Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Microsoft Sentinel is available in the Microsoft Defender portal with Microsoft Defender XDR or on its own. It delivers a unified experience across SIEM and XDR for faster, more accurate threat detection and response, simpler workflows, and better operational efficiency.
This article explains how to transition your Microsoft Sentinel experience from the Azure portal to the Defender portal. If you use Microsoft Sentinel in the Azure portal, transition to Microsoft Defender for unified security operations and the latest features. For more information, see Microsoft Sentinel in the Microsoft Defender portal or watch our YouTube playlist.
Prerequisites
Before you start, note:
This article is for customers with an existing workspace enabled for Microsoft Sentinel who want to transition their Microsoft Sentinel experience to the Defender portal. If you're a new customer who onboarded with permissions of a subscription Owner or a User access administrator, your workspaces are automatically onboarded to the Defender portal.
Some Microsoft Sentinel features have new locations in the Defender portal. For more information, see Quick reference.
When relevant, detailed prerequisites are in the linked articles for each step.
Plan and set up your transition environment
Audience: Security architects
Videos:
- Onboarding a Microsoft Sentinel workspace in Microsoft Defender
- Managing unified RBAC in Microsoft Defender
Review planning guidance, complete prerequisites, and onboard
Review all planning guidance and finish all prerequisites before you onboard your workspace to the Defender portal. For more information, see the following articles:
Plan for unified security operations in the Defender portal. After onboarding to the Defender portal, the Microsoft Sentinel Contributor role is assigned to the Microsoft Threat Protection and WindowsDefenderATP apps in your subscription.
Deploy for unified security operations in the Defender portal. While this article is for new customers who don't yet have a workspace for Microsoft Sentinel or other services onboarded to the Defender portal, use it as a reference if you're moving to the Defender portal.
Connect Microsoft Sentinel to the Defender portal. This article lists the prerequisites for onboarding your workspace to the Defender portal. If you plan to use Microsoft Sentinel without Defender XDR, you need to take an extra step to trigger the connection between Microsoft Sentinel and the Defender portal.
Review differences for data storage and privacy
When you use the Azure portal, the Microsoft Sentinel policies for data storage, process, retention, and sharing apply. When you use the Defender portal, the Microsoft Defender XDR policies apply instead, even when you work with Microsoft Sentinel data.
The following table provides additional details and links so that you can compare experiences across the Azure and Defender portals.
Area of support | Azure portal | Defender portal |
---|---|---|
BCDR | Customers are responsible for replicating their data | Microsoft Defender uses automation for BCDR on control panes. |
Data storage and processing | - Data storage location - Supported regions |
Data storage location |
Data retention | Data retention | Data retention |
Data sharing | Data sharing | Data sharing |
For more information, see:
- Geographical availability and data residency in Microsoft Sentinel
- Data security and retention in Microsoft Defender XDR
Onboarding to the Defender portal with customer-managed keys (CMK)
If you onboard your Microsoft Sentinel-enabled workspace to the Defender portal, ingested workspace data/logs remain encrypted with CMK. Other data isn't encrypted with CMK and uses a Microsoft-managed key.
For more information, see Set up Microsoft Sentinel customer-managed key.
Configure multi-workspace and multitenant management
Defender supports one or more workspaces across multiple tenants through the multitenant portal, which serves as a central place to manage incidents and alerts, hunt for threats across tenants, and lets Managed Security Service Partners (MSSPs) see across customers.
In multi-workspace scenarios, the multitenant portal lets you connect one primary workspace and multiple secondary workspaces per tenant. Onboard each workspace to the Defender portal separately for each tenant, just like onboarding for a single tenant.
For more information, see:
Azure Lighthouse documentation. Azure Lighthouse lets you use Microsoft Sentinel data from other tenants across onboarded workspaces. For example, you can run cross-workspace queries with the
workspace()
operator in Advanced hunting and analytics rules.Microsoft Entra B2B. Microsoft Entra B2B lets you access data across tenants. GDAP isn't supported for Microsoft Sentinel data.
Configure and review your settings and content
Audience: Security engineers
Video: Managing connectors in Microsoft Defender
Confirm and configure data collection
When Microsoft Sentinel is integrated with Microsoft Defender, the fundamental architecture of data collection and telemetry flow remains intact. Existing connectors that were configured in Microsoft Sentinel, whether for Microsoft Defender products or other data sources, continue operating without interruption.
Alerts related to Defender products are streamed directly from the Microsoft Defender XDR data connector to ensure consistency. Make sure that you have incidents and alerts from this connector turned on in your workspace. For more information, see Connect data from Microsoft Defender XDR to Microsoft Sentinel.
From a Log Analytics perspective, Microsoft Sentinel’s integration into Microsoft Defender introduces no change to the underlying ingestion pipeline or data schema. Despite the front-end unification, the Microsoft Sentinel backend remains fully integrated with Log Analytics for data storage, search, and correlation.
Integrate with Microsoft Defender for Cloud
- If you're using the tenant-based data connector for Defender for Cloud, make sure to take action to prevent duplicate events and alerts.
- If you're using the legacy, subscription-based connector instead, make sure to opt out of syncing incidents and alerts to Microsoft Defender.
For more information, see Alerts and incidents in Microsoft Defender.
Data connector visibility in the Defender portal
After onboarding your workspace to Defender, the following data connectors are used for unified security operations and aren't shown in the Data connectors page in the Defender portal:
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365 (Preview)
- Microsoft Defender XDR
- Subscription-based Microsoft Defender for Cloud (Legacy)
- Tenant-based Microsoft Defender for Cloud (Preview)
These data connectors continue to be listed in Microsoft Sentinel in the Azure portal.
Configure your ecosystem
While Microsoft Sentinel's Workspace Manager isn't available in the Defender portal, use one of the following alternative capabilities for distributing content as code across workspaces:
Deploy content as code from your repository (Public preview). Use YAML or JSON files in GitHub or Azure DevOps to manage and deploy configurations across Microsoft Sentinel and Defender using unified CI/CD workflows.
Multitenant portal. The Microsoft Defender multitenant portal supports managing and distributing content across multiple tenants.
Otherwise, continue to deploy solution packages that include various types of security content from the Content hub in the Defender portal. For more information, see Discover and manage Microsoft Sentinel out-of-the-box content.
Configure analytics rules
Microsoft Sentinel analytics rules are available in the Defender portal for detection, configuration, and management. The functionalities of analytics rules remain the same, including creation, updating, and management through the wizard, repositories, and the Microsoft Sentinel API. Incident correlation and multi-stage attack detection also continue to work in the Defender portal. The alert correlation functionality managed by the Fusion analytics rule in the Azure portal is handled by the Defender XDR engine in the Defender portal, which consolidates all signals in one place.
When moving to the Defender portal, the following changes are important to note:
Feature | Description |
---|---|
Custom detection rules | If you have detection use cases that involve both Defender XDR and Microsoft Sentinel data, where you don't need to retain Defender XDR data for more than 30 days, we recommend creating custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. This is supported without needing to ingest Defender XDR data into Microsoft Sentinel. For more information, see Use Microsoft Sentinel custom functions in advanced hunting in Microsoft Defender. |
Alert correlation | In the Defender portal, correlations are automatically applied to alerts against both Microsoft Defender data and third-party data ingested from Microsoft Sentinel, regardless of alert scenarios. The criteria used to correlate alerts together in a single incident are part of the Defender portal's proprietary, internal correlation logic. For more information, see Alert correlation and incident merging in the Defender portal. |
Alert grouping and incident merging | While you will still see the alert grouping configuration in Analytics rules, the Defender XDR correlation engine fully controls alert grouping and incident merging when necessary in the Defender portal. This ensures a comprehensive view of the full attack story by stitching together relevant alerts for multi-stage attacks. For example, multiple individual analytics rules configured to generate an incident for each alert may result in merged incidents if they match Defender XDR correlation logic. |
Alert visibility | If you have Microsoft Sentinel analytics rules configured to trigger alerts only, with incident creation turned off, these alerts aren't visible in the Defender portal. However, while the Advanced hunting query editor doesn't recognize the SecurityAlerts table schema, you can still use the table in queries and analytics rules. |
Alert tuning | Once your Microsoft Sentinel workspace is onboarded to Defender, all incidents, including those from your Microsoft Sentinel analytics rules, are generated by the Defender XDR engine. As a result, the alert tuning capabilities in the Defender portal, previously available only for Defender XDR alerts, can now be applied to alerts from Microsoft Sentinel. This feature allows you to streamline incident response by automating the resolution of common alerts, reducing false positives, and minimizing noise, so analysts can prioritize significant security incidents. |
Fusion: Advanced multistate attack detection | The Fusion analytics rule, which in the Azure portal, creates incidents based on alert correlations made by the Fusion correlation engine, is disabled when you onboard Microsoft Sentinel to the Defender portal. You don't lose alert correlation functionality because the Defender portal uses Microsoft Defender XDR's incident-creation and correlation functionalities to replace those of the Fusion engine. For more information, see Advanced multistage attack detection in Microsoft Sentinel |
Configure automation rules and playbooks
In Microsoft Sentinel, playbooks are based on workflows built in Azure Logic Apps, a cloud service that helps you schedule, automate, and orchestrate tasks and workflows across systems throughout the enterprise.
The following limitations apply to Microsoft Sentinel automation rules and playbooks when working in the Defender portal. You might need to make some changes in your environment when making the transition.
Functionality | Description |
---|---|
Automation rules with alert triggers | In the Defender portal, automation rules with alert triggers act only on Microsoft Sentinel alerts. For more information, see Alert create trigger. |
Automation rules with incident triggers | In both the Azure portal and the Defender portal, the Incident provider condition property is removed, as all incidents have Microsoft XDR as the incident provider (the value in the ProviderName field). At that point, any existing automation rules run on both Microsoft Sentinel and Microsoft Defender XDR incidents, including those where the Incident provider condition is set to only Microsoft Sentinel or Microsoft 365 Defender. However, automation rules that specify a specific analytics rule name run only on incidents that contain alerts that were created by the specified analytics rule. This means that you can define the Analytic rule name condition property to an analytics rule that exists only in Microsoft Sentinel to limit your rule to run on incidents only in Microsoft Sentinel. Also, after onboarding to the Defender portal, the SecurityIncident table no longer includes a Description field. Therefore: - If you're using this Description field as a condition for an automation rule with an incident creation trigger, that automation rule won't work after onboarding to the Defender portal. In such cases, make sure to update the configuration appropriately. For more information, see Incident trigger conditions. - If you have an integration configured with an external ticketing system, like ServiceNow, the incident description will be missing. |
Latency in playbook triggers | It might take up to 5 minutes for Microsoft Defender incidents to appear in Microsoft Sentinel. If this delay is present, playbook triggering is delayed too. |
Changes to existing incident names | The Defender portal uses a unique engine to correlate incidents and alerts. When onboarding your workspace to the Defender portal, existing incident names might be changed if the correlation is applied. To ensure that your automation rules always run correctly, we therefore recommend that you avoid using incident titles as condition criteria in your automation rules, and suggest instead to use the name of any analytics rule that created alerts included in the incident, and tags if more specificity is required. |
Updated by field | For more information, see Incident update trigger. |
Automation rules that add incident tasks | If an automation rule adds an incident task, the task is shown only in the Azure portal. |
Creating automation rules directly from an incident | Creating automation rules directly from an incident is supported only in the Azure portal. If you're working in the Defender portal, create your automation rules from scratch from the Automation page. |
Microsoft incident creation rules | Microsoft incident creation rules aren't supported in the Defender portal. For more information, see Microsoft Defender XDR incidents and Microsoft incident creation rules. |
Running automation rules from the Defender portal | It might take up to 10 minutes from the time that an alert is triggered and an incident is created or updated in the Defender portal to when an automation rule is run. This time lag is because the incident is created in the Defender portal and then forwarded to Microsoft Sentinel for the automation rule. |
Active playbooks tab | After onboarding to the Defender portal, by default the Active playbooks tab shows a predefined filter with onboarded workspace's subscription. In the Azure portal, add data for other subscriptions using the subscription filter. For more information, see Create and customize Microsoft Sentinel playbooks from templates. |
Running playbooks manually on demand | The following procedures aren't currently supported in the Defender portal: |
Running playbooks on incidents requires Microsoft Sentinel sync | If you try to run a playbook on an incident from the Defender portal and see the message "Can't access data related to this action. Refresh the screen in a few minutes." message, this means that the incident isn't yet synchronized to Microsoft Sentinel. Refresh the incident page after the incident is synchronized to run the playbook successfully. |
Incidents: Adding alerts to incidents / Removing alerts from incidents |
Since adding alerts to, or removing alerts from incidents isn't supported after onboarding your workspace to the Defender portal, these actions are also not supported from within playbooks. For more information, see Understand how alerts are correlated and incidents are merged in the Defender portal. |
Microsoft Defender XDR integration in multiple workspaces | If you've integrated XDR data with more than one workspace in a single tenant, the data will now only be ingested into the primary workspace in the Defender portal. Transfer automation rules to the relevant workspace to keep them running. |
Automation and the Correlation engine | The correlation engine may combine alerts from multiple signals into a single incident, which could result in automation receiving data you didn’t anticipate. We recommend reviewing your automation rules to ensure you're seeing the expected results. |
Configure APIs
The unified experience in the Defender portal introduces notable changes to incidents and alerts from APIs. It supports API calls based on the Microsoft Graph REST API v1.0, which can be used for automation related to alerts, incidents, advanced hunting, and more.
The Microsoft Sentinel API continues to support actions against Microsoft Sentinel resources, like analytics rules, automation rules and more. For interacting with unified incidents and alerts, we recommend that you use the Microsoft Graph REST API.
If you're using the Microsoft Sentinel SecurityInsights
API to interact with Microsoft Sentinel incidents, you may need to update your automation conditions and trigger criteria due to changes in the response body.
The following table lists fields that are important in the response snippets, and compares them across the Azure and Defender portals:
Functionality | Azure portal | Defender portal |
---|---|---|
Link to the incident | incidentUrl : The direct URL to the incident in the Microsoft Sentinel portal |
providerIncidentUrl : This additional field provides a direct link to the incident, which can be used to synchronize this information with a third-party ticketing system like ServiceNow. incidentUrl is still available, but it points to the Microsoft Sentinel portal. |
The sources that triggered the detection and published the alert | alertProductNames |
alertProductNames : Requires adding ?$expand=alerts to the GET. For example, https://graph.microsoft.com/v1.0/security/incidents/368?$expand=alerts |
The name of the alert provider | providerName = "Azure Sentinel" |
providerName = "Microsoft XDR" |
The service or product that created the alert | Doesn't exist in the Azure portal | serviceSource For example, "microsoftDefenderForCloudApps" |
The detection technology or sensor that identified the notable component or activity | Doesn't exist in the Azure portal | detectionSource For example, "cloudAppSecurity" |
The name of the product which published this alert | Doesn't exist in the Azure portal | productName For example, "Microsoft Defender for Cloud Apps" |
Run operations in the Defender portal
Audience: Security analysts
Videos:
- Discover and manage Microsoft Sentinel content and threat intelligence in Microsoft Defender
- Create automation and workbooks in Microsoft Defender
- Alert correlation in Microsoft Defender
- Incident investigation in Microsoft Defender
- Case management in Microsoft Defender
- Advanced hunting in Microsoft Defender
- SOC optimizations in Microsoft Defender
Update incident triage processes for the Defender portal
If you've used Microsoft Sentinel in the Azure portal, you'll notice significant user experience enhancements in the Defender portal. While you may need to update SOC processes and retrain your analysts, the design consolidates all relevant information in a single place to provide more streamlined and efficient workflows.
The unified incident queue in the Defender portal consolidates all incidents across products into a single view, impacting how analysts triage incidents that now contain multiple, cross-security domain alerts. For example:
- Traditionally, analysts triage incidents based on specific security domains or expertise, often handling tickets per entity, such as a user or host. This approach can create blind spots, which the unified experience aims to address.
- When an attacker moves laterally, related alerts might end up in separate incidents due to different security domains. The unified experience eliminates this issue by providing a comprehensive view, ensuring all related alerts are correlated and managed cohesively.
Analysts can also view detection sources and product names in the Defender portal, and apply and share filters for more efficient incident and alert triage.
The unified triage process can help reduce analyst workloads and even potentially combine the roles of tier 1 and tier 2 analysts. However, the unified triage process can also require broader and deeper analyst knowledge. We recommend training on the new portal interface to ensure a smooth transition.
For more information, see Incidents and alerts in the Microsoft Defender portal.
Understand how alerts are correlated and incidents are merged in the Defender portal
Defender’s correlation engine merges incidents when it recognizes common elements between alerts in separate incidents. When a new alert meets correlation criteria, Microsoft Defender aggregates and correlates it with other related alerts from all the detection sources into a new incident. After onboarding Microsoft Sentinel to the Defender portal, the unified incident queue reveals a more comprehensive attack, making analysts more efficient and providing a complete attack story.
In multi-workspace scenarios, only alerts from a primary workspace are correlated with Microsoft Defender XDR data. There are also specific scenarios in which incidents aren't merged.
After onboarding Microsoft Sentinel to the Defender portal, the following changes apply to incidents and alerts:
Feature | Description |
---|---|
Delay just after onboarding your workspace | It may take up to 5 minutes for Microsoft Defender incidents to fully integrate with Microsoft Sentinel. This doesn't affect features provided directly by Microsoft Defender, such as automatic attack disruption. |
Security incident creation rules | Any active Microsoft security incident creation rules are deactivated to avoid creating duplicate incidents. The incident creation settings in other types of analytics rules remain as they are, and are configurable in the Defender portal. |
Incident provider name | In the Defender portal, the Incident provider name is always Microsoft XDR. |
Adding / removing alerts from incidents | Adding or removing Microsoft Sentinel alerts to or from incidents is supported only in the Defender portal. To remove an alert from an incident in the Defender portal, you must add the alert to another incident. |
Editing comments | Add comments to incidents in either the Defender or Azure portal, but editing existing comments isn't supported in the Defender portal. Edits made to comments in the Azure portal aren't synchronized to the Defender portal. |
Programmatic and manual creation of incidents | Incidents created in Microsoft Sentinel through the API, by a Logic App playbook, or manually from the Azure portal, aren't synchronized to the Defender portal. These incidents are still supported in the Azure portal and the API. See Create your own incidents manually in Microsoft Sentinel. |
Reopening closed incidents | In the Defender portal, you can't set alert grouping in Microsoft Sentinel analytics rules to reopen closed incidents if new alerts are added. Closed incidents aren't reopened in this case, and new alerts trigger new incidents. |
Tasks | Incident tasks are unavailable in the Defender portal. For more information, see Use tasks to manage incidents in Microsoft Sentinel. |
For more information, see Incidents and alerts in the Microsoft Defender portal and Alert correlation and incident merging in the Microsoft Defender portal.
Note changes for investigations with Advanced hunting
After onboarding Microsoft Sentinel to the Defender portal, access and use all your existing log tables, Kusto Query Language (KQL) queries, and functions in the Advanced hunting page. All Microsoft Sentinel alerts that are tied to incidents are ingested into the AlertInfo
table, accessible from the Advanced hunting page.
Some differences exist, such as:
- Bookmarks aren't supported in Advanced hunting. Instead, bookmarks are supported in the Defender portal under Microsoft Sentinel > Threat management > Hunting.
- While the SecurityAlert table doesn't appear in Advanced hunting > Schema list of tables, it's still supported in your queries.
For more information, see Advanced hunting with Microsoft Sentinel data in Microsoft Defender, especially the list of known issues, and Keep track of data during hunting with Microsoft Sentinel.
Investigate with entities in the Defender portal
In the Microsoft Defender portal, entities are generally either assets, such as accounts, hosts, or mailboxes, or evidence, such as IP addresses, files, or URLs.
After onboarding Microsoft Sentinel to the Defender portal, entity pages for users, devices, and IP addresses are consolidated into a single view with a comprehensive view of the entity's activity and context and data from both Microsoft Sentinel and Microsoft Defender XDR.
The Defender portal also provides a global search bar that centralizes results from all entities so that you can search across SIEM and XDR.
For more information, see Entity pages in Microsoft Sentinel.
Investigate with UEBA in the Defender portal
Most functionalities of User and Entity Behavior Analytics (UEBA) remain the same in the Defender portal as they were in the Azure portal, with the following exceptions:
Adding entities to threat intelligence from incidents is supported only in the Azure portal. For more information, see Add entity to threat indicators.
After onboarding Microsoft Sentinel to the Defender portal, the
IdentityInfo
table used in the Defender portal includes unified fields from both Defender XDR and Microsoft Sentinel. Some fields that existed when used in the Azure portal are either renamed in the Defender portal, or aren't supported at all. We recommend that you check your queries for any references to these fields and update them as needed. For more information, see IdentityInfo table.
Update investigation processes to use Microsoft Defender threat intelligence
For Microsoft Sentinel customers moving from the Azure portal to the Defender portal, the familiar threat intelligence features are retained in the Defender portal under Intel management, and enhanced with other threat intelligence features available in the Defender portal. Supported features depend on the licenses you have, such as:
Feature | Description |
---|---|
Threat analytics | Supported for Microsoft Defender XDR customers. An in-product solution provided by Microsoft security researchers, designed to help security teams by offering insights on emerging threats, active threats, and their impacts. The data is presented in an intuitive dashboard with cards, rows of data, filters, and more. |
Intel Profiles | Supported for Microsoft Defender Threat Intelligence customers. Categorize threats and behaviors by a Threat Actor Profile, making it easier to track and correlate. These profiles include any Indicators of Compromise (IoC) related to tactics, techniques, and tools used in attacks. |
Intel Explorer | Supported for Microsoft Defender Threat Intelligence customers. Consolidates available IoCs and provides threat-related articles as they are posted, enabling security teams to stay updated on emerging threats. |
Intel Projects | Supported for Microsoft Defender Threat Intelligence customers. Allows teams to consolidate threat intelligence into a 'project' for reviewing all artifacts related to a specific scenario of interest. |
In the Defender portal, use the ThreatIntelOjbects
and ThreatIntelIndicators
together with Indicators for Compromise for threat hunting, incident response, Copilot, reporting, and to create relational graphs showing connections between indicators and entities.
For customers using the Microsoft Defender Threat Intelligence (MDTI) feed, a free version is available via Microsoft Sentinel's data connector for MDTI. Users with MDTI licenses can also ingest MDTI data and use Security Copilot for threat analysis, active threat review, and threat actor research.
For more information, see:
- Threat management
- Threat analytics in Microsoft Defender XDR
- Using projects
- Threat intelligence in Microsoft Sentinel
Use workbooks to visualize and report on Microsoft Defender data
Azure workbooks continue to be the primary tool for data visualization and interaction in the Defender portal, functioning as they did in the Azure portal.
To use workbooks with data from Advanced hunting, make sure that you ingest logs into Microsoft Sentinel. While workbooks themselves keep you in the Defender portal, buttons or links that are programmed to open pages or resources in the Azure portal continue to open a separate tab for the Azure portal.
For more information, see Visualize and monitor your data by using workbooks in Microsoft Sentinel.
Similar incidents (Preview) aren't supported in the Defender portal
The Microsoft Sentinel similar incidents feature is in Preview, isn't supported in the Defender portal. This means that when viewing an incident details page in the Defender portal, the Similar incidents tab isn't available.
Related content
- The Best of Microsoft Sentinel - now in Microsoft Defender (blog)
- Watch the webinar: Transition to the Unified SOC Platform: Deep Dive and Interactive Q&A for SOC Professionals.
- See frequently asked questions in the TechCommunity blog or the Microsoft Community Hub.