Remediation
Connect Microsoft Defender for Cloud to a SIEM such as Microsoft Sentinel or another log analytics solution.
From Azure Portal
- Go to
Microsoft Defender for Cloud. - Under
Management, clickEnvironment Settings. - Expand the Tenant Root Group(s) to reveal subscriptions.
For each subscription listed:
- Click the subscription name to open the
Defender Planssettings - In the settings on the left, click
Continuous Export - Select either
Event Hub, Log Analytics Workspace, or both depending on your environment. - Set
Export enabledtoOn - Under Exported data types, ensure that at least
Security Alerts (Medium and High)is checked. - Under Export target, set the target Event Hub or Log Analytics Workspace which is tied to a SIEM that is configured to monitor and alert for security alerts.
Ensure security alerts are included in the security operations workflow and incident response plan.