitiesV2_CL for events like MFA failures or profile changes.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Keeper (Password Vault Logs – optional):&lt;/STRONG&gt; Keeper, a password management platform, can forward security events to Sentinel via Azure Monitor. As of latest docs, logs are sent to a custom log table (commonly KeeperLogs_CL) using Azure Data Collection Rules. In Keeper’s guide, you register an Azure AD app (“KeeperLogging”) and configure Azure Monitor data collection; then in the Keeper Admin Console you specify the DCR endpoint. Keeper events (e.g. user logins, vault actions, admin changes) are ingested into the table named (e.g.) Custom-KeeperLogs_CL. Authentication uses the app’s client ID/secret and a monitor endpoint URL. This is a bulk ingest of records, rather than a scheduled pull.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Data ingested:&lt;/STRONG&gt; custom Keeper events with fields like user, action, timestamp. Keeper’s integration is essentially via Azure Monitor (in the older Azure Sentinel approach).&lt;/P&gt;&lt;H2&gt;Connector Configuration &amp;amp; Data Ingestion&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Authentication and Rate Limits:&lt;/STRONG&gt; Most connectors require API keys or OAuth credentials. GreyNoise and Team Cymru use single keys/credentials, with the Azure Function secured by a Managed Identity. OneLogin and PingOne use client ID/secret and must respect their API limits (OneLogin ~5k calls/hour; PingOne depends on licensing). GreyNoise’s enterprise API allows bulk lookups; the community API is limited (10/day for free), so production integration requires an Enterprise plan.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Sentinel Tables:&lt;/STRONG&gt; Data is inserted either into built-in tables or custom tables. GreyNoise feeds the &lt;STRONG&gt;ThreatIntelligenceIndicator&lt;/STRONG&gt; table, populating fields like NetworkDestinationIP and ThreatSeverity (higher if classified “malicious”). Team Cymru’s Scout connector creates many Cymru_Scout_*_CL tables. OneLogin’s solution populates &lt;STRONG&gt;OneLoginEventsV2_CL&lt;/STRONG&gt; and &lt;STRONG&gt;OneLoginUsersV2_CL&lt;/STRONG&gt;. PingOne yields &lt;STRONG&gt;PingOne_AuditActivitiesV2_CL&lt;/STRONG&gt;. Keeper logs appear in a custom table (e.g. KeeperLogs_CL) as shown in Keeper’s guide.&amp;nbsp;&lt;EM&gt;Note:&lt;/EM&gt; Sentinel’s built-in identity tables (IdentityInfo, SigninLogs) are typically for Microsoft identities; third-party logs can be mapped to them via parsers or custom analytic rules but by default arrive in these custom tables.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Data Types &amp;amp; Schema:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;Threat Indicators:&lt;/EM&gt; In ThreatIntelligenceIndicator, GreyNoise IPs appear as &lt;STRONG&gt;NetworkDestinationIP&lt;/STRONG&gt; with associated fields (e.g. ThreatSeverity, IndicatorProvider="GreyNoise", ConfidenceScore, etc.). (Future STIX tables may be used after 2025.)&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Custom CL Logs:&lt;/EM&gt; OneLogin events may include fields such as user_id_s, user_login_s, client_ip_s, event_time, etc. (The published parser issues indicate fields like app_name_s, role_id_d, etc.) PingOne logs include eventType, user, clientIP, result. Keeper logs contain Action, UserName, etc. These raw fields can be &lt;STRONG&gt;normalized&lt;/STRONG&gt; in analytic rules or parsed by data transformations.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;Identity Info:&lt;/EM&gt; Although not directly ingested, identity attributes from OneLogin/PingOne (e.g. user roles, group IDs) could be periodically fetched and synced to Sentinel (via custom logic) to populate IdentityInfo records, aiding user-centric hunts.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Steps :&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;GreyNoise:&lt;/EM&gt; In Sentinel Content Hub, install the GreyNoise ThreatIntel solution. Enter your GreyNoise API key when prompted. The solution deploys an Azure Function (requires write access to Functions) and sets up an ingestion schedule. Verify the &lt;STRONG&gt;ThreatIntelligenceIndicator&lt;/STRONG&gt; table is receiving GreyNoise entries&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Team Cymru:&lt;/EM&gt; From Marketplace install “Team Cymru Scout”. Provide Scout credentials. The solution creates an Azure Function app. It defines a workflow to ingest or lookup IPs/domains. (Often, analysts trigger lookups rather than scheduled ingestion, since Scout is lookup-based.) Ensure roles: the Function’s managed identity needs Sentinel contributor rights.&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;OneLogin:&lt;/EM&gt; Use the Data Connectors UI. Authenticate OneLogin by creating a new Sentinel Web API authentication (with OneLogin’s client ID/secret). Enable both “OneLogin Events” and “OneLogin Users”. No agent is needed. After setup, data flows into OneLoginEventsV2_CL.&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;PingOne:&lt;/EM&gt; Similarly, configure the PingOne connector. Use the PingOne administrative console to register an OAuth client. In Sentinel’s connector blade, enter the client ID/secret and specify desired log types (Audit, maybe IDP logs). Confirm PingOne_AuditActivitiesV2_CL populates hourly.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;Keeper:&lt;/EM&gt; Register an Azure AD app (“KeeperLogging”) and assign it Monitoring roles (Publisher/Contributor) to your workspace and data collection endpoint. Create an Azure Data Collection Rule (DCR) and table (e.g. KeeperLogs_CL). In Keeper’s Admin Console (Reporting &amp;amp; Alerts → Azure Monitor), enter the tenant ID, client ID/secret, and the DCR endpoint URL (format: https://&amp;lt;DCE&amp;gt;/dataCollectionRules/&amp;lt;DCR_ID&amp;gt;/streams/&amp;lt;table&amp;gt;?api-version=2023-01-01). Keeper will then push logs.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;KQL Lookup:&lt;/STRONG&gt; To enrich a Sentinel event with these feeds, you might write:&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;OneLoginEventsV2_CL&lt;BR /&gt;| where EventType == "UserLogin" and Result == "Success"&lt;BR /&gt;| extend UserIP = ClientIP_s&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where IndicatorProvider == "GreyNoise" and ThreatSeverity &amp;gt;= 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project NetworkDestinationIP, Category&lt;BR /&gt;&amp;nbsp; ) on $left.UserIP == $right.NetworkDestinationIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This joins OneLogin sign-ins with GreyNoise’s list of malicious scanners.&lt;/P&gt;&lt;H2&gt;Enrichment &amp;amp; False-Positive Reduction&lt;/H2&gt;&lt;P&gt;&lt;STRONG&gt;IOC Enrichment Pipelines:&lt;/STRONG&gt; A robust TI pipeline in Sentinel often uses &lt;EM&gt;Lookup Tables&lt;/EM&gt; and &lt;EM&gt;Functions&lt;/EM&gt;. For example, ingested TI (from GreyNoise or Team Cymru) can be stored in reference data or scheduled lookup tables to enrich incoming logs. Patterns include: - &lt;STRONG&gt;Normalization:&lt;/STRONG&gt; Normalize diverse feeds into common STIX schema fields (e.g. all IPs to NetworkDestinationIP, all domains to DomainName) so rules can treat them uniformly.&lt;BR /&gt;- &lt;STRONG&gt;Confidence Scoring:&lt;/STRONG&gt; Assign a confidence score to each indicator (from vendor or based on recency/frequency). For GreyNoise, for instance, you might use classification (e.g. “malicious” vs. “benign”) and history to score IP reputation. In Sentinel’s ThreatIntelligenceIndicator.ConfidenceScore field you can set values (higher for high-confidence IOCs, lower for noisy ones).&lt;BR /&gt;- &lt;STRONG&gt;TTL &amp;amp; Freshness:&lt;/STRONG&gt; Some indicators (e.g. active C2 domains) expire, so setting a Time-To-Live is critical. Sentinel ingestion rules or parsers should use ExpirationDateTime or ValidUntil on indicators to avoid stale IOCs. For example, extend ValidUntil only if confidence is high.&lt;BR /&gt;- &lt;STRONG&gt;Conflict Resolution:&lt;/STRONG&gt; When the same IOC comes from multiple sources (e.g. an IP in both GreyNoise and TeamCymru), you can either merge metadata or choose the highest confidence. One approach: use the highest threat severity from any source. Sentinel’s ThreatType tags (e.g. malicious-traffic) can accommodate multiple providers.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;False-Positive Reduction Techniques:&lt;/STRONG&gt;&lt;BR /&gt;- &lt;STRONG&gt;GreyNoise Noise Scoring:&lt;/STRONG&gt; GreyNoise’s primary utility is filtering. If an IP is labeled noise=true (i.e. just scanning, not actively malicious), rules can deprioritize alerts involving that IP. E.g. suppress an alert if its source IP appears in GreyNoise as benign scanner.&lt;BR /&gt;- &lt;STRONG&gt;Team Cymru Reputation:&lt;/STRONG&gt; Use Scout data to gauge risk; e.g. if an IP’s open port fingerprint or domain history shows no malicious tags, it may be low-risk. Conversely, known hostile IP (e.g. seen in ransomware networks) should raise alert level. Scout’s thousands of context tags help refine a binary IOC.&lt;BR /&gt;- &lt;STRONG&gt;Contextual Identity Signals:&lt;/STRONG&gt; Leverage OneLogin/PingOne context to filter alerts. For instance, if a sign-in event is associated with a high-risk location (e.g. new country) &lt;EM&gt;and&lt;/EM&gt; the IP is a GreyNoise scan, flag it. If an IP is marked benign, drop or suppress. Correlate login failures: if a single IP causes many failures across multiple users, it might be credential stuffing (T1110) – but if that IP is known benign scanner, consider it low priority.&lt;BR /&gt;- &lt;STRONG&gt;Thresholding &amp;amp; Suppression:&lt;/STRONG&gt; Build analytic suppression rules. Example: only alert on &amp;gt;5 failed logins in 5 min from IP &lt;EM&gt;and&lt;/EM&gt; that IP is not noise. Or ignore DNS queries to domains that TI flags as benign/whitelisted. Apply tag-based rules: some connectors allow tagging known internal assets or trusted scan ranges to avoid alerts.&lt;/P&gt;&lt;P&gt;Use GreyNoise to suppress alerts:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;SecurityEvent&lt;BR /&gt;| where EventID == 4625 and Account != "SYSTEM"&lt;BR /&gt;| join kind=leftanti (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where IndicatorProvider == "GreyNoise" and Classification == "benign"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project NetworkSourceIP&lt;BR /&gt;&amp;nbsp; ) on $left.IPAddress == $right.NetworkSourceIP&lt;/P&gt;&lt;P&gt;This rule filters out Windows 4625 login failures originating from GreyNoise-known benign scanners.&lt;/P&gt;&lt;H2&gt;Identity Attack Chains &amp;amp; Detection Rules&lt;/H2&gt;&lt;P&gt;Modern account attacks often involve sequential activities. By combining identity logs with TI, we can detect advanced patterns. Below are common chains and rule ideas:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Credential Stuffing (MITRE T1110):&lt;/STRONG&gt; Often seen as many login failures followed by a success. &lt;EM&gt;Detection:&lt;/EM&gt; Look for multiple failed OneLogin/PingOne sign-ins for the same or different accounts from a single IP, then a success. Enrich with GreyNoise: if the source IP is in GreyNoise (indicating scanning), raise severity. R&lt;EM&gt;ule:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; let SuspiciousIP =&lt;BR /&gt;&amp;nbsp; OneLoginEventsV2_CL&lt;BR /&gt;&amp;nbsp; | where EventType == "UserSessionStart" and Result == "Failed"&lt;BR /&gt;&amp;nbsp; | summarize CountFailed=count() by ClientIP_s&lt;BR /&gt;&amp;nbsp; | where CountFailed &amp;gt; 5;&lt;BR /&gt;OneLoginEventsV2_CL&lt;BR /&gt;| where EventType == "UserSessionStart" and Result == "Success"&lt;BR /&gt;&amp;nbsp; and ClientIP_s in (SuspiciousIP | project ClientIP_s)&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ThreatType == "ip"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend GreyNoiseClass = tostring(Classification)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project IP=NetworkSourceIP, GreyNoiseClass&lt;BR /&gt;&amp;nbsp; ) on $left.ClientIP_s == $right.IP&lt;BR /&gt;| where GreyNoiseClass == "malicious"&lt;BR /&gt;| project TimeGenerated, Account_s, ClientIP_s, GreyNoiseClass&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Tactics:&lt;/EM&gt; Initial Access (T1110) – &lt;STRONG&gt;Severity:&lt;/STRONG&gt; High.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Account Takeover / Impossible Travel (T1198):&lt;/STRONG&gt; Sign-ins from unusual geographies or devices. &lt;EM&gt;Detection:&lt;/EM&gt; Compare user’s current sign-in location against historical baseline. Use OneLogin/PingOne logs: if two logins by same user occur in different countries with insufficient time to travel, trigger. Enrich: if the login IP is also known infrastructure (Team Cymru PDNS, etc.), raise alert. R&lt;EM&gt;ule:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PingOne_AuditActivitiesV2_CL&lt;BR /&gt;| where EventType_s == "UserLogin"&lt;BR /&gt;| extend loc = tostring(City_s) + ", " + tostring(Country_s)&lt;BR /&gt;| sort by TimeGenerated desc&lt;BR /&gt;| partition by User_s&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; where TimeGenerated &amp;lt; ago(24h) // check last day&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | summarize count(), min(TimeGenerated), max(TimeGenerated)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; )&lt;BR /&gt;| where max_TimeGenerated - min_TimeGenerated &amp;lt; 1h and count_&amp;gt;1 and (range(loc) contains ",")&lt;BR /&gt;| project User_s, TimeGenerated, loc&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;(This pseudo-query checks multiple locations in &amp;lt;1 hour.)&lt;/EM&gt; &lt;EM&gt;Tactics:&lt;/EM&gt; Reconnaissance / Initial Access – &lt;STRONG&gt;Severity:&lt;/STRONG&gt; Medium.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Lateral Movement (T1021):&lt;/STRONG&gt; Use of an account on multiple systems/apps. &lt;EM&gt;Detection:&lt;/EM&gt; Two or more distinct application/service authentications by same user within a short time. Use OneLogin app-id fields or audit logs for access. If these are followed by suspicious network activity (e.g. contacting C2 via GreyNoise), escalate. &lt;EM&gt;Tactics:&lt;/EM&gt; Lateral Movement – &lt;STRONG&gt;Severity:&lt;/STRONG&gt; High.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Privilege Escalation (T1098):&lt;/STRONG&gt; If an admin account is changed or MFA factors reset in OneLogin/PingOne, especially after anomalous login. &lt;EM&gt;Detection:&lt;/EM&gt; Monitor OneLogin admin events (“User updated”, “MFA enrolled/removed”). Cross-check the actor’s IP against threat feeds. &lt;EM&gt;Tactics:&lt;/EM&gt; Credential Access – &lt;STRONG&gt;Severity:&lt;/STRONG&gt; High.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Analytics Rules (KQL)&lt;/H2&gt;&lt;P&gt;Below are six illustrative Sentinel analytics rules combining TI and identity logs. Each rule shows logic, tactics, severity, and MITRE IDs. (Adjust field names per your schemas and normalize CL tables as needed.)&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Multiple Failed Logins from Malicious Scanner (T1110)&lt;/STRONG&gt; – &lt;EM&gt;High severity.&lt;/EM&gt; Detect &lt;EM&gt;credential stuffing&lt;/EM&gt; by identifying &amp;gt;5 failed login attempts from the same IP, where that IP is classified as malicious by GreyNoise.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp; let BadIP =&lt;BR /&gt;&amp;nbsp; OneLoginEventsV2_CL&lt;BR /&gt;&amp;nbsp; | where EventType == "UserSessionStart" and Result == "Failed"&lt;BR /&gt;&amp;nbsp; | summarize attempts=count() by SourceIP_s&lt;BR /&gt;&amp;nbsp; | where attempts &amp;gt;= 5;&lt;BR /&gt;OneLoginEventsV2_CL&lt;BR /&gt;| where EventType == "UserSessionStart" and Result == "Success"&lt;BR /&gt;&amp;nbsp; and SourceIP_s in (BadIP | project SourceIP_s)&lt;BR /&gt;| join (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where IndicatorProvider == "GreyNoise" and ThreatSeverity &amp;gt;= 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project MaliciousIP=NetworkDestinationIP&lt;BR /&gt;&amp;nbsp; ) on $left.SourceIP_s == $right.MaliciousIP&lt;BR /&gt;| extend AttackFlow="CredentialStuffing", MITRE="T1110"&lt;BR /&gt;| project TimeGenerated, UserName_s, SourceIP_s, MaliciousIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Correlate failed-then-success login from same IP plus GreyNoise-malign classification.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Impossible Travel / Anomalous Geo (T1198)&lt;/STRONG&gt; – &lt;EM&gt;Medium severity.&lt;/EM&gt; A user signs in from two distant locations within an hour.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; // Get last two logins per user&lt;BR /&gt;let lastLogins =&lt;BR /&gt;&amp;nbsp; PingOne_AuditActivitiesV2_CL&lt;BR /&gt;&amp;nbsp; | where EventType_s == "UserLogin" and Outcome_s == "Success"&lt;BR /&gt;&amp;nbsp; | sort by TimeGenerated desc&lt;BR /&gt;&amp;nbsp; | summarize first_place=arg_max(TimeGenerated, City_s, Country_s, SourceIP_s, TimeGenerated) by User_s;&lt;BR /&gt;let prevLogins =&lt;BR /&gt;&amp;nbsp; PingOne_AuditActivitiesV2_CL&lt;BR /&gt;&amp;nbsp; | where EventType_s == "UserLogin" and Outcome_s == "Success"&lt;BR /&gt;&amp;nbsp; | sort by TimeGenerated desc&lt;BR /&gt;&amp;nbsp; | summarize last_place=arg_min(TimeGenerated, City_s, Country_s, SourceIP_s, TimeGenerated) by User_s;&lt;BR /&gt;lastLogins&lt;BR /&gt;| join kind=inner prevLogins on User_s&lt;BR /&gt;| extend&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dist=geo_distance_2points(first_place_City_s, first_place_Country_s, last_place_City_s, last_place_Country_s)&lt;BR /&gt;| where dist &amp;gt; 1000 and (first_place_TimeGenerated - last_place_TimeGenerated) &amp;lt; 1h&lt;BR /&gt;| project Time=first_place_TimeGenerated, User=User_s, From=last_place_Country_s, To=first_place_Country_s, MITRE="T1198"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Compute geographic distance between last two logins; flag if too far too fast.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Suspicious Admin Change (T1098)&lt;/STRONG&gt; – &lt;EM&gt;High severity.&lt;/EM&gt; Detect a change to admin settings (like role assign or MFA reset) via PingOne, from a high-risk IP (Team Cymru or GreyNoise) or after failed logins.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PingOne_AuditActivitiesV2_CL&lt;BR /&gt;| where EventType_s in ("UserMFAReset", "UserRoleChange") // example admin events&lt;BR /&gt;| extend ActorIP = tostring(InitiatingIP_s)&lt;BR /&gt;| join (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ThreatSeverity &amp;gt;= 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project BadIP=NetworkDestinationIP&lt;BR /&gt;&amp;nbsp; ) on $left.ActorIP == $right.BadIP&lt;BR /&gt;| extend MITRE="T1098"&lt;BR /&gt;| project TimeGenerated, ActorUser_s, Action=EventType_s, ActorIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Raise if an admin action originates from known bad IP.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Malicious Domain Access (T1498):&lt;/STRONG&gt; &lt;EM&gt;Medium severity.&lt;/EM&gt; Internal logs (e.g. DNS or Web proxy) show access to a domain listed by Team Cymru Scout as C2 or reconnaissance.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;DeviceDnsEvents&lt;BR /&gt;| where QueryType == "A"&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cymru_Scout_Domain_Data_CL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ThreatTag_s == "Command-and-Control"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project DomainName_s&lt;BR /&gt;&amp;nbsp; ) on $left.QueryText == $right.DomainName_s&lt;BR /&gt;| extend MITRE="T1498"&lt;BR /&gt;| project TimeGenerated, DeviceName, QueryText&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Correlate internal DNS queries with Scout’s flagged C2 domains. (Requires that domain data is ingested or synced.)&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Brute-Force Firewall Blocked IP (T1110):&lt;/STRONG&gt; &lt;EM&gt;Low to Medium severity.&lt;/EM&gt; Firewall logs show an IP blocked for many attempts, and that IP is &lt;EM&gt;not&lt;/EM&gt; noise per GreyNoise (i.e., malicious scanner).&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;AzureDiagnostics&lt;BR /&gt;| where Category == "NetworkSecurityGroupFlowEvent" and msg_s contains "DIRECTION=Inbound" and Action_s == "Deny"&lt;BR /&gt;| summarize attemptCount=count() by IP = SourceIp_s, FlowTime=bin(TimeGenerated, 1h)&lt;BR /&gt;| where attemptCount &amp;gt; 50&lt;BR /&gt;| join kind=leftanti (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ThreatIntelligenceIndicator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where IndicatorProvider == "GreyNoise" and Classification == "benign"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project NoiseIP=NetworkDestinationIP&lt;BR /&gt;&amp;nbsp; ) on $left.IP == $right.NoiseIP&lt;BR /&gt;| extend MITRE="T1110"&lt;BR /&gt;| project IP, attemptCount, FlowTime&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Many inbound denies (possible brute force) from an IP &lt;EM&gt;not&lt;/EM&gt; whitelisted by GreyNoise.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;New Device Enrolled (T1078):&lt;/STRONG&gt; &lt;EM&gt;Low severity.&lt;/EM&gt; A user enrolls a new device or location for MFA after unusual login.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;OneLoginEventsV2_CL&lt;BR /&gt;| where EventType == "NewDeviceEnrollment"&lt;BR /&gt;| join kind=inner (&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; OneLoginEventsV2_CL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where EventType == "UserSessionStart" and Result == "Success"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | top 1 by TimeGenerated asc // assume prior login&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project User_s, loginTime=TimeGenerated, loginIP=ClientIP_s&lt;BR /&gt;&amp;nbsp; ) on User_s&lt;BR /&gt;| where loginIP != DeviceIP_s&lt;BR /&gt;| extend MITRE="T1078"&lt;BR /&gt;| project TimeGenerated, User_s, DeviceIP_s, loginIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;Logic:&lt;/EM&gt; Flag if new device added (strong evidence of account compromise).&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Note:&lt;/EM&gt; The above rules are illustrative. Tune threshold values (e.g. attempt counts) to your environment. Map the event fields (EventType, Result, etc.) to your actual schema. Use Severity mapping in rule configs as indicated and tag with MITRE IDs for context.&lt;/P&gt;&lt;H2&gt;TI-Driven Playbooks and Automation&lt;/H2&gt;&lt;P&gt;Automated response can amplify TI. Patterns include:&lt;BR /&gt;- &lt;STRONG&gt;IOC Blocking:&lt;/STRONG&gt; On alert (e.g. suspicious IP login), an automation runbook can call Azure Firewall, Azure Defender, or external firewall APIs to block the offending IP. For instance, a Logic App could trigger on the analytic alert, use the TI feed IP, and call AzFWNetworkRule PowerShell to add a deny rule.&lt;BR /&gt;- &lt;STRONG&gt;Enrichment Workflow:&lt;/STRONG&gt; After an alert triggers, an Azure Logic App playbook can enrich the incident by querying TI APIs. E.g., given an IP from the alert, call GreyNoise API or Team Cymru Scout API in real-time (via HTTP action), add the classification into incident details, and tag the incident accordingly (e.g. GreyNoiseStatus: malicious). This adds context for the analyst.&lt;BR /&gt;- &lt;STRONG&gt;Alert Suppression:&lt;/STRONG&gt; Implement playbook-driven suppression. For example, an alert triggered by an external IP can invoke a playbook that checks GreyNoise; if the IP is benign, the playbook can auto-close the alert or mark as false-positive, reducing analyst load.&lt;BR /&gt;- &lt;STRONG&gt;Automated TI Feed Updates:&lt;/STRONG&gt; Periodically fetch open-source or commercial TI and use a playbook to push new indicators into Sentinel’s TI store via the Graph API.&lt;BR /&gt;- &lt;STRONG&gt;Incident Enrichment:&lt;/STRONG&gt; On incident creation, a playbook could query OneLogin/PingOne for additional user details (like department or location via their APIs) and add as note in the incident.&lt;/P&gt;&lt;H2&gt;Performance, Scalability &amp;amp; Costs&lt;/H2&gt;&lt;P&gt;TI feeds and identity logs can be high-volume. Key considerations:&lt;BR /&gt;- &lt;STRONG&gt;Data Ingestion Costs:&lt;/STRONG&gt; Every log and TI indicator ingested into Sentinel is billable by the GB. Bulk TI indicator ingestion (like GreyNoise pulling thousands of IPs/day) can add storage costs. Use Sentinel’s &lt;EM&gt;Data Collection Rules&lt;/EM&gt; (DCR) to apply ingestion-time filters (e.g. only store indicators above a confidence threshold) to reduce volume. GreyNoise feed is typically modest (since it’s daily, maybe thousands of IPs). Identity logs (OneLogin/PingOne) depend on org size – could be megabytes per day. Use &lt;EM&gt;sentinel ingestion sl analytic filters&lt;/EM&gt; to drop low-value logs.&lt;BR /&gt;- &lt;STRONG&gt;Query Performance:&lt;/STRONG&gt; Custom log tables (OneLogin&lt;EM&gt;, PingOne&lt;/EM&gt;, KeeperLogs_CL) can grow large. Periodically archive old data (e.g. export &amp;gt;90 days to storage, then purge). Use &lt;EM&gt;materialized views&lt;/EM&gt; or &lt;EM&gt;scheduled summary tables&lt;/EM&gt; for heavy queries (e.g. pre-aggregate hourly login counts). For threat indicator tables, leverage built-in indices on IndicatorId and NetworkIP for fast joins. Use project-away _* to remove metadata from large join queries.&lt;BR /&gt;- &lt;STRONG&gt;Retention &amp;amp; Storage:&lt;/STRONG&gt; Configure retention per table. If historical TI is less needed, set shorter retention. Use Azure Monitor’s tiering/Archive for seldom-used data. For large TI volumes (e.g. feeding multiple TIPs), consider using &lt;STRONG&gt;Sentinel Data Lake&lt;/STRONG&gt; (or connecting Log Analytics to ADLS Gen2) to offload raw ingest cheaply.&lt;BR /&gt;- &lt;STRONG&gt;Scale-Out Architecture:&lt;/STRONG&gt; For very large environments, use multiple Sentinel workspaces (e.g. regional) and aggregate logs via Azure Lighthouse or Sentinel Fusion. TI feeds can be shared: one workspace collects TI, then distribute to others via Azure Sentinel’s TI management (feeds can be published and shared cross-workspaces).&lt;BR /&gt;- &lt;STRONG&gt;Connector Limits:&lt;/STRONG&gt; API rate limits dictate update frequency. Schedule connectors accordingly (e.g. daily for TI, hourly for identity events). Avoid hourly pulls of already static data (users list can be daily). For OneLogin/PingOne, use incremental tokens or webhooks if possible to reduce load.&lt;BR /&gt;- &lt;STRONG&gt;Monitoring Health:&lt;/STRONG&gt; Use Sentinel’s &lt;STRONG&gt;Log Analytics&lt;/STRONG&gt; and &lt;STRONG&gt;Monitor metrics&lt;/STRONG&gt; to track ingestion volume and connector errors. For example, monitor the Functions running GreyNoise/Scout for failures or throttling.&lt;/P&gt;&lt;H2&gt;Deployment Checklist &amp;amp; Guide&lt;/H2&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Prepare Sentinel Workspace:&lt;/STRONG&gt; Ensure a Log Analytics workspace with Sentinel enabled. Record the workspace ID and region.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Register Applications:&lt;/STRONG&gt; In Azure AD, create and note any Service Principal needed for functions or connectors (e.g. a Sentinel-managed identity for Functions). In each vendor portal, register API apps and credentials (OneLogin OIDC App, PingOne API client, Keeper AD app).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Network &amp;amp; Security:&lt;/STRONG&gt; If needed, configure firewall rules to allow outbound to vendor APIs.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Install Connectors:&lt;/STRONG&gt; In Sentinel &lt;EM&gt;Content Hub&lt;/EM&gt; or &lt;EM&gt;Marketplace&lt;/EM&gt;, install the solutions for GreyNoise TI, Team Cymru Scout, OneLogin IAM, PingOne. Follow each wizard to input credentials. Verify the “Data Types” (Logs, Alerts, etc.) are enabled.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Create Tables &amp;amp; Parsers (if manual):&lt;/STRONG&gt; For Keeper or unsupported logs, manually create custom tables (via DCR in Azure portal). Import JSON to define fields as shown in Keeper’s docs&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Test Data Flow:&lt;/STRONG&gt; After each setup, wait 1–24 hours and run a simple query on the destination table (e.g. OneLoginEventsV2_CL | take 5) to confirm ingestion.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Deploy Ingestion Rules:&lt;/STRONG&gt; Use Sentinel &lt;EM&gt;Threat intelligence ingestion rules&lt;/EM&gt; to fine-tune feeds (e.g. mark high-confidence feeds to extend expiration). Optionally tag/whitelist known good.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Configure Analytics:&lt;/STRONG&gt; Enable or create rules using the KQL above. Place them in the correct threat hunting or incident rule categories (Credential Access, Lateral Movement, etc.). Assign appropriate alert severity.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Set up Playbooks:&lt;/STRONG&gt; For automated actions (alert enrichment, IOC blocking), create Logic App playbooks. Test with mock alerts (dry run) to ensure correct API calls.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Tuning &amp;amp; Baseline:&lt;/STRONG&gt; After initial alerts, tune queries (thresholds, whitelists) to reduce noise. Maintain suppression lists (e.g. internal pentest IPs). Use the MITRE mapping in rule details for clarity.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Documentation &amp;amp; Training:&lt;/STRONG&gt; Document field mappings (e.g. OneLoginEvents fields), and train SOC staff on new TI-enriched alert fields.&lt;/LI&gt;&lt;/OL&gt;&lt;H2&gt;Connectors Comparison&lt;/H2&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Connector&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Data Sources&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Sent. Tables&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Update Freq.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Auth Method&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Key Fields Enriched&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Limits/Cost&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros/Cons&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;GreyNoise&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;IP intelligence (scanners)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;ThreatIntelligenceIndicator&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Daily (scheduled pull)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;API Key&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;IP classification, noise, classification&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;API key required; paid license for large usage&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros: Filters benign scans, broad scan visibility Con: Only IP-based (no domain/file).&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Team Cymru Scout&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Global IP/domain telemetry&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Cymru_Scout_*_CL (custom tables)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;On-demand or daily&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Account credentials&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Detailed IP/domain context (ports, PDNS, ASN, etc.)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Requires Team Cymru subscription. Potentially high cost for feed.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros: Rich context (open ports, DNS, certs); great for IOC enrichment. Con: Complex setup, data in custom tables only.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;OneLogin IAM&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OneLogin user/auth logs&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OneLoginEventsV2_CL, OneLoginUsersV2_CL&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Polls hourly&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OAuth2 (client ID/secret)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;User, app, IP, event type (login, MFA, etc.)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OneLogin API: 5K calls/hour. Data volume moderate.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros: Direct insight into cloud identity use; built-in parser available. Cons: Limited to OneLogin environment only.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;PingOne Audit&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;PingOne audit logs&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;PingOne_AuditActivitiesV2_CL&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Polls hourly&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OAuth2 (client ID/secret)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;User actions, admin events, MFA logs&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Rate limited by Ping license. Data volume moderate.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros: Captures critical identity events; widely used product. Cons: Requires PingOne Advanced license for audit logs.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;Keeper (custom)&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Keeper security events&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;KeeperLogs_CL (custom)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Push (continuous)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;OAuth2 (client ID/secret) + Azure DCR&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Vault logins, record accesses, admin changes&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;None (push model); storage costs.&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pros: Visibility into password vault activity (often blind spot). Cons: More manual setup; custom logs not parsed by default.&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;col style="width: 12.50%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;H2&gt;Data Flow Diagram&lt;/H2&gt;&lt;img /&gt;&lt;P&gt;This flowchart shows GreyNoise (GN) feeding the Threat Intelligence table, Team Cymru feeding enrichment tables, and identity sources pushing logs. All data converges into Sentinel, where enrichment lookups inform analytics and automated responses.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 12:21:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/threat-intelligence-identity-ecosystem-connectors/m-p/4495200#M2638</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-02-16T12:21:06Z</dc:date>
    </item>
    <item>
      <title>SAP &amp; Business-Critical App Security Connectors</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/sap-business-critical-app-security-connectors/m-p/4494574#M2635</link>
      <description>&lt;P&gt;I validated what it takes to make SAP and SAP-adjacent security signals operational in a SOC: reliable ingestion, stable schemas, and detections that survive latency and schema drift. I focus on four integrations into Microsoft Sentinel: SAP Enterprise Threat Detection (ETD) cloud edition (SAPETDAlerts_CL, SAPETDInvestigations_CL), SAP S/4HANA Cloud Public Edition agentless audit ingestion (ABAPAuditLog), Onapsis Defend (Onapsis_Defend_CL), and SecurityBridge (also ABAPAuditLog).&lt;BR /&gt;Because vendor API specifics for ETD Retrieval API / Audit Retrieval API aren’t publicly detailed in the accessible primary sources I could retrieve, I explicitly label pagination/rate/time-window behaviors as &lt;STRONG&gt;unspecified&lt;/STRONG&gt; where appropriate.&lt;/P&gt;&lt;H2&gt;Connector architectures and deployment patterns&lt;/H2&gt;&lt;P&gt;For SAP-centric telemetry I separate two planes:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;First is &lt;STRONG&gt;SAP application telemetry&lt;/STRONG&gt; that lands in SAP-native tables, especially ABAPAuditLog, ABAPChangeDocsLog, ABAPUserDetails, and ABAPAuthorizationDetails. These tables are the foundation for ABAP-layer monitoring and are documented with typed columns in Azure Monitor Logs reference.&lt;/P&gt;&lt;P&gt;Second is &lt;STRONG&gt;external “security product” telemetry&lt;/STRONG&gt; (ETD alerts, Onapsis findings). These land in custom tables (*_CL) and typically require a SOC-owned normalization layer to avoid brittle detections.&lt;/P&gt;&lt;P&gt;Within Microsoft’s SAP solution itself, there are two deployment models: &lt;STRONG&gt;agentless&lt;/STRONG&gt; and &lt;STRONG&gt;containerized connector agent&lt;/STRONG&gt;. The agentless connector uses &lt;STRONG&gt;SAP Cloud Connector&lt;/STRONG&gt; and &lt;STRONG&gt;SAP Integration Suite&lt;/STRONG&gt; to pull logs, and Microsoft documents it as the recommended approach; the containerized agent is being deprecated and disabled on September 14, 2026.&lt;/P&gt;&lt;P&gt;On the “implementation technology” axis, Sentinel integrations generally show up as: - &lt;STRONG&gt;Codeless Connector Framework (CCF)&lt;/STRONG&gt; pollers/pushers (SaaS-managed ingestion definitions with DCR support).&lt;BR /&gt;- &lt;STRONG&gt;Function/Logic App custom pipelines&lt;/STRONG&gt; using the Logs Ingestion API when you need custom polling, enrichment, or a vendor endpoint that isn’t modeled in CCF.&lt;/P&gt;&lt;P&gt;In my view, ETD and S/4HANA Cloud connectors are “agentless” from the Sentinel side (API credentials only), while Onapsis Defend and SecurityBridge connectors behave like &lt;STRONG&gt;push pipelines&lt;/STRONG&gt; because Microsoft requires an Entra app + DCR permissions (typical Logs Ingestion API pattern).&lt;/P&gt;&lt;H2&gt;Authentication and secrets handling&lt;/H2&gt;&lt;P&gt;Microsoft documents the required credentials per connector: - ETD cloud connector requires &lt;STRONG&gt;Client Id + Client Secret for ETD Retrieval API&lt;/STRONG&gt; (token mechanics &lt;STRONG&gt;unspecified&lt;/STRONG&gt;).&lt;BR /&gt;- S/4HANA Cloud Public Edition connector requires &lt;STRONG&gt;Client Id + Client Secret for Audit Retrieval API&lt;/STRONG&gt; (token mechanics &lt;STRONG&gt;unspecified&lt;/STRONG&gt;), and Microsoft notes “alternative authentication mechanisms” exist (details in linked repo are &lt;STRONG&gt;unspecified&lt;/STRONG&gt; in accessible sources).&lt;BR /&gt;- Onapsis Defend and SecurityBridge connectors require a &lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt; app registration and Azure permission to assign &lt;STRONG&gt;Monitoring Metrics Publisher&lt;/STRONG&gt; on DCRs. This maps directly to the Logs Ingestion API guidance, where a service principal is granted DCR access via that role (or the Microsoft.Insights/Telemetry/Write data action).&amp;nbsp;&lt;/P&gt;&lt;P&gt;For production, I treat these as “SOC platform secrets”: - Store client secrets/certificates in Key Vault when you own the pipeline (Function/Logic App); rotate on an operational schedule; alert on auth failures and sudden ingestion drops.&lt;BR /&gt;- For vendor-managed ingestion (Onapsis/SecurityBridge), I still require: documented ownership of the Entra app, explicit RBAC scope for the DCR, and change control for credential rotation because a rotated secret is effectively a data outage.&lt;/P&gt;&lt;H2&gt;API behaviors and ingestion reliability&lt;/H2&gt;&lt;P&gt;For ETD Retrieval API and Audit Retrieval API, &lt;STRONG&gt;pagination/rate limits/time windows are unspecified&lt;/STRONG&gt; in the accessible vendor documentation I could retrieve. I therefore design ingestion and detections assuming non-ideal API behavior: late-arriving events, cursor/page limitations, and throttling.&lt;/P&gt;&lt;P&gt;CCF’s RestApiPoller model supports explicit retry policy, windowing, and multiple paging strategies, so if/when you can obtain vendor API semantics, you can encode them declaratively (rather than writing fragile code).&lt;/P&gt;&lt;P&gt;For the SAP solution’s telemetry plane, Microsoft provides strong operational cues: agentless collection flows through Integration Suite, and troubleshooting typically happens in the Integration Suite message log; this is where I validate delivery failures before debugging Sentinel-side parsers.&lt;/P&gt;&lt;P&gt;For scheduled detections, I always account for ingestion delay explicitly. Microsoft’s guidance is to widen event lookback by expected delay and then constrain on ingestion_time() to prevent duplicates from overlap.&lt;/P&gt;&lt;H2&gt;Schema, DCR transformations, and normalization layer&lt;/H2&gt;&lt;H3&gt;Connector attribute comparison&lt;/H3&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Connector&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Auth method&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Sentinel tables&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Default polling&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Backfill&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Pagination&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Rate limits&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;SAP ETD (cloud)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Client ID + Secret (ETD Retrieval API)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;SAPETDAlerts_CL, SAPETDInvestigations_CL&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;SAP S/4HANA Cloud (agentless)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Client ID + Secret (Audit Retrieval API); alt auth referenced&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;ABAPAuditLog&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;Onapsis Defend&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Entra app + DCR permission (Monitoring Metrics Publisher)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Onapsis_Defend_CL&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;n/a (push pattern)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;n/a&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;P&gt;SecurityBridge&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;Entra app + DCR permission (Monitoring Metrics Publisher)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;ABAPAuditLog&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;n/a (push pattern)&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;n/a&lt;/P&gt;&lt;/td&gt;&lt;td&gt;&lt;P&gt;&lt;STRONG&gt;unspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;col style="width: 14.29%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;H3&gt;Ingestion-time DCR transformations&lt;/H3&gt;&lt;P&gt;Sentinel supports ingestion-time transformations through DCRs to filter, enrich, and mask data before it’s stored.&lt;/P&gt;&lt;P&gt;Example: I remove low-signal audit noise and mask email identifiers in ABAPAuditLog:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;source&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where isnotempty(TransactionCode) and isnotempty(User)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where TransactionCode !in ("SM21","ST22")&amp;nbsp; // example noise; tune per tenant&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| extend Email = iif(Email has "@", strcat(substring(Email,0,2),"***@", tostring(split(Email,"@")[1])), Email)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Normalization functions&lt;/H3&gt;&lt;P&gt;Microsoft explicitly recommends using SAP solution functions instead of raw tables because they can change the infrastructure beneath without breaking detections. I follow the same pattern for ETD/Onapsis custom tables: I publish SOC-owned functions as a schema contract.&lt;/P&gt;&lt;P&gt;.create-or-alter function with (folder="SOC/SAP") Normalize_ABAPAudit() {&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; ABAPAuditLog&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; | project TimeGenerated, SystemId, ClientId, User, TransactionCode, TerminalIpV6, MessageId, MessageClass, MessageText, AlertSeverityText, UpdatedOn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;.create-or-alter function with (folder="SOC/SAP") Normalize_ETDAlerts() {&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; SAPETDAlerts_CL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; | extend&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AlertId = tostring(coalesce(column_ifexists("AlertId",""), column_ifexists("id",""))),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Severity = tostring(coalesce(column_ifexists("Severity",""), column_ifexists("severity",""))),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SapUser = tostring(coalesce(column_ifexists("SAP_User",""), column_ifexists("User",""), column_ifexists("user","")))&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; | project TimeGenerated, AlertId, Severity, SapUser, *&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;.create-or-alter function with (folder="SOC/SAP") Normalize_Onapsis() {&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; Onapsis_Defend_CL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; | extend&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FindingId = tostring(coalesce(column_ifexists("FindingId",""), column_ifexists("id",""))),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Severity&amp;nbsp; = tostring(coalesce(column_ifexists("Severity",""), column_ifexists("severity",""))),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SapUser&amp;nbsp;&amp;nbsp; = tostring(coalesce(column_ifexists("SAP_User",""), column_ifexists("user","")))&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; | project TimeGenerated, FindingId, Severity, SapUser, *&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Health/lag monitoring and anti-gap&lt;/H3&gt;&lt;P&gt;I monitor both connector health and ingestion delay. SentinelHealth is the native health table, and Microsoft provides a health workbook and a schema reference for the fields.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let lookback=24h;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;union isfuzzy=true&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; (ABAPAuditLog | extend T="ABAPAuditLog"),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; (SAPETDAlerts_CL | extend T="SAPETDAlerts_CL"),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; (Onapsis_Defend_CL | extend T="Onapsis_Defend_CL")&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(lookback)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| summarize LastEvent=max(TimeGenerated),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P95DelaySec=percentile(datetime_diff("second", ingestion_time(), TimeGenerated), 95),&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Events=count()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; by T&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anti-gap scheduled-rule frame (Microsoft pattern):&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let ingestion_delay=10m;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;let rule_lookback=5m;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ABAPAuditLog&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where TimeGenerated &amp;gt;= ago(ingestion_delay + rule_lookback)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where ingestion_time() &amp;gt; ago(rule_lookback)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;SOC detections for ABAP privilege abuse, fraud/insider behavior, and audit readiness&lt;/H2&gt;&lt;H3&gt;Privileged ABAP transaction monitoring&lt;/H3&gt;&lt;P&gt;ABAPAuditLog includes TransactionCode, User, SystemId, and terminal/IP fields, so I start with a curated high-risk tcode set and then add baselines.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let PrivTCodes=dynamic(["SU01","PFCG","SM59","RZ10","SM49","SE37","SE16","SE16N"]);&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Normalize_ABAPAudit()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where TransactionCode in (PrivTCodes)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| summarize Actions=count(), Ips=make_set(TerminalIpV6,5) by SystemId, User, TransactionCode, bin(TimeGenerated, 1h)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where Actions &amp;gt;= 3&lt;/EM&gt;&lt;/P&gt;&lt;H3&gt;Fraud/insider scenario: sensitive object change near privileged audit activity&lt;/H3&gt;&lt;P&gt;ABAPChangeDocsLog exposes ObjectClass, ObjectId, and change types; I correlate sensitive object changes to privileged transactions in a tight window.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let w=10m;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;let Sensitive=dynamic(["BELEG","BPAR","PFCG","IDENTITY"]);&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ABAPChangeDocsLog&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where ObjectClass in (Sensitive)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| project ChangeTime=TimeGenerated, SystemId, User=tostring(column_ifexists("User","")), ObjectClass, ObjectId, TypeOfChange=tostring(column_ifexists("ItemTypeOfChange",""))&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| join kind=innerunique (&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Normalize_ABAPAudit()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project AuditTime=TimeGenerated, SystemId, User, TransactionCode&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;) on SystemId, User&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where AuditTime between (ChangeTime-w .. ChangeTime+w)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| project ChangeTime, AuditTime, SystemId, User, ObjectClass, ObjectId, TransactionCode, TypeOfChange&lt;/EM&gt;&lt;/P&gt;&lt;H3&gt;Audit-ready pipeline: monitoring continuity and configuration touchpoints&lt;/H3&gt;&lt;P&gt;I treat audit logging itself as a monitored control. A simple SOC-safe control is “volume drop” by system; it’s vendor-agnostic and catches pipeline breaks and deliberate suppression.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Normalize_ABAPAudit()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| summarize PerHour=count() by SystemId, bin(TimeGenerated, 1h)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| summarize Avg=avg(PerHour), Latest=arg_max(TimeGenerated, PerHour) by SystemId&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where Latest_PerHour &amp;lt; (Avg * 0.2)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Where Onapsis/ETD are present, I increase fidelity by requiring “privileged ABAP activity” plus an external SAP-security product finding (field mappings are tenant-specific; normalize first):&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let win=1h;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Normalize_ABAPAudit()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where TransactionCode in ("SU01","PFCG","SM59","SE16N")&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| join kind=leftouter (Normalize_Onapsis()) on $left.User == $right.SapUser&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| where isempty(FindingId) == false and TimeGenerated1 between (TimeGenerated .. TimeGenerated+win)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;| project TimeGenerated, SystemId, User, TransactionCode, FindingId, OnapsisSeverity=Severity&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Production validation, troubleshooting, and runbook&lt;/H2&gt;&lt;P&gt;For acceptance, I validate in this order: table creation, freshness/lag percentiles, connector health state, and cross-check of event counts against the upstream system for the same UTC window (where available). Connector health monitoring is built around SentinelHealth plus the Data collection health workbook.&lt;/P&gt;&lt;P&gt;For SAP agentless ingestion, Microsoft states most troubleshooting happens in Integration Suite message logs—this is where I triage authentication/networking failures before tuning KQL.&lt;/P&gt;&lt;P&gt;For Onapsis/SecurityBridge-style ingestion, I validate Entra app auth, DCR permission assignment (Monitoring Metrics Publisher), and a minimal ingestion test payload using the Logs Ingestion API tutorial flow.&lt;/P&gt;&lt;P&gt;Operational runbook items I treat as non-optional: health alerts on connector failure and freshness drift; scheduled rule anti-gap logic; playbooks that capture evidence bundles (ABAPAuditLog slice + user context from ABAPUserDetails/ABAPAuthorizationDetails); DCR filters to reduce noise and cost; and change control for normalization functions and watchlists.&lt;/P&gt;&lt;P&gt;SOC “definition of done” checklist (short): 1) Tables present and steadily ingesting; 2) P95 ingestion delay measured and rules use the anti-gap pattern; 3) SentinelHealth enabled with alerts; 4) SOC-owned normalization functions deployed; 5) at least one privileged-tcode rule + one change-correlation rule + one audit-continuity rule in production.&lt;/P&gt;&lt;P&gt;Mermaid ingestion flow:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 13:58:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/sap-business-critical-app-security-connectors/m-p/4494574#M2635</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-02-12T13:58:11Z</dc:date>
    </item>
    <item>
      <title>From signal to strategy: Closing attack paths with identity intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/from-signal-to-strategy-closing-attack-paths-with-identity/ba-p/4491856</link>
      <description>&lt;P&gt;Compromised credentials remain one of the most common entry points for attackers. In the first half of 2025 alone, &lt;A href="https://blogs.microsoft.com/on-the-issues/2025/10/16/mddr-2025/#:~:text=Adversaries%20aren't%20breaking%20in,based%20attacks%20surged%20by%2032%25." target="_blank" rel="noopener"&gt;identity-based attacks surged more than 32% and its estimated that 97% of them are password focused&lt;/A&gt;. While that scale is overwhelming, it only takes a single exposed account to give an attacker a foothold from which they can move laterally towards the critical assets they are after. At today’s attack scale, identity signals need to be connected with broader context to stop attacks earlier in the kill chain.&lt;/P&gt;
&lt;P&gt;Today we are excited to share more about how Microsoft Defender can help security professionals proactively understand how identity-related risks, like leaked credentials, relate back to critical assets, helping security professionals proactively close potential entry points before they can be exploited.&lt;/P&gt;
&lt;H2&gt;Understanding leaked credentials and attack paths:&lt;/H2&gt;
&lt;P&gt;Leaked credentials refer to valid usernames and passwords that have been exposed beyond their intended scope. Whether this exposure occurs as part of a data breach, phishing attack, or postings on dark web forums, the result is the same: an attacker may be using legitimate credentials to access your organization.&lt;/P&gt;
&lt;P&gt;Similarly, attack paths describe the sequence of misconfigurations, permissions, and trust relationships that an attacker can chain together to move from an initial foothold to high‑value resources. Rather than relying on a single vulnerability, attackers tend to think in graphs, following paths of least resistance to systematically escalate privileges and expand access. This makes identities the primary control plane they target and leaked credentials as an extremely common entry point. The recent Microsoft digital defense report put this into focus, stating that more than &lt;A href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/?msockid=045bd99662826f600aa4caf166826d6e" target="_blank" rel="noopener"&gt;61% of attack paths lead to a sensitive user&lt;/A&gt;. These user accounts have elevated privileges or access to critical resources meaning that if they were to be attacked or misused it would significantly impact the organization.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Microsoft’s differentiated approach&lt;/H2&gt;
&lt;P&gt;Most solutions stop at the alert and can only tell you that a password was exposed, found, or leaked. That information matters, but it is incomplete, it describes an event, not the risk.&lt;/P&gt;
&lt;P&gt;The real differentiation starts with the next question: &lt;STRONG&gt;what does this exposure mean for my environment right now&lt;/STRONG&gt;. Not every exposed password creates the same level of risk. Context is what determines impact. Which identity does the password belong to? What assets can that identity access? Does that access still exists? And are those assets truly sensitive?&lt;/P&gt;
&lt;P&gt;That is why exposed password detection is a starting point, not an end state. Effective protection begins when organizations move beyond technical alerts and toward an identity-aware understanding. This shift from detection to context is where better decisions are made and where meaningful security value is created. This is why we took our identity alerts a step further, connecting these risks with broader security context to reveal how an initial identity signal can lead to sensitive users, critical assets, and core business operations.&lt;/P&gt;
&lt;P&gt;This perspective moves security beyond isolated alerts to prioritized, actionable insight that shows not just &lt;EM&gt;if&lt;/EM&gt; risk exists, but &lt;EM&gt;how&lt;/EM&gt; identity‑based threats could unfold and &lt;EM&gt;where to intervene&lt;/EM&gt; to stop them before they have impact.&lt;/P&gt;
&lt;P&gt;In the case of leaked credentials, Microsoft continuously scans for exposed accounts across public and private breach sources. If a match is found, Microsoft’s Advanced Correlation Engine (MACE) automatically identifies the affected user within your organization and surfaces the exposure with clear severity and context. By bringing this powerful detection into Defender, teams can investigate and respond with better context, allowing leaked credentials to be evaluated alongside endpoint, email, and app activity, giving teams additional context needed to prioritize response. Additionally, for &lt;A href="https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#leaked-credentials" target="_blank" rel="noopener"&gt;Microsoft Entra ID accounts&lt;/A&gt; we can go a step further validating whether the discovered credentials actually corresponds to a real, usable password for an identity in the tenant. This confirmation further reduces unnecessary noise and gives defenders an early signal - often before any malicious activity begins. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next, Microsoft Defender steps in to correlate these signals with your organization’s unique security context. Connecting the alert and associated account with other signals and like unusual authentications, lateral movement attempts, or privilege escalations, elevating the isolated alert into a complete story about any potential incidents related to that vulnerability.&lt;/P&gt;
&lt;P&gt;At the same time, Microsoft Exposure management is analyzing the same data to create a potential &lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/work-attack-paths-overview?source=recommendations" target="_blank" rel="noopener"&gt;attack path&lt;/A&gt; related to the exposed credentials. By tracing permissions, consents, and access relationships, Attack Paths show exactly which routes an attacker could take and what controls will break that path.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;When these capabilities work together, visibility becomes action. MACE identifies who is exposed, Defender connects other signals into an incident level view and Attack Paths reveal where the attacker could go next. The result is a single, connected workflow that transforms early exposure data into prioritized, measurable risk reduction.&lt;/P&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Leaked credentials should be treated as the beginning of a story, not an isolated event. Microsoft Defender is uniquely able to enrich security teams visibility and understanding of Identity-related threats from initial exposure to detection, risk prioritization, and remediation. This connected visibility fundamentally changes how defenders manage identity risk, shifting the focus from reacting to individual alerts to continuously reducing exposure and limiting blast radius. One leaked password doesn’t have to become a breach. With Microsoft’s identity security capabilities, it becomes a closed path, and a measurable step toward greater resilience.&lt;/P&gt;
&lt;P&gt;Learn more about &lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/work-attack-paths-overview?source=recommendations" target="_blank" rel="noopener"&gt;attack paths&lt;/A&gt;&lt;/STRONG&gt; and the new leaked credentials capabilities in Defender.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 15:54:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/from-signal-to-strategy-closing-attack-paths-with-identity/ba-p/4491856</guid>
      <dc:creator>Tal_Guetta</dc:creator>
      <dc:date>2026-02-09T15:54:38Z</dc:date>
    </item>
    <item>
      <title>Observed Automation Discrepancies</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/observed-automation-discrepancies/m-p/4493712#M2624</link>
      <description>&lt;P&gt;Hi Team ... I want to know the logic behind the &lt;STRONG&gt;Defender XDR Automation Engine . How it works ?&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I have observed Defender XDR Automation Engine Behavior&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;contrary to expectations of identical incident and automation handling in both environments, discrepancies were observed. Specifically, incidents with high-severity alerts were automatically closed by Defender XDR's automation engine before reaching their SOC for review, raising concerns among clients and colleagues. Automation rules are clearly logged in the activity log, whereas actions performed by Microsoft Defender XDR are less transparent .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;A high-severity alert related to a phishing incident was closed by Defender XDR's automation, resulting in the associated incident being closed and removed from SOC review. Wherein the automation was not triggered by our own rules, but by Microsoft's Defender XDR, and sought clarification on the underlying logic.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 08:54:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/observed-automation-discrepancies/m-p/4493712#M2624</guid>
      <dc:creator>Aar123</dc:creator>
      <dc:date>2026-02-09T08:54:18Z</dc:date>
    </item>
    <item>
      <title>Monthly news -  February 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-february-2026/ba-p/4491826</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Monthly news - February 2026 Edition&lt;/P&gt;
&lt;P&gt;This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from January 2026. Defender for Cloud has its own Monthly News post, have a look &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/microsoft-defender-for-cloud-customer-newsletter/4491637" data-lia-auto-title="here" data-lia-auto-title-active="0" target="_blank"&gt;here&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;🚀 New Virtual Ninja Show episode:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A style="background-color: rgb(255, 255, 255); font-style: normal; font-weight: 400;" href="https://www.youtube.com/watch?v=Ei02Yr1rE18&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=5" target="_blank" rel="noopener"&gt;Discovering Microsoft Sentinel MCP server&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=gbzMB3KnmvM&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=4" target="_blank" rel="noopener"&gt;Microsoft Sentinel for SAP: What's New, What's Gone, and What's Next&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=MVyHJR6TJjU&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=3" target="_blank" rel="noopener"&gt;Unlocking Security Context with Microsoft Sentinel Graph&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=d6eEklWCxXw&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=2" target="_blank" rel="noopener"&gt;Inside OAuth App: Risks, Real Attacks, and How Microsoft Defender Shuts Them Down&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=bZpUhOzxYbA&amp;amp;list=PLmAptfqzxVEVeZJO1kj4wiUVhCPfCa0Fm&amp;amp;index=1" target="_blank" rel="noopener"&gt;Technical AI Agent foundations and Microsoft Entra Agent ID&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;(Public Preview) &lt;STRONG&gt;Microsoft Defender now supports Entra Agent IDs!&lt;/STRONG&gt; Microsoft Entra Agent ID extends the comprehensive security capabilities of Microsoft Entra to agents, enabling organizations to build, discover, govern, and protect agent identities. Until now agents use User OBO (User on behalf of), but now you can specify an Entra agent ID, a dedicated identity for your agents. Learn more about Entra Agent IDs &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/agent-id/identity-professional/microsoft-entra-agent-identities-for-ai-agents" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;(Public Preview) The&amp;nbsp;&lt;/SPAN&gt;&lt;A style="background-color: rgb(255, 255, 255); font-style: normal; font-weight: 400;" href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-behaviorinfo-table" target="_blank" rel="noopener" data-linktype="relative-path"&gt;BehaviorInfo&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;A style="background-color: rgb(255, 255, 255); font-style: normal; font-weight: 400;" href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-behaviorentities-table" target="_blank" rel="noopener" data-linktype="relative-path"&gt;BehaviorEntities&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;tables in advanced hunting now include additional columns and information about behavior data types and alerts from User and Entity Behavior Analytics (UEBA), providing more insights on the relationships between identified behaviors and entities.&amp;nbsp;&lt;/SPAN&gt;&lt;A style="background-color: rgb(255, 255, 255); font-style: normal; font-weight: 400;" href="https://learn.microsoft.com/en-us/azure/sentinel/entity-behaviors-layer" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;Learn more about UEBA behaviors&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;(Public Preview)&amp;nbsp;&lt;STRONG&gt;Streamline Incident Management with Microsoft Defender’s New Built-In Alert Tuning Rules&lt;/STRONG&gt;. Built‑in alert tuning rules help SOC teams focus on high‑quality, actionable incidents that reflect real threats - while automatically handling informational and low‑severity alerts in the background.&lt;/LI&gt;
&lt;LI&gt;At Microsoft Ignite last November, we&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/ignite-2025-whats-new-in-microsoft-defender/4469996" target="_blank"&gt;announced&lt;/A&gt;&amp;nbsp;a new capability in Microsoft Defender designed to solve exactly this problem: AI-powered incident prioritization. Today, we’re excited to share that&amp;nbsp;&lt;STRONG&gt;AI-powered incident prioritization is now available in public preview for all Microsoft Defender customers&lt;/STRONG&gt;! This is about helping SOC teams cut through noise, focus on what matters most, and move faster with confidence. Read more details in &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/introducing-ai-powered-incident-prioritization-in-microsoft-defender/4483834" data-lia-auto-title="this blog post" data-lia-auto-title-active="0" target="_blank"&gt;this blog post&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) In advanced hunting, if the query result exceeds the 64-MB size limit, the portal now returns the maximum number of records it can within this limit and displays a message indicating that the displayed results are partial due to size constraints.&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview#quotas-and-usage-parameters" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;Alert tuning set as behavior&lt;/STRONG&gt; - reclassifies certain alerts as behaviors so they don’t appear in the open alerts queue or generate incidents - yet remain available for investigation and hunting when needed.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Recording: &lt;STRONG&gt;Spotlight the latest innovations and enhancements&lt;/STRONG&gt;, including improvements to the Microsoft Defender portal that deepen its integration with Microsoft Sentinel.&amp;nbsp;&lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=7Gf-QWcsWi4" target="_blank" rel="noopener"&gt;Watch it on YouTube&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Updated date: Microsoft Sentinel in the Azure portal to be retired March 2027&lt;/STRONG&gt;. Microsoft Sentinel is&amp;nbsp;generally available in the Microsoft Defender portal, including for customers without Microsoft Defender XDR or an E5 license. This means that you can use Microsoft Sentinel in the Defender portal even if you aren't using other Microsoft Defender services. After&amp;nbsp;&lt;STRONG&gt;March 31, 2027&lt;/STRONG&gt;, Microsoft Sentinel will no longer be supported in the Azure portal and will be available only in the Microsoft Defender portal. Learn more in &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/update-new-timeline-for-transitioning-sentinel-experience-to-defender-portal/4490464" data-lia-auto-title="this blog post" data-lia-auto-title-active="0" target="_blank"&gt;this blog post&lt;/A&gt; and get useful resources.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;2 Part Webinar: walk through a day in the life of a SOC, showing how integration and simplicity make security operations smoother in the unified portal&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Part 1: &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=I5dhz_0LDCI" target="_blank" rel="noopener"&gt;Stop Waiting, Start Onboarding: Get Sentinel Defender‑Ready Today&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Part 2: &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=0GAxsbzGirw" target="_blank" rel="noopener"&gt;Don’t Get Left Behind: Complete Your Sentinel Move to Defender&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(General Availability) The option to disable incident correlation for analytics rules is now general available. Learn more about it &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-xdr/exclude-analytics-rules-correlation" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;(Public Preview) &lt;STRONG&gt;Content distribution in Defender's multi-tenant management now supports the distribution of Analytics Rules, Automation Rules, and Workbooks&lt;/STRONG&gt;. This allows multi-tenant customers to quickly onboard new tenants and maintain a consistent security baseline. Read &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/new-content-types-supported-in-multi-tenant-content-distribution/4457948" data-lia-auto-title="the blog to learn more" data-lia-auto-title-active="0" target="_blank"&gt;the blog to learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Blog post: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/accelerate-your-move-to-microsoft-sentinel-with-the-new-ai-powered-siem-migratio/4488505" data-lia-auto-title="Accelerate your move to Microsoft Sentinel with the new AI Powered SIEM migration experience" data-lia-auto-title-active="0" target="_blank"&gt;Accelerate your move to Microsoft Sentinel with the new AI Powered SIEM migration experience&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) You can now enable UEBA for supported data sources directly from the data connector configuration page, reducing management time and preventing coverage gaps.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;(Public Preview) &lt;STRONG&gt;UEBA behaviors layer aggregates actionable insights from raw logs in near-real time&lt;/STRONG&gt;. Microsoft Sentinel introduces a UEBA behaviors layer that transforms high-volume, low-level security logs into clear, human-readable behavioral insights in the Defender portal. This AI-powered capability aggregates and sequences raw events from supported data sources into normalized behaviors that explain "who did what to whom" with MITRE ATT&amp;amp;CK context. Learn more &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/whats-new?tabs=defender-portal#ueba-behaviors-layer-aggregates-actionable-insights-from-raw-logs-in-near-real-time-preview" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) &lt;STRONG&gt;The Triage MCP is a collection (server) on the Sentinel MCP platform and provides access to a set of APIs &lt;/STRONG&gt;that enable incident and alert triage. You can use these tools to carry out autonomous triage and investigation, or build your own agentic workflows, on top of Microsoft Defender and Microsoft Sentinel alerts and incidents.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;New detections for Sentinel solution for SAP BTP&lt;/STRONG&gt;. This update expands&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/sap-btp-security-content#built-in-analytics-rules" target="_blank" rel="noopener" data-linktype="relative-path"&gt;detection coverage for SAP BTP&lt;/A&gt;, strengthening visibility into high‑risk control plane, integration, and identity activities.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender Vulnerability Management&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;(General Availability) New Microsoft Secure Score recommendations:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Disable Remote Registry service on Windows&lt;/STRONG&gt;: Prevents remote access to the Windows registry, reducing attack surface and blocking unauthorized configuration changes, privilege escalation, and lateral movement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disable NTLM authentication for Windows workstations&lt;/STRONG&gt;: Helps prevent credential theft and lateral movement attacks by removing support for an outdated and insecure protocol. New Technology LAN Manager (NTLM) can be exploited with techniques like Pass-the-Hash and NTLM relay, allowing attackers to bypass password complexity and compromise domains.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(Public Preview) To simplify and streamline the&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-vulnerable-devices-report" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Device vulnerabilities report&lt;/A&gt; experience, &lt;STRONG&gt;the Vulnerable devices report now includes the following changes and enhancements&lt;/STRONG&gt; (These changes are not yet visible to government cloud customers. The changes will be visible in late January 2026):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;Vulnerable devices by Windows 10/11 version over time&lt;/STRONG&gt;&amp;nbsp;section has been removed.&lt;/LI&gt;
&lt;LI&gt;The report’s filters have been simplified to only include the&amp;nbsp;&lt;STRONG&gt;Device group&lt;/STRONG&gt;&amp;nbsp;filter.&lt;/LI&gt;
&lt;LI&gt;The report’s history is now limited to the last 30 days.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Office 365&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Blog post: &lt;STRONG&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/secure-collaboration-in-microsoft-teams-with-efficient-and-automated-threat-prot/4484479" data-lia-auto-title="Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response" data-lia-auto-title-active="0" target="_blank"&gt;Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response&lt;/A&gt;.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Block communication from sender email address and domains in Teams&lt;/STRONG&gt;: Admins can directly block&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/tenant-allow-block-list-teams-domains-configure" target="_blank" rel="noopener" data-linktype="relative-path"&gt;malicious domains and email addresses&lt;/A&gt;&amp;nbsp;from within the Microsoft Defender portal, seamlessly adding targeted entries to the Teams Admin Center (TAC) blocked domains and users list. This capability enables near real-time protection. When suspicious or abusive external organizations are identified, SOC teams can immediately block them, effectively halting new external chat messages, invites, and channel communications from those domains and senders while deleting existing ones.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanding ZAP and Teams Admin quarantine to Plan 1&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/zero-hour-auto-purge#zero-hour-auto-purge-zap-in-microsoft-teams" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Zero-hour-auto-purge (ZAP)&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/quarantine-admin-manage-messages-files#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages" target="_blank" rel="noopener" data-linktype="relative-path"&gt;admin management of quarantined Teams messages&lt;/A&gt;&amp;nbsp;is available to Microsoft Defender for Plan 1 by default, bringing a post-delivery protection layer.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Cloud Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;The Workday connector now requires only “View” permissions to function&lt;/STRONG&gt;. We have removed the “Modify” permission requirement to better align with the principle of least privilege. While existing configurations will continue to work, admins are encouraged to update the Workday account settings to remove these unnecessary rights as a security best practice. For more information see:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-cloud-apps/protect-workday" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;How Defender for Cloud Apps helps protect your Workday environment&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Identity&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;(General Availability) &lt;STRONG&gt;The following&amp;nbsp;Identity inventory enhancements &lt;/STRONG&gt;are now generally available:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Accounts tab in Identity Inventory&lt;/STRONG&gt;: The new&amp;nbsp;&lt;STRONG&gt;Accounts&lt;/STRONG&gt;&amp;nbsp;tab provides a consolidated view of all accounts associated with an identity, including accounts from Active Directory, Microsoft Entra ID, and supported non-Microsoft identity providers. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/manage-related-identities-accounts" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Manage related identities and accounts&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manually link and unlink accounts&lt;/STRONG&gt;: Manually link or unlink accounts from an identity directly in the&amp;nbsp;&lt;STRONG&gt;Accounts&lt;/STRONG&gt;&amp;nbsp;tab. This capability helps you correlate identity components from different directory sources and provides a complete identity context during investigations. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/manage-related-identities-accounts" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Manage related identities and accounts&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity-level remediation actions&lt;/STRONG&gt;: You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/remediation-actions#roles-and-permissions" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Remediation actions&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;New advanced hunting table&lt;/STRONG&gt;: Advanced hunting in Microsoft Defender now includes the&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-identityaccountinfo-table" target="_blank" rel="noopener" data-linktype="absolute-path"&gt;IdentityAccountInfo&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;table. This table provides account information from various sources, including Microsoft Entra ID, and links to the identity that owns the account.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;As part of the ongoing transition to a unified alerting experience across Microsoft Defender products, some &lt;STRONG&gt;alerts were converted from the Microsoft Defender for Identity classic format to the Microsoft Defender XDR alert format&lt;/STRONG&gt;. Keep in mind that all alerts are based on detections from Defender for Identity sensors. See&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/alerts-xdr" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Microsoft Defender for Identity XDR security alerts&lt;/A&gt; for the full list of XDR alerts. Alert names in the XDR structure are different than the alert names in the classic structure, but alert IDs stay consistent between the two alert structures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced RPC auditing&lt;/STRONG&gt; is required for some Microsoft Defender for Identity advanced identity detections. &lt;STRONG&gt;A new health alert helps identify v3.x sensors where this configuration is either missing or incorrectly applied&lt;/STRONG&gt;. The alert is being rolled out gradually to customers. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/prerequisites-sensor-version-3#configure-rpc-auditing" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Configure RPC on sensors v3.x&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;(Public Preview) We’re gradually rolling out &lt;STRONG&gt;automatic Windows event-auditing configuration for sensors v3.x, along with related health alerts&lt;/STRONG&gt;. This update streamlines deployment by automatically applying the required auditing settings to new sensors and correcting misconfigurations on existing ones. For more information, see&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/configure-windows-event-collection#configure-defender-for-identity-to-collect-windows-events-automatically-preview" target="_blank" rel="noopener" data-linktype="relative-path"&gt;Configure automatic windows auditing&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 03 Feb 2026 11:36:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-february-2026/ba-p/4491826</guid>
      <dc:creator>HeikeRitter</dc:creator>
      <dc:date>2026-02-03T11:36:55Z</dc:date>
    </item>
    <item>
      <title>Integrating Proofpoint and Mimecast Email Security with Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/integrating-proofpoint-and-mimecast-email-security-with/m-p/4490093#M2623</link>
      <description>&lt;P&gt;Microsoft Sentinel can ingest rich email security telemetry from Proofpoint and Mimecast to power advanced phishing detection. The &lt;STRONG&gt;Proofpoint On Demand (POD) Email Security&lt;/STRONG&gt; and &lt;STRONG&gt;Proofpoint Targeted Attack Protection (TAP)&lt;/STRONG&gt; connectors pull threat logs (quarantines, spam, phishing attempts) and user click data into Sentinel. Similarly, the &lt;STRONG&gt;Mimecast Secure Email Gateway&lt;/STRONG&gt; connector ingests detailed mail flow and targeted-threat logs (attachment/URL scans, impersonation events). These integrations use Azure-hosted ingestion (via Logic Apps or Azure Functions) and the new &lt;EM&gt;Codeless Connector&lt;/EM&gt; framework to call vendor APIs on a schedule. The result is a consolidated dataset in Sentinel’s Log Analytics, enabling correlated alerting and hunting across email, identity, and endpoint signals. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;EM&gt;Figure: Phishing emails are processed by Mimecast’s gateway and Proofpoint POD/TAP services. Security logs (delivery/quarantine events, malicious attachments/links, user clicks) flow into Microsoft Sentinel. In Sentinel, these mail signals are correlated with identity (Azure AD), endpoint (Defender) and network telemetry for end-to-end phishing detection.&lt;/EM&gt;&lt;/P&gt;&lt;H2&gt;Proofpoint POD (Email Protection) Connector&lt;/H2&gt;&lt;P&gt;The Proofpoint POD connector ingests core email protection logs. It creates two tables, ProofpointPODMailLog_CL and ProofpointPODMessage_CL. These logs include &lt;STRONG&gt;per-message metadata&lt;/STRONG&gt; (senders, recipients, subject, message size, timestamps), &lt;STRONG&gt;threat scores&lt;/STRONG&gt; (spamScore, phishScore, malwareScore, impostorScore), and &lt;STRONG&gt;attachment details&lt;/STRONG&gt; (number of attachments, names, hash values and sandbox verdicts). Quarantine actions are recorded (quarantine folder/rule) and malicious indicators (URL or file hash) and campaign IDs are tagged in the threatsInfoMap field. For example, each ProofpointPODMessage_CL record may carry a sender_s (sender email domain hashed), recipient list, subject, and any detected threat type (Phish/Malware/Spam/Impostor) with associated threat hash or URL.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Deployment:&lt;/STRONG&gt; Proofpoint POD uses Sentinel’s codeless connector (an Azure Function behind the scenes). You must provide Proofpoint API credentials (Cluster ID and API token) in the connector UI. The connector periodically calls the Proofpoint SIEM API to fetch new log events (typically in 1–2 hour batches). The data lands in the above tables. (Older custom logic-app approaches similarly parse JSON output from the /v2/siem/messages endpoints.)&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Proofpoint TAP (Targeted Attack Protection) Connector&lt;/H2&gt;&lt;P&gt;Proofpoint TAP provides &lt;STRONG&gt;user-click and message-delivery events&lt;/STRONG&gt;. Its connector creates four tables: ProofPointTAPMessagesDeliveredV2_CL, ProofPointTAPMessagesBlockedV2_CL, ProofPointTAPClicksPermittedV2_CL, and ProofPointTAPClicksBlockedV2_CL. The &lt;STRONG&gt;message tables&lt;/STRONG&gt; report emails with detected threats (URL or attachment defense) that were delivered or blocked by TAP. They include the same fields as POD (message GUID, sender, recipients, subject, threat campaign ID, scores, attachments info). The &lt;STRONG&gt;click tables&lt;/STRONG&gt; log when users click on URLs: each record has the URL, click timestamp (clickTime), the user’s IP (clickIP), user-agent, the message GUID, and the threat ID/category. These fields allow you to see who clicked which malicious link and when. As the connector description notes, these logs give “visibility into Message and Click events in Microsoft Sentinel” for hunting.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Deployment:&lt;/STRONG&gt; The TAP connector also uses the codeless framework. You supply a TAP API service principal and secret (proofpoint SIEM API credentials) in the Sentinel content connector. The function app calls TAP’s /v2/siem/clicks/blocked, /permitted, /messages/blocked, and /delivered endpoints. The Proofpoint SIEM API limits queries to 1-hour windows and 7-day history, with no paging (all events in the interval are returned). (A Logic App approach could also be used, as shown in the Tech Community blog: one HTTP GET per event type and a JSON Parse before sending to Log Analytics.)&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Mimecast Secure Email Gateway Connector&lt;/H2&gt;&lt;P&gt;The Mimecast connector ingests the Secure Email Gateway (SEG) logs and targeted-threat (TTP) logs. Inbound, outbound and internal mail events from the Mimecast MTA (receipt, processing, delivery stages) are pulled via the API. Typical fields include the unique message ID (aCode), sender, recipient, subject, attachment count/names, and the policy actions or holds (e.g. spam quarantine). For example, the Mimecast “Process” log shows AttCnt, AttNames, and if the message was held (Hld) for review. Delivery logs include the success/failure and TLS details. In addition, Mimecast TTP logs are collected: &lt;STRONG&gt;URL Protect&lt;/STRONG&gt; logs (when a user clicks a blocked URL) include the clicked URL (url), category (urlCategory), sender/recipient, and block reason. &lt;STRONG&gt;Impersonation Protect&lt;/STRONG&gt; logs capture spoofing detections (e.g. if an internal name is impersonated), with fields like Sender, Recipient, Definition and Action (hold/quarantine). &lt;STRONG&gt;Attachment Protect&lt;/STRONG&gt; logs record malicious file detections (filename, hash, threat type).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Deployment:&lt;/STRONG&gt; Like Proofpoint, Mimecast’s connector uses Azure Functions via the Sentinel content hub. You install the Mimecast solution, open the connector page, then enter Azure app credentials and Mimecast API keys (API Application ID/Key and Access/Secret for the service account). As shown in the deployment guide, you must provide the Azure Subscription, Resource Group, Log Analytics Workspace and the Azure Client (App) ID, Tenant ID and Object ID of the admin performing the setup. On the Mimecast side, you supply the API Base URL (regional), App ID/Secret and user Access/Secret. The connector creates a Function App that polls Mimecast’s SIEM APIs on a cron schedule (default every 30 minutes). You can optionally specify a start date for backfilling up to 7 days of logs. The default tables are MimecastSIEM_CL (for email flow logs) and MimecastDLP_CL (for DLP/TTP events), though custom names can be set.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Ingestion Considerations&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Data Latency:&lt;/STRONG&gt; All these connectors are pull-based and typically run on a schedule (often 30–60 minutes). For example, the Proofpoint POD docs note hourly log increments, and Mimecast logs are aggregated every 30 minutes. Expect a delay of up to an hour or more from event occurrence to Sentinel ingestion.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Schema Nuances:&lt;/STRONG&gt; The APIs often return nested arrays and optional fields. For instance, the Proofpoint blog warns that some JSON fields can be null or vary in type, so the parse schema should account for all possibilities. Similarly, Mimecast logs come in pipe-delimited or JSON format, with values sometimes empty (e.g. no attachments). In KQL, use tostring() or parse_json() on the raw _CL columns, and mv-expand on any multivalue fields (like message parts or threat lists).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Table Names:&lt;/STRONG&gt; Use the connector’s tables as listed. For Proofpoint: ProofpointPODMailLog_CL and ProofpointPODMessage_CL; for TAP: ProofPointTAPMessagesDeliveredV2_CL, ProofPointTAPMessagesBlockedV2_CL, ProofPointTAPClicksPermittedV2_CL, ProofPointTAPClicksBlockedV2_CL. For Mimecast SEG/TTP: MimecastSIEM_CL (seg logs) and MimecastDLP_CL (TTP logs).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;API Behavior:&lt;/STRONG&gt; The Proofpoint TAP API has no paging. Be aware of timezones (Proofpoint uses UTC) and use the Sentinal ingestion TimeGenerated or event timestamp fields for binning.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Detection Engineering and Correlation&lt;/H2&gt;&lt;P&gt;To detect phishing effectively, we correlate these email logs with identity, endpoint and intel data:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Identity (Azure AD):&lt;/STRONG&gt; Mail logs contain recipient addresses and (hashed) sender user parts. A common tactic is to correlate &lt;STRONG&gt;SMTP recipients&lt;/STRONG&gt; or sender domains with Azure AD user records. For example, join TAP clicks by recipient to the user’s UPN. The Proofpoint logs also include the clicker’s IP (clickIP); we can match that to Azure AD sign-in logs or VPN logs to find which device/location clicked a malicious link. Likewise, anomalous Azure AD sign-ins (impossible travel, MFA failure) &lt;STRONG&gt;after&lt;/STRONG&gt; a suspicious email can strengthen the case.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Endpoints (Defender):&lt;/STRONG&gt; Once a user clicks a bad link or opens a malicious attachment (captured in TAP or Mimecast logs), watch for follow-on behaviors. For instance, use Sentinel’s DeviceSecurityEvents or DeviceProcessEvents to see if that user’s machine launched unusual processes. The threatID or URL hash from email events can be looked up in Defender’s file data. Correlate by username (if available) or IP: if the email log shows a link click from IP X, see if any endpoint alerts or logon events occurred from X around the same time. As the Mimecast integration touts, this enables “correlation across Mimecast events, cloud, endpoint, and network data”.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Threat Intelligence:&lt;/STRONG&gt; Use Sentinel’s ThreatIntelligenceIndicator tables or Microsoft’s TI feeds to tag known bad URLs/domains in the email logs. For example, join ProofPointTAPClicksBlockedV2_CL on the clicked url against ThreatIntelligenceIndicator (type=URL) to automatically flag hits. Proofpoint’s logs already classify threats (malware/phish) and provide a threatID; one can enrich that with external intel (e.g. check if the hash appears in TI feeds). Mimecast’s URL logs include a urlCategory field, which can be mapped to known malicious categories. Automated playbooks can also pull Intel: e.g. use Sentinel’s TI REST API or Azure Sentinel watchlists containing phishing domains to annotate events.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In summary, a robust detection strategy might look like: &lt;STRONG&gt;(1)&lt;/STRONG&gt; Identify malicious email events (high phish scores, quarantines, URL clicks). &lt;STRONG&gt;(2)&lt;/STRONG&gt; Correlate these events by user with Azure AD logs (did the user log in from a new IP after a phish click?). &lt;STRONG&gt;(3)&lt;/STRONG&gt; Correlate with endpoint alerts (Defender found malware on that device). &lt;STRONG&gt;(4)&lt;/STRONG&gt; Augment with threat intelligence lookups on URLs and attachments from the email logs. By linking the Proofpoint/Mimecast signals to identity and endpoint events, one can detect the full attack chain from email compromise to endpoint breach.&lt;/P&gt;&lt;H2&gt;KQL Query&lt;/H2&gt;&lt;P&gt;Here are representative Kusto queries for common phishing scenarios (adapt table/field names as needed):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Malicious URL Click Detection:&lt;/STRONG&gt; Identify users who clicked known-malicious URLs.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;For example, join TAP click logs to TI indicators:This flags any permitted click where the URL matches a known threat indicator. Alternatively, aggregate by domain:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let TI = ThreatIntelligenceIndicator&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where Active == true and _EntityType == "URL";&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ProofPointTAPClicksPermittedV2_CL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where url_s != ""&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project ClickTime=TimeGenerated, Recipient=recipient_s, URL=url_s, SenderIP=senderIP_s&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| join kind=inner TI on $left.URL == TI._Value&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project ClickTime, Recipient, URL, Description=TI.Description&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This flags any permitted click where the URL matches a known threat indicator. Alternatively, aggregate by domain:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ProofPointTAPClicksPermittedV2_CL&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| extend clickedDomain = extract(@"https?://([^/]+)", 1, url_s)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| summarize ClickCount=count() by clickedDomain &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where clickedDomain has "maliciousdomain.com" or clickedDomain has "phish.example.com"&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Quarantine Spike (Burst) Detection:&lt;/STRONG&gt; Detect sudden spikes in quarantined messages.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;For example, using POD mail log:This finds hours with an unusually high number of held (quarantined) emails, which may indicate a phishing campaign. You could similarly use ProofPointTAPMessagesBlockedV2_CL.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ProofpointPODMailLog_CL &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where action_s == "Held" &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| summarize HeldCount=count() by bin(TimeGenerated, 1h) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| order by TimeGenerated desc | where HeldCount &amp;gt; 100&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Targeted User Phishing:&lt;/STRONG&gt; Find if a specific user received multiple malicious emails. E.g., for user email address removed for privacy reasons:This lists recent phish attempts targeting Username. You might also join with TAP click logs to see if she clicked anything.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;ProofpointPODMessage_CL | &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;where recipient has "email address removed for privacy reasons" &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where array_length(threatsInfoMap) &amp;gt; 0 and threatsInfoMap_classification_s == "Phish" &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project TimeGenerated, sender_s, subject_s, threat=threatsInfoMap_threat_s&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Campaign-Level Analysis:&lt;/STRONG&gt; Group emails by Proofpoint campaign ID to see scope of each campaign:This shows each campaign ID with how many unique recipients were hit and one example subject. Combining TAP and POD tables on GUID_s or QID_s can further link click events back to the originating message/campaign.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;ProofpointPODMessage_CL &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| mv-expand threatsInfoMap &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| summarize Recipients=make_set(recipient), Count=dcount(recipient) by CampaignID=threatsInfoMap_campaignId_s &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project CampaignID, RecipientCount=Count, Recipients, SampleSubject=any(subject_s)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Each query can be refined (for instance, filtering only within a recent time window) and embedded in Sentinel Analytics rules or hunting. The key is using the connectors’ fields – URLs, sender/recipient addresses, campaign IDs – to pivot between email data and other security signals.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 13:47:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/integrating-proofpoint-and-mimecast-email-security-with/m-p/4490093#M2623</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-01-28T13:47:01Z</dc:date>
    </item>
    <item>
      <title>Invalidating kerberos tickets via XDR?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/invalidating-kerberos-tickets-via-xdr/m-p/4489451#M2622</link>
      <description>&lt;P&gt;Since we have alerts every now and then, regarding suspected Pass the Ticket-incidents, I want to know if there's a way to make a user's kerberos ticket invalid? Like we have the "Revoke Session" in Entra ID, is there anything similar that we can do in XDR?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 19:40:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/invalidating-kerberos-tickets-via-xdr/m-p/4489451#M2622</guid>
      <dc:creator>JoelNyRe</dc:creator>
      <dc:date>2026-01-26T19:40:38Z</dc:date>
    </item>
    <item>
      <title>Cloud Posture + Attack Surface Signals in Microsoft Sentinel (Prisma Cloud + Cortex Xpanse)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/cloud-posture-attack-surface-signals-in-microsoft-sentinel/m-p/4489077#M2621</link>
      <description>&lt;P&gt;Microsoft expanded Microsoft Sentinel’s connector ecosystem with Palo Alto integrations that pull cloud posture, cloud workload runtime, and external attack surface signals into the SIEM, so your SOC can correlate “what’s exposed” and “what’s misconfigured” with “what’s actively being attacked.” Specifically, the Ignite connectors list includes Palo Alto: Cortex Xpanse CCF and Palo Alto: Prisma Cloud CWPP.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Why these connectors matter for Sentinel detection engineering&lt;/H2&gt;&lt;P&gt;Traditional SIEM pipelines ingest “events.” But exposure and posture are just as important as the events—because they tell you which incidents actually matter.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Attack surface (Xpanse) tells you what’s reachable from the internet and what attackers can see.&lt;/LI&gt;&lt;LI&gt;Posture (Prisma CSPM) tells you which controls are broken (public storage, permissive IAM, weak network paths).&lt;/LI&gt;&lt;LI&gt;Runtime (Prisma CWPP) tells you what’s actively happening inside workloads (containers/hosts/serverless).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Sentinel, these become powerful when you can join them with your “classic” telemetry (cloud activity logs, NSG flow logs, DNS, endpoint, identity). Result: fewer false positives, faster triage, better prioritization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Connector overview (what each one ingests)&lt;/H2&gt;&lt;H3&gt;1) Palo Alto Prisma Cloud CSPM Solution&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;What comes in:&lt;/STRONG&gt; Prisma Cloud CSPM &lt;STRONG&gt;alerts + audit logs&lt;/STRONG&gt; via the Prisma Cloud CSPM API.&lt;BR /&gt;&lt;STRONG&gt;What it ships with:&lt;/STRONG&gt; connector + parser + workbook + analytics rules + hunting queries + playbooks (prebuilt content).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Misconfig alerts: public storage, overly permissive IAM, weak encryption, risky network exposure.&lt;/LI&gt;&lt;LI&gt;Compliance posture drift + audit readiness (prove you’re monitoring and responding).&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;2) Palo Alto Prisma Cloud CWPP (Preview)&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;What comes in:&lt;/STRONG&gt; CWPP alerts via Prisma Cloud API (Compute/runtime side).&lt;BR /&gt;&lt;STRONG&gt;Implementation detail:&lt;/STRONG&gt; Built on &lt;STRONG&gt;Codeless Connector Platform (CCP)&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Runtime detections (host/container/serverless security alerts)&lt;/LI&gt;&lt;LI&gt;“Exploit succeeded” signals that you need to correlate with posture and exposure.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;3) Palo Alto Cortex Xpanse CCF&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;What comes in:&lt;/STRONG&gt; Alerts logs fetched from the &lt;STRONG&gt;Cortex Xpanse API&lt;/STRONG&gt;, ingested using &lt;STRONG&gt;Microsoft Sentinel Codeless Connector Framework (CCF)&lt;/STRONG&gt;.&lt;BR /&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; Supports &lt;STRONG&gt;DCR-based ingestion-time transformations&lt;/STRONG&gt; that parse to a custom table for better performance.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;External exposure findings and “internet-facing risk” detection&lt;/LI&gt;&lt;LI&gt;Turning exposure into incidents only when the asset is critical / actively targeted.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reference architecture (how the data lands in Sentinel)&lt;/H2&gt;&lt;P&gt;Here’s the mental model you want for all three:&lt;/P&gt;&lt;P&gt;flowchart LR&lt;/P&gt;&lt;P&gt;A[Palo Alto Prisma Cloud CSPM] --&amp;gt;|CSPM API: alerts + audit logs|&amp;nbsp;&lt;STRONG&gt;S[Sentinel Data Connector]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;B[Palo Alto Prisma Cloud CWPP] --&amp;gt;|Prisma API: runtime alerts| S&amp;nbsp;&lt;/P&gt;&lt;P&gt;C[Cortex Xpanse] --&amp;gt;|Xpanse API: exposure alerts|&amp;nbsp;S&lt;/P&gt;&lt;P&gt;S --&amp;gt;|CCF/CCP + DCR Transform| T[(Custom Tables)]&lt;/P&gt;&lt;P&gt;T --&amp;gt; K[KQL Analytics + Hunting]&amp;nbsp;&lt;/P&gt;&lt;P&gt;K --&amp;gt; I[Incidents]&lt;/P&gt;&lt;P&gt;I --&amp;gt;&lt;STRONG&gt;P[SOAR Playbooks]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;K --&amp;gt; W[Workbooks / Dashboards]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Key design point:&lt;/STRONG&gt; Xpanse explicitly emphasizes &lt;STRONG&gt;DCR transformations at ingestion time, &lt;/STRONG&gt;use that to normalize fields early so your queries stay fast under load.&lt;/P&gt;&lt;H2&gt;Deployment patterns (practical, SOC-friendly setup)&lt;/H2&gt;&lt;H3&gt;Step 0 — Decide what goes to “analytics” vs “storage”&lt;/H3&gt;&lt;P&gt;If you’re using Sentinel’s data lake strategy, posture/exposure data is a perfect candidate for longer retention (trend + audit), while only “high severity” may need real-time analytics.&lt;/P&gt;&lt;H3&gt;Step 1 — Install solutions from Content Hub&lt;/H3&gt;&lt;P&gt;Install:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Palo Alto Prisma Cloud CSPM Solution&lt;/LI&gt;&lt;LI&gt;Palo Alto Prisma Cloud CWPP (Preview)&lt;/LI&gt;&lt;LI&gt;Palo Alto Cortex Xpanse CCF&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Step 2 — Credentials &amp;amp; least privilege&lt;/H3&gt;&lt;P&gt;Create dedicated service accounts / API keys in Palo Alto products with &lt;STRONG&gt;read-only scope&lt;/STRONG&gt; for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CSPM alerts + audit&lt;/LI&gt;&lt;LI&gt;CWPP alerts&lt;/LI&gt;&lt;LI&gt;Xpanse alerts/exposures&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Step 3 — Validate ingestion (don’t skip this)&lt;/H3&gt;&lt;P&gt;In Sentinel Logs:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Locate the &lt;STRONG&gt;custom tables&lt;/STRONG&gt; created by each solution (Tables blade).&lt;/LI&gt;&lt;LI&gt;Run a basic sanity query:&lt;UL&gt;&lt;LI&gt;“All events last 1h”&lt;/LI&gt;&lt;LI&gt;“Top 20 alert types”&lt;/LI&gt;&lt;LI&gt;“Distinct severities”&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Tip: Save “ingestion smoke tests” as &lt;STRONG&gt;Hunting queries&lt;/STRONG&gt; so you can re-run them after upgrades.&lt;/P&gt;&lt;H3&gt;Step 4 — Turn on included analytics content (then tune)&lt;/H3&gt;&lt;P&gt;The Prisma Cloud CSPM solution comes with &lt;STRONG&gt;multiple analytics rules, hunting queries, and playbooks&lt;/STRONG&gt; out of the box—enable them gradually and tune thresholds before going wide.&lt;/P&gt;&lt;H2&gt;Detection engineering: high-signal correlation recipes&lt;/H2&gt;&lt;P&gt;Below are patterns that consistently outperform “single-source alerts.” I’m giving them as &lt;STRONG&gt;KQL templates&lt;/STRONG&gt; using placeholder table names because your exact custom table names/columns are workspace-dependent (you’ll see them after install).&lt;/P&gt;&lt;H3&gt;Recipe 1 — “Internet-exposed + actively probed” (Xpanse + network logs)&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Goal:&lt;/STRONG&gt; Only fire when exposure is real &lt;EM&gt;and&lt;/EM&gt; there’s traffic evidence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let xpanse = &amp;lt;XpanseTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(24h) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where Severity in ("High","Critical") &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project AssetIp=&amp;lt;ip_field&amp;gt;, Finding=&amp;lt;finding_field&amp;gt;, Severity, TimeGenerated; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let net = &amp;lt;NetworkFlowTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(24h) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where Direction == "Inbound" | summarize Hits=count(), SrcIps=make_set(SrcIp, 50) by DstIp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;xpanse &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| join kind=inner (net) on $left.AssetIp == $right.DstIp | where Hits &amp;gt; 50 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project TimeGenerated, Severity, Finding, AssetIp, Hits, SrcIps&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Why it works:&lt;/STRONG&gt; Xpanse gives you &lt;EM&gt;exposure&lt;/EM&gt;. Flow/WAF/Firewall gives you &lt;EM&gt;intent&lt;/EM&gt;.&lt;/P&gt;&lt;H3&gt;Recipe 2 — “Misconfiguration that creates a breach path” (CSPM + identity or cloud activity)&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Goal:&lt;/STRONG&gt; Prioritize posture findings that coincide with suspicious access or admin changes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let posture = &amp;lt;PrismaCSPMTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(7d) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where PolicySeverity in ("High","Critical") &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where FindingType has_any ("Public", "OverPermissive", "NoMFA", "EncryptionDisabled") &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project ResourceId=&amp;lt;resource_id&amp;gt;, Finding=&amp;lt;finding&amp;gt;, PolicySeverity, FirstSeen=TimeGenerated; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let activity = &amp;lt;CloudActivityTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(7d) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where OperationName has_any ("RoleAssignmentWrite","SetIamPolicy","AddMember","CreateAccessKey") &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project ResourceId=&amp;lt;resource_id&amp;gt;, Actor=&amp;lt;caller&amp;gt;, OperationName, TimeGenerated; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;posture | join kind=inner (activity) on ResourceId &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project PolicySeverity, Finding, OperationName, Actor, FirstSeen, TimeGenerated &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| order by PolicySeverity desc, TimeGenerated desc&lt;/EM&gt;&lt;/P&gt;&lt;H3&gt;Recipe 3 — “Runtime alert on a workload that was already high-risk” (CWPP + CSPM)&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Goal:&lt;/STRONG&gt; Raise severity when runtime alerts occur on assets with known posture debt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;let risky_assets = &amp;lt;PrismaCSPMTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(30d)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where PolicySeverity in ("High","Critical") &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| summarize RiskyFindings=count() by AssetId=&amp;lt;asset_id&amp;gt;; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;CWPPTable&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| where TimeGenerated &amp;gt; ago(24h) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| project AssetId=&amp;lt;asset_id&amp;gt;, AlertName=&amp;lt;alert&amp;gt;, Severity=&amp;lt;severity&amp;gt;, TimeGenerated, Details=&amp;lt;details&amp;gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| join kind=leftouter (risky_assets) on AssetId &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;| extend RiskScore = coalesce(RiskyFindings,0) |&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;order by Severity desc, RiskScore desc, TimeGenerated desc&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SOC outcome:&lt;/STRONG&gt; same runtime alert, different priority depending on posture risk.&lt;/P&gt;&lt;H2&gt;Operational (in real life)&lt;/H2&gt;&lt;H3&gt;1) Normalize severities early&lt;/H3&gt;&lt;P&gt;If Xpanse is using DCR transforms (it is), normalize severity to a consistent enum (“Informational/Low/Medium/High/Critical”) to simplify analytics.&lt;/P&gt;&lt;H3&gt;2) Deduplicate exposure findings&lt;/H3&gt;&lt;P&gt;Attack surface tools can generate repeated findings. Use a &lt;STRONG&gt;dedup function&lt;/STRONG&gt; (hash of asset + finding type + port/service) and alert only on “new or changed exposure.”&lt;/P&gt;&lt;H3&gt;3) Don’t incident-everything&lt;/H3&gt;&lt;P&gt;Treat CSPM findings as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Incidents&lt;/STRONG&gt; only when: critical + reachable + targeted OR tied to privileged activity&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Tickets&lt;/STRONG&gt; when: high risk but not active&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Backlog&lt;/STRONG&gt; when: medium/low with compensating controls&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;4) Make SOAR “safe by default”&lt;/H3&gt;&lt;P&gt;Automations should prefer reversible actions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Block IP (temporary)&lt;/LI&gt;&lt;LI&gt;Add to watchlist&lt;/LI&gt;&lt;LI&gt;Notify owners&lt;/LI&gt;&lt;LI&gt;Open ticket with evidence bundle&lt;BR /&gt;…and only escalate to destructive actions after confidence thresholds.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 25 Jan 2026 20:33:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/cloud-posture-attack-surface-signals-in-microsoft-sentinel/m-p/4489077#M2621</guid>
      <dc:creator>klianos</dc:creator>
      <dc:date>2026-01-25T20:33:33Z</dc:date>
    </item>
    <item>
      <title>Where can I get the latest info on Advanced Hunting Table Retirement</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/where-can-i-get-the-latest-info-on-advanced-hunting-table/m-p/4487557#M2613</link>
      <description>&lt;P&gt;First question - where can I find the latest info on the deprecation of advanced hunting tables?&lt;/P&gt;&lt;P&gt;Background - I was developing some detections and as I was trying to decide on which table I should use I opened up the docs containing the schema for the `EntraIdSignInEvents` table (https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-entraidsigninevents-table) and was met by two ambiguous banners stating:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"On December 9, 2025, the EntraIdSignInEvents table will replace AADSignInEventsBeta. This change will be made to remove the latter's preview status and to align it with the existing product branding. Both tables will coexist until&amp;nbsp;AADSignInEventsBeta&amp;nbsp;is deprecated after the said date.&lt;/P&gt;&lt;P&gt;To ensure a smooth transition, make sure that you update your queries that use the AADSignInEventsBeta table to use EntraIdSignInEvents before the previously mentioned date. Your custom detections will be updated automatically and won't require any changes."&lt;/P&gt;&lt;P&gt;"Some information relates to prereleased product that may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.&lt;/P&gt;&lt;P&gt;Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This made me very confused as I still have data from AADSignInEventsBeta on my tenant from today. I'm not sure what this means and I'm hoping to get some clear info on table retirement.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 11:35:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/where-can-i-get-the-latest-info-on-advanced-hunting-table/m-p/4487557#M2613</guid>
      <dc:creator>david_n_o</dc:creator>
      <dc:date>2026-01-20T11:35:09Z</dc:date>
    </item>
  </channel>
</rss>

