Loading

Microsoft Defender for Cloud Integration for Elastic

Stack 9.1.4 Serverless Observability Serverless Security

Version 3.1.0 (View all)
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic
Ingestion method(s) API, Azure Event Hub

The Microsoft Defender for Cloud integration allows you to monitor security alert events and assessments. When integrated with Elastic Security, this valuable data can be leveraged within Elastic for analyzing the resources and services that users are protecting through Microsoft Defender.

Use the Microsoft Defender for Cloud integration to collect and parse data from Azure Event Hub, Azure REST API, and then visualize that data in Kibana.

The Microsoft Defender for Cloud integration uses the Azure REST API. It uses the 2021-06-01 API version for retrieving assessments and the 2019-01-01-preview API version for retrieving sub-assessments.

For the assessment data stream, the /assessments endpoint retrieves all available assessments for the provided scope, which can be a Subscription ID or a Management Group Name. For each assessment, if sub-assessments are available, we will make another call to collect them. We will aggregate the results from both calls and publish them.

This integration collects log messages of the following types:

  • Event: allows users to preserve a record of security events that occurred on the subscription, which includes real-time events that affect the security of the user's environment. For further information connected to security alerts and type, refer to the security alerts reference guide.
  • Assessment: collect security assessments on all your scanned resources inside a scope from the Assessments and Sub Assessments endpoints.

Integrating Microsoft Defender for Cloud with Elastic SIEM provides advanced threat protection and security assessments for your cloud services. It monitors security events in real time, offers actionable recommendations to improve your security posture, and helps ensure compliance with industry standards. Leveraging Defender for Cloud integration allows organizations to enhance their cloud security and mitigate potential risks.

Version 3.0.0 of the Microsoft Defender for Cloud integration adds Elastic latest transforms. For more details, check the Transform setup and requirements.

Configure the Microsoft Defender for Cloud on Azure subscription. For more detail, refer to the link here.

To allow the integration to ingest data from the Microsoft Defender API, you need to create a new application on your Azure domain. The procedure to create an application is found on the Create a new Azure Application documentation page.

  • Register a new Azure Application.
  • Assign the required permission: user_impersonation in Azure Service Management.
  • Assign the built-in Reader role to the new application for the required scope, which will be used in the API to retrieve the assessments. For more details, check out the role assignment using the Azure portal documentation.
  • Once the application is registered, note the following values for use during configuration:
    • Client ID
    • Client Secret
    • Tenant ID

This integration supports both Elastic Agentless-based and Agent-based installations.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.

  1. In the top search bar in Kibana, search for Integrations.

  2. In the search bar, type Microsoft Defender for Cloud.

  3. Select the Microsoft Defender for Cloud integration from the search results.

  4. Select Add Microsoft Defender for Cloud to add the integration.

  5. Enable and configure only the collection methods which you will use.

    • To Collect Microsoft Defender Cloud logs via API, you'll need to:

      • Configure Client ID, Client Secret and Tenant ID. Configure either Subscription ID or Management Group Name as the scope.
    • To Collect logs from Azure Event Hub, you'll need to:

      • Configure Azure Event Hub, Connection String, Storage Account, and storage_account_key.
  6. Select Save and continue to save the integration.

  1. In the top search bar in Kibana, search for Dashboards.
  2. In the search bar, type microsoft_defender_cloud.
  3. Select a dashboard for the dataset you are collecting, and verify the dashboard information is populated.
  1. In the top search bar in Kibana, search for Transforms.
  2. Select the Data / Transforms from the search results.
  3. In the search bar, type microsoft_defender_cloud.
  4. All transforms from the search results should indicate Healthy under the Health column.

For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.

These inputs are used in this integration:

This integration dataset uses the following APIs:

To facilitate assessment data, source data stream-backed indices .ds-logs-microsoft_defender_cloud.assessment-* is allowed to contain duplicates from each polling interval (24 hours). ILM policy logs-microsoft_defender_cloud.assessment-default_policy is added to these source indices, so it doesn't lead to unbounded growth. This means that in these source indices data will be deleted after 7 days from ingested date.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.