Connect this data source on your own, using the Hunters platform.
Overview
Microsoft Defender is an antivirus program and security solution developed by Microsoft Corporation. It is designed to protect computers and networks from various forms of malware, including viruses, spyware, ransomware, and other malicious software. Microsoft Defender is available for both consumer and enterprise users and provides real-time protection against threats.
Supported data types
🚧IMPORTANT
The Defender XDR Identity Query logs data type was replaced by the below Defender XDR Advanced Hunting logs.
Defender XDR Advanced Hunting logs
Table name:microsoft_365_defender_advanced_hunting
Microsoft Defender Advanced Hunting logs provide rich data sets that enable security analysts to proactively search for potential threats across an organization’s environment. These logs contain detailed information about events such as file creation, network connections, and process activities, which can be queried using Kusto Query Language (KQL). Advanced hunting in Defender allows for real-time analysis, pattern detection, and correlation of security incidents, helping teams identify and respond to attacks more efficiently.
Learn more here.
This data source includes the following types:
Device Alert Events
Device Info
Device Network Info
Device Process Events
Device Network Events
Device File Events
Device Registry Events
Device Logon Events
Device Image Load Events
Device Events
Send data to Hunters
STEP 1: Set up Azure Event Hub
Before setting up the connection on the Hunters platform, you'll need to set up and create an Azure Event Hub.
Follow this guide to complete the set up.
STEP 2: Route logs to the Event Hub
Follow the steps in this guide from Microsoft to route XDR logs to an Event Hub.
STEP 3: Set up the connection on Hunters
📘 Before you begin
To complete this process you will need the information gathered when following this guide.
To connect logs to Hunters:
Open the Hunters platform and navigate to Data > Data Sources.
Click ADD DATA SOURCES.
Locate the Microsoft Defender panel and click Connect.
The Add Data Flows window opens.Fill in the required details, as gathered here under STEP 2.
Under the Data Types section, activate the data types you want to connect.
For each activated data type, fill in the required information, as gathered here:
Under STEP 1 - Subscription ID
Under STEP 3 - Resource group name and Event Hub namespace and
Under STEP 4 - Event Hub name.
OPTIONAL: Under the Consumer group field you can specify a specific Azure Event Hub consumer group, or leave this field empty to use the default consumer group.
Click Test Connection to make sure everything was set up correctly.
Once the connection is established, click Submit.
Expected format
Logs are expected in JSON format.
{
"_TimeReceivedBySvc": "2024-06-30T09:09:42.2473569Z",
"category": "AdvancedHunting-IdentityQueryEvents",
"operationName": "Publish",
"properties": {
"AccountDisplayName": null,
"AccountDomain": null,
"AccountName": null,
"AccountObjectId": null,
"AccountSid": null,
"AccountUpn": null,
"ActionType": "DNS query",
"AdditionalFields": {
"ACTOR.DEVICE": "",
"ARG.TASK": "DNS query",
"Count": "1",
"DestinationComputerObjectGuid": "493fd1c0-0419-4ad8-ace7-d7de9eddf89d",
"DestinationComputerOperatingSystem": "windows server 2019 datacenter",
"DestinationComputerOperatingSystemType": "windows",
"DestinationComputerOperatingSystemVersion": "10.0 (17763)",
"FROM.DEVICE": "1.2.3.4",
"SourceComputerId": "computer 1.2.3.4",
"SourceComputerOperatingSystemType": "unknown",
"TO.DEVICE": "test_dc"
},
"Application": "Active Directory",
"DestinationDeviceName": "test_dc.system.local",
"DestinationIPAddress": "10.152.0.4",
"DestinationPort": 53,
"DeviceName": "1.2.3.4",
"IPAddress": "1.2.3.4",
"Location": null,
"Port": 57926,
"Protocol": "Dns",
"Query": null,
"QueryTarget": "_origin._tcp.test.domain",
"QueryType": "Srv",
"ReportId": "f76cedf7-3682-436d-9b76-0a87ee183d6a",
"TargetAccountDisplayName": null,
"TargetAccountUpn": null,
"TargetDeviceName": null,
"Timestamp": "2024-06-30T09:09:00.540511Z"
},
"Tenant": "DefaultTenant",
"tenantId": "asdasdas-awdawf-wqfaawf",
"time": "2024-06-30T09:10:46.4939189Z"
}