

New discovery logs will usually appear in Microsoft Sentinel within 15 minutes of configuring them in the Defender for Cloud Apps portal. For information on configuring Microsoft Sentinel, see the Microsoft Sentinel data connector for Defender for Cloud Apps. Select Next, and continue to Microsoft Sentinel to finalize the integration. Discovery logs: Use the slider to enable and disable them, by default, everything is selected, and then use the Apply to drop-down to filter which discovery logs are sent to Microsoft Sentinel.

#Defender 21305 sentinel pro license
You must have a valid Microsoft Sentinel license.The option to add Microsoft Sentinel is not available if you have previously performed the integration. Integrating with your SIEM is accomplished in two steps: For more information, see Security solution integrations using the Microsoft Graph Security API. Microsoft security graph API - An intermediary service (or broker) that provides a single programmatic interface to connect multiple security providers.For information in integrating with a Generic SIEM, see Generic SIEM integration. Generic SIEMs - Integrate Defender for Cloud Apps with your generic SIEM server.Use tools such as Microsoft Power BI or Microsoft Sentinel workbooks to create your own discovery data visualizations that fit your organizational needs.Īdditional integration solutions include:.Longer data retention provided by Log Analytics.Integrating with Microsoft Sentinel allows you to better protect your cloud applications while maintaining your usual security workflow, automating security procedures, and correlating between cloud-based and on-premises events.īenefits of using Microsoft Sentinel include: You can integrate Microsoft Defender for Cloud Apps with Microsoft Sentinel (a scalable, cloud-native SIEM and SOAR) to enable centralized monitoring of alerts and discovery data. For more information about these changes, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender. Microsoft 365 Defender will be the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure. This will simplify workflows, and add the functionality of the other Microsoft 365 Defender services. The Microsoft 365 Defender portal allows security admins to perform their security tasks in one location. Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender. To learn more about the recent renaming of Microsoft security services, see the Microsoft Ignite Security blog. For more information about the change, see this announcement.
#Defender 21305 sentinel pro update
In the coming weeks, we'll update the screenshots and instructions here and in related pages. It's now called Microsoft Defender for Cloud Apps. We've renamed Microsoft Cloud App Security.
