Views:
You can enable Microsoft Defender for Endpoint Log Collection on both new and existing Azure subscriptions in Cloud Accounts. Deploying this feature gives you actionable insights into risky or malicious endpoint activities. Detection models identify behaviors such as malware execution, suspicious file modifications, lateral movement attempts, and unauthorized access to sensitive data.
Microsoft Defender for Endpoint Log Collection offers both Cyber Risk Exposure Management and XDR capabilities:
  • Cyber Risk Exposure Management is automatically enabled when you deploy Microsoft Defender for Endpoint Log Collection in an Azure subscription. Trend Vision One collects DeviceInfo and DeviceNetworkInfo events and sends them to Cyber Risk Exposure Management, where you can view security configuration risk events.
    Note
    Note
    Cyber Risk Exposure Management requires credits for each desktop or server assessed as a result of enabling Microsoft Defender for Endpoint Log Collection. For more information, see Credit requirements for Trend Vision One solutions, capabilities, and features.
  • Optionally, you can enable XDR data collection for the Azure subscription, which sends detections and log data to the following security operations features:
    • Identity Security
    • Data Security
    • Endpoint Security
    • Cloud Security
    • Network Security
    • Email and Collaboration Security
    XDR data collection does not require credits during the pre-release period for Microsoft Defender for Endpoint Log Collection.
Note
Note
Before enabling Microsoft Defender for Endpoint Log Collection, make note of the following:
  • You must be assigned the Key Vault Secrets role in Azure. This role is required to create and manage secrets in Azure Key Vault during deployment.
  • When you enable Microsoft Defender for Endpoint Log Collection, you must configure Microsoft Defender to export events to Trend Vision One. The instructions for configuring Microsoft Defender are included in the steps below.

Procedure

  1. Enable Microsoft Defender for Endpoint Log Collection for a new or existing Azure subscription:
    1. Go to Cloud SecurityCloud Accounts.
    2. Click the Azure tab.
    3. Click Add Subscription or select an Azure subscription from the list.
    4. On the Features and Permissions page (if you are adding a new subscription), or the Resource Update tab (if you are configuring an existing subscription), enable Microsoft Defender for Endpoint Log Collection .
  2. To enable XDR data collection, click Subscription settings.
    1. To enable the use of collected data for XDR, select XDR data collection.
    2. Select a log repository in Trend Vision One from the list. If no log repositories have been added to Trend Vision One, click the link to add a log repository in Third-Party Log Collection. After adding a log repository, click the refresh icon to show the repository in the list and select it.
    3. Click Save Changes.
  3. If you are adding a new Azure subscription, complete the steps to add the subscription. For more information, see Adding an Azure subscription. If you are updating an existing Azure subscription, go to the next step.
  4. Configure Microsoft Defender to export events:
    1. In Microsoft Defender, go to GeneralStreaming API.
    2. Click Add to create a new Streaming API setting.
    3. Provide a name for the setting.
    4. Select Forward events to Event Hub.
    5. In the Event-Hub Resource ID field, enter /subscriptions/{subscriptionID}/resourceGroups/trendmicro-clm-mde-rg/providers/Microsoft.EventHub/namespaces/clm-eventhub-ns-{first 8 chars of subscriptionID}.
      where {subscriptionID} is your Azure subscription ID.
    6. In the Event-Hub name field, enter insights-logs-advancedhunting.
    7. In the Event Types area, select all Alerts & Behaviors and Devices.
    8. Click Submit.

What to do next

To ensure that Trend Vision One retains the Microsoft Defender data for an adequate period, you can configure the retention period for the log repository. The default retention period is 30 days. For more information see Log repositories.