Microsoft Defender for Cloud
<div class="condensed-table">
| | |
| --- | --- |
| Version | 2.3.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |
</div>
The Microsoft Defender for Cloud integration allows you to monitor security alert events. When integrated with Elastic Security, this valuable data can be leveraged within Elastic for analyzing the resources and services that users are protecting through Microsoft Defender.
Use the Microsoft Defender for Cloud integration to collect and parse data from Azure Event Hub and then visualize that data in Kibana.
The Microsoft Defender for Cloud integration collects one type of data: event.
Event allows users to preserve a record of security events that occurred on the subscription, which includes real-time events that affect the security of the user’s environment. For further information connected to security alerts and type, Refer to the page here.
To get started with Defender for Cloud, user must have a subscription to Microsoft Azure.
- Elastic Agent must be installed.
- You can install only one Elastic Agent per host.
- Elastic Agent is required to stream data from the Azure Event Hub and ship the data to Elastic, where the events will then be processed via the integration’s ingest pipelines.
You have a few options for installing and managing an Elastic Agent:
With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
The minimum kibana.version* required is *8.3.0.
- Configure the Microsoft Defender for Cloud on Azure subscription. For more detail, refer to the link here.
In Kibana, go to Management > Integrations.
In the "Search for integrations" search bar, type Microsoft Defender for Cloud.
Click on the "Microsoft Defender for Cloud" integration from the search results.
Click on the Add Microsoft Defender for Cloud Integration button to add the integration.
While adding the integration, if you want to collect logs via Azure Event Hub, then you have to put the following details:
- eventhub
- consumer_group
- connection_string
- storage_account
- storage_account_key
- storage_account_container (optional)
- resource_manager_endpoint (optional)
This is the Event
dataset.
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset. | constant_keyword |
event.module | Event module. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
microsoft_defender_cloud.event.agent_id | keyword | |
microsoft_defender_cloud.event.alert_type | Unique identifier for the detection logic (all alert instances from the same detection logic will have the same alertType). | keyword |
microsoft_defender_cloud.event.assessment_event_data_enrichment.action | keyword | |
microsoft_defender_cloud.event.assessment_event_data_enrichment.api_version | keyword | |
microsoft_defender_cloud.event.assessment_event_data_enrichment.is_snapshot | boolean | |
microsoft_defender_cloud.event.azure_resource_id | keyword | |
microsoft_defender_cloud.event.compromised_entity | The display name of the resource most related to this alert. | keyword |
microsoft_defender_cloud.event.confidence.level | keyword | |
microsoft_defender_cloud.event.confidence.reasons | keyword | |
microsoft_defender_cloud.event.confidence.score | keyword | |
microsoft_defender_cloud.event.correlation_key | Key for corelating related alerts. Alerts with the same correlation key considered to be related. | keyword |
microsoft_defender_cloud.event.description | Description of the suspicious activity that was detected. | keyword |
microsoft_defender_cloud.event.display_name | The display name of the alert. | keyword |
microsoft_defender_cloud.event.end_time_utc | The UTC time of the last event or activity included in the alert in ISO8601 format. | date |
microsoft_defender_cloud.event.entities.aad_tenant_id | keyword | |
microsoft_defender_cloud.event.entities.aad_user_id | keyword | |
microsoft_defender_cloud.event.entities.account.ref | keyword | |
microsoft_defender_cloud.event.entities.address | ip | |
microsoft_defender_cloud.event.entities.algorithm | keyword | |
microsoft_defender_cloud.event.entities.amazon_resource_id | keyword | |
microsoft_defender_cloud.event.entities.asset | boolean | |
microsoft_defender_cloud.event.entities.azure_id | keyword | |
microsoft_defender_cloud.event.entities.blob_container.ref | keyword | |
microsoft_defender_cloud.event.entities.category | keyword | |
microsoft_defender_cloud.event.entities.cloud_resource.ref | keyword | |
microsoft_defender_cloud.event.entities.cluster.ref | keyword | |
microsoft_defender_cloud.event.entities.command_line | keyword | |
microsoft_defender_cloud.event.entities.container_id | keyword | |
microsoft_defender_cloud.event.entities.creation_time_utc | date | |
microsoft_defender_cloud.event.entities.directory | keyword | |
microsoft_defender_cloud.event.entities.dns_domain | keyword | |
microsoft_defender_cloud.event.entities.domain_name | keyword | |
microsoft_defender_cloud.event.entities.elevation_token | keyword | |
microsoft_defender_cloud.event.entities.end_time_utc | date | |
microsoft_defender_cloud.event.entities.etag | keyword | |
microsoft_defender_cloud.event.entities.file_hashes.algorithm | keyword | |
microsoft_defender_cloud.event.entities.file_hashes.asset | boolean | |
microsoft_defender_cloud.event.entities.file_hashes.id | keyword | |
microsoft_defender_cloud.event.entities.file_hashes.ref | keyword | |
microsoft_defender_cloud.event.entities.file_hashes.type | keyword | |
microsoft_defender_cloud.event.entities.file_hashes.value | keyword | |
microsoft_defender_cloud.event.entities.files.ref | keyword | |
microsoft_defender_cloud.event.entities.host.ref | keyword | |
microsoft_defender_cloud.event.entities.host_ip_address.ref | keyword | |
microsoft_defender_cloud.event.entities.host_name | keyword | |
microsoft_defender_cloud.event.entities.id | keyword | |
microsoft_defender_cloud.event.entities.image.ref | keyword | |
microsoft_defender_cloud.event.entities.image_file.ref | keyword | |
microsoft_defender_cloud.event.entities.image_id | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.address | ip | |
microsoft_defender_cloud.event.entities.ip_addresses.asset | boolean | |
microsoft_defender_cloud.event.entities.ip_addresses.id | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.location.asn | long | |
microsoft_defender_cloud.event.entities.ip_addresses.location.city | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.location.country_code | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.location.country_name | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.location.latitude | double | |
microsoft_defender_cloud.event.entities.ip_addresses.location.longitude | double | |
microsoft_defender_cloud.event.entities.ip_addresses.location.state | keyword | |
microsoft_defender_cloud.event.entities.ip_addresses.type | keyword | |
microsoft_defender_cloud.event.entities.is_domain_joined | boolean | |
microsoft_defender_cloud.event.entities.is_valid | boolean | |
microsoft_defender_cloud.event.entities.location.asn | long | |
microsoft_defender_cloud.event.entities.location.carrier | keyword | |
microsoft_defender_cloud.event.entities.location.city | keyword | |
microsoft_defender_cloud.event.entities.location.cloud_provider | keyword | |
microsoft_defender_cloud.event.entities.location.country_code | keyword | |
microsoft_defender_cloud.event.entities.location.country_name | keyword | |
microsoft_defender_cloud.event.entities.location.latitude | double | |
microsoft_defender_cloud.event.entities.location.longitude | double | |
microsoft_defender_cloud.event.entities.location.organization | keyword | |
microsoft_defender_cloud.event.entities.location.organization_type | keyword | |
microsoft_defender_cloud.event.entities.location.state | keyword | |
microsoft_defender_cloud.event.entities.location.system_service | keyword | |
microsoft_defender_cloud.event.entities.location_type | keyword | |
microsoft_defender_cloud.event.entities.location_value | keyword | |
microsoft_defender_cloud.event.entities.logon_id | keyword | |
microsoft_defender_cloud.event.entities.name | keyword | |
microsoft_defender_cloud.event.entities.namespace.ref | keyword | |
microsoft_defender_cloud.event.entities.net_bios_name | keyword | |
microsoft_defender_cloud.event.entities.nt_domain | keyword | |
microsoft_defender_cloud.event.entities.object_guid | keyword | |
microsoft_defender_cloud.event.entities.oms_agent_id | keyword | |
microsoft_defender_cloud.event.entities.os_family | keyword | |
microsoft_defender_cloud.event.entities.os_version | keyword | |
microsoft_defender_cloud.event.entities.parent_process.ref | keyword | |
microsoft_defender_cloud.event.entities.pod.ref | keyword | |
microsoft_defender_cloud.event.entities.process_id | keyword | |
microsoft_defender_cloud.event.entities.project_id | keyword | |
microsoft_defender_cloud.event.entities.protocol | keyword | |
microsoft_defender_cloud.event.entities.ref | keyword | |
microsoft_defender_cloud.event.entities.related_azure_resource_ids | keyword | |
microsoft_defender_cloud.event.entities.resource_id | keyword | |
microsoft_defender_cloud.event.entities.resource_name | keyword | |
microsoft_defender_cloud.event.entities.resource_type | keyword | |
microsoft_defender_cloud.event.entities.session_id | keyword | |
microsoft_defender_cloud.event.entities.sid | keyword | |
microsoft_defender_cloud.event.entities.source_address.ref | keyword | |
microsoft_defender_cloud.event.entities.start_time_utc | date | |
microsoft_defender_cloud.event.entities.storage_resource.ref | keyword | |
microsoft_defender_cloud.event.entities.threat_intelligence.confidence | double | |
microsoft_defender_cloud.event.entities.threat_intelligence.description | keyword | |
microsoft_defender_cloud.event.entities.threat_intelligence.name | keyword | |
microsoft_defender_cloud.event.entities.threat_intelligence.provider_name | keyword | |
microsoft_defender_cloud.event.entities.threat_intelligence.report_link | keyword | |
microsoft_defender_cloud.event.entities.threat_intelligence.type | keyword | |
microsoft_defender_cloud.event.entities.type | keyword | |
microsoft_defender_cloud.event.entities.upn_suffix | keyword | |
microsoft_defender_cloud.event.entities.url | keyword | |
microsoft_defender_cloud.event.entities.value | keyword | |
microsoft_defender_cloud.event.event_type | keyword | |
microsoft_defender_cloud.event.extended_links.category | Links related to the alert | keyword |
microsoft_defender_cloud.event.extended_links.href | keyword | |
microsoft_defender_cloud.event.extended_links.label | keyword | |
microsoft_defender_cloud.event.extended_links.type | keyword | |
microsoft_defender_cloud.event.extended_properties | Custom properties for the alert. | flattened |
microsoft_defender_cloud.event.id | Resource Id. | keyword |
microsoft_defender_cloud.event.intent | The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center’s supported kill chain intents. | keyword |
microsoft_defender_cloud.event.is_incident | This field determines whether the alert is an incident (a compound grouping of several alerts) or a single alert. | boolean |
microsoft_defender_cloud.event.kind | keyword | |
microsoft_defender_cloud.event.location | keyword | |
microsoft_defender_cloud.event.name | Resource name. | keyword |
microsoft_defender_cloud.event.processing_end_time | The UTC processing end time of the alert in ISO8601 format. | date |
microsoft_defender_cloud.event.product.name | The name of the product which published this alert (Microsoft Sentinel, Microsoft Defender for Identity, Microsoft Defender for Endpoint, Microsoft Defender for Office, Microsoft Defender for Cloud Apps, and so on). | keyword |
microsoft_defender_cloud.event.properties.additional_data | flattened | |
microsoft_defender_cloud.event.properties.assessment.definitions | keyword | |
microsoft_defender_cloud.event.properties.assessment.details_link | keyword | |
microsoft_defender_cloud.event.properties.assessment.type | keyword | |
microsoft_defender_cloud.event.properties.category | keyword | |
microsoft_defender_cloud.event.properties.definition.display_name | keyword | |
microsoft_defender_cloud.event.properties.definition.id | keyword | |
microsoft_defender_cloud.event.properties.definition.max_score | long | |
microsoft_defender_cloud.event.properties.definition.name | keyword | |
microsoft_defender_cloud.event.properties.definition.source_type | keyword | |
microsoft_defender_cloud.event.properties.definition.type | keyword | |
microsoft_defender_cloud.event.properties.description | keyword | |
microsoft_defender_cloud.event.properties.display_name | keyword | |
microsoft_defender_cloud.event.properties.environment | keyword | |
microsoft_defender_cloud.event.properties.failed_resources | long | |
microsoft_defender_cloud.event.properties.healthy_resource_count | long | |
microsoft_defender_cloud.event.properties.id | keyword | |
microsoft_defender_cloud.event.properties.impact | keyword | |
microsoft_defender_cloud.event.properties.links.azure_portal | keyword | |
microsoft_defender_cloud.event.properties.metadata.assessment_type | keyword | |
microsoft_defender_cloud.event.properties.metadata.categories | keyword | |
microsoft_defender_cloud.event.properties.metadata.description | keyword | |
microsoft_defender_cloud.event.properties.metadata.display_name | keyword | |
microsoft_defender_cloud.event.properties.metadata.implementation_effort | keyword | |
microsoft_defender_cloud.event.properties.metadata.policy_definition_id | keyword | |
microsoft_defender_cloud.event.properties.metadata.preview | boolean | |
microsoft_defender_cloud.event.properties.metadata.remediation_description | keyword | |
microsoft_defender_cloud.event.properties.metadata.severity | keyword | |
microsoft_defender_cloud.event.properties.metadata.threats | keyword | |
microsoft_defender_cloud.event.properties.metadata.user_impact | keyword | |
microsoft_defender_cloud.event.properties.not_applicable_resource_count | long | |
microsoft_defender_cloud.event.properties.passed_resources | long | |
microsoft_defender_cloud.event.properties.remediation | keyword | |
microsoft_defender_cloud.event.properties.resource_details.id | keyword | |
microsoft_defender_cloud.event.properties.resource_details.machine_name | keyword | |
microsoft_defender_cloud.event.properties.resource_details.source | keyword | |
microsoft_defender_cloud.event.properties.resource_details.source_computer_id | keyword | |
microsoft_defender_cloud.event.properties.resource_details.type | keyword | |
microsoft_defender_cloud.event.properties.resource_details.vm_uuid | keyword | |
microsoft_defender_cloud.event.properties.resource_details.workspace_id | keyword | |
microsoft_defender_cloud.event.properties.score.current | double | |
microsoft_defender_cloud.event.properties.score.max | long | |
microsoft_defender_cloud.event.properties.score.percentage | double | |
microsoft_defender_cloud.event.properties.skipped_resources | long | |
microsoft_defender_cloud.event.properties.state | keyword | |
microsoft_defender_cloud.event.properties.status.cause | keyword | |
microsoft_defender_cloud.event.properties.status.code | keyword | |
microsoft_defender_cloud.event.properties.status.description | keyword | |
microsoft_defender_cloud.event.properties.status.first_evaluation_date | date | |
microsoft_defender_cloud.event.properties.status.severity | keyword | |
microsoft_defender_cloud.event.properties.status.status_change_date | date | |
microsoft_defender_cloud.event.properties.status.type | keyword | |
microsoft_defender_cloud.event.properties.time_generated | date | |
microsoft_defender_cloud.event.properties.type | keyword | |
microsoft_defender_cloud.event.properties.unhealthy_resource_count | long | |
microsoft_defender_cloud.event.properties.weight | long | |
microsoft_defender_cloud.event.provider_alert_status | keyword | |
microsoft_defender_cloud.event.remediation_steps | Manual action items to take to remediate the alert. | keyword |
microsoft_defender_cloud.event.resource_identifiers.aad_tenant_id | keyword | |
microsoft_defender_cloud.event.resource_identifiers.agent_id | (optional) The LogAnalytics agent id reporting the event that this alert is based on. | keyword |
microsoft_defender_cloud.event.resource_identifiers.azure_id | ARM resource identifier for the cloud resource being alerted on | keyword |
microsoft_defender_cloud.event.resource_identifiers.azure_tenant_id | keyword | |
microsoft_defender_cloud.event.resource_identifiers.id | The resource identifiers that can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.). There can be multiple identifiers of different type per alert. | keyword |
microsoft_defender_cloud.event.resource_identifiers.type | There can be multiple identifiers of different type per alert, this field specify the identifier type. | keyword |
microsoft_defender_cloud.event.resource_identifiers.workspace_id | The LogAnalytics workspace id that stores this alert. | keyword |
microsoft_defender_cloud.event.resource_identifiers.workspace_resource_group | The azure resource group for the LogAnalytics workspace storing this alert | keyword |
microsoft_defender_cloud.event.resource_identifiers.workspace_subscription_id | The azure subscription id for the LogAnalytics workspace storing this alert. | keyword |
microsoft_defender_cloud.event.security_event_data_enrichment.action | keyword | |
microsoft_defender_cloud.event.security_event_data_enrichment.api_version | keyword | |
microsoft_defender_cloud.event.security_event_data_enrichment.interval | keyword | |
microsoft_defender_cloud.event.security_event_data_enrichment.is_snapshot | boolean | |
microsoft_defender_cloud.event.security_event_data_enrichment.type | keyword | |
microsoft_defender_cloud.event.severity | The risk level of the threat that was detected. | keyword |
microsoft_defender_cloud.event.start_time_utc | The UTC time of the first event or activity included in the alert in ISO8601 format. | date |
microsoft_defender_cloud.event.status | The life cycle status of the alert. | keyword |
microsoft_defender_cloud.event.sub_assessment_event.data_enrichment.action | keyword | |
microsoft_defender_cloud.event.sub_assessment_event.data_enrichment.api_version | keyword | |
microsoft_defender_cloud.event.sub_assessment_event.data_enrichment.is_snapshot | boolean | |
microsoft_defender_cloud.event.sub_assessment_event.data_enrichment.type | keyword | |
microsoft_defender_cloud.event.system.alert_id | Unique identifier for the alert. | keyword |
microsoft_defender_cloud.event.tags | keyword | |
microsoft_defender_cloud.event.tenant_id | keyword | |
microsoft_defender_cloud.event.time_generated | The UTC time the alert was generated in ISO8601 format. | date |
microsoft_defender_cloud.event.type | Resource type. | keyword |
microsoft_defender_cloud.event.uri | A direct link to the alert page in Azure Portal. | keyword |
microsoft_defender_cloud.event.vendor_name | The name of the vendor that raises the alert. | keyword |
microsoft_defender_cloud.event.workspace.id | keyword | |
microsoft_defender_cloud.event.workspace.resource_group | keyword | |
microsoft_defender_cloud.event.workspace.subscription_id | keyword |
**Changelog**
Version | Details | Kibana version(s) |
---|---|---|
2.3.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind manually set to "pipeline_error". |
8.13.0 or higher |
2.2.0 | pass:[] Enhancement (View pull request) Do not remove event.original in main ingest pipeline. |
8.13.0 or higher |
2.1.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.13.0 or higher |
2.0.0 | pass:[] Enhancement (View pull request) Store eventhub metadata inside azure-eventhub field. |
8.13.0 or higher |
1.2.0 | pass:[] Enhancement (View pull request) Removed import_mappings. Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
1.1.2 | pass:[] Bug fix (View pull request) Fix name canonicalization routines. |
8.12.0 or higher |
1.1.1 | pass:[] Enhancement (View pull request) Add cloudsecurity_cdr sub category label |
8.12.0 or higher |
1.1.0 | pass:[] Enhancement (View pull request) Set sensitive values as secret and add missing mappings. |
8.12.0 or higher |
1.0.1 | pass:[] Enhancement (View pull request) Changed owners |
8.3.0 or higher |
1.0.0 | pass:[] Enhancement (View pull request) Release package as GA. |
8.3.0 or higher |
0.7.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.11.0. |
— |
0.6.0 | pass:[] Enhancement (View pull request) Improve event.original check to avoid errors if set. |
— |
0.5.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.10.0. |
— |
0.4.0 | pass:[] Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added owner.type: elastic to package manifest. |
— |
0.3.0 | pass:[] Enhancement (View pull request) Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
— |
0.2.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.9.0. |
— |
0.1.0 | pass:[] Enhancement (View pull request) Initial release. |
— |