Azure
Last updated
Last updated
The audit activity report is available in all editions of Azure AD. To access the audit logs, you need to have one of the following roles:
Report Reader
Security Reader
Security Administrator
Global Reader
Global Administrator
Threat investigation and response capabilities in the Microsoft 365 Defender portal at are a set of tools and response workflows that include:
The architecture consists of the following workflow:
Microsoft Defender for Cloud uses Microsoft Defender for Cloud to monitor on-premises systems, Azure VMs, Azure Monitor resources, and VMs hosted by other cloud providers.
Microsoft Sentinel Is a cloud-native Security Information and Event Management (SIEM) and security orchestration automated response (SOAR) solution.can't use the default Defender for Cloud Log Analytics workspace with Microsoft Sentinel. need to create a customized workspace.
Azure Stack. Is a portfolio of products that extend Azure services and capabilities to your environment of choice, from the datacenter to edge locations and remote offices.
Azure Monitor. Collects monitoring telemetry from a variety of on-premises and Azure sources.
Log Analytics workspace. Azure Monitor stores log data in a Log Analytics workspace, which is a container that includes data and configuration information.
Azure Monitoring Agent. The Azure Monitoring Agent collects monitoring data from the guest operating system and VM workloads in Azure, other cloud providers, and on-premises.
On-premises network. firewall configured to support HTTPS egress from defined systems.
On-premises Windows and Linux systems. Systems with the Azure Monitoring Agent installed.
Azure Windows and Linux VMs. Systems on which the Microsoft Defender for Cloud monitoring agent is installed.
Follow these steps:
Sign up for one of the Microsoft 365 Defender workloads.
Enable the workloads and establish connectivity.
Configure detection on your devices and infrastructure to bring immediate visibility into activities going on in the environment. This gives you the all-important "dial tone" to start the flow of critical data.
Enable Microsoft 365 Defender to gain cross-workload visibility and incident detection.
Follow these steps:
Enable AIR for a test group.
Analyze the investigation steps and response actions.
Gradually transition to automatic approval for all devices to reduce the time to detection and response.
You can view Microsoft 365 activity logs from the . Even though Microsoft 365 activity and Azure AD activity logs share many directory resources, only the Microsoft 365 admin center provides a full view of the Microsoft 365 activity logs.
(AIR) can be enabled gradually, so that you can develop a comfort level with the actions that are taken.
via a Defender for Cloud security policy. Consider using Microsoft Sentinel for threat hunting and incident response.