5.6 Enabling the M365 Defender Connector
Enabling the M365 Defender Connector
By the end of this subsection, you will have connected the M365 Defender data connector to your Sentinel workspace and verified data is flowing into the expected tables.
This is the single most important data connector for this course. It brings all Defender XDR data — endpoint, email, identity, cloud app — into your Sentinel workspace for custom analytics rules, cross-source hunting, and automated response.
What the connector ingests
| Table group | Tables | Source product |
|---|---|---|
| Device telemetry | DeviceProcessEvents, DeviceNetworkEvents, DeviceFileEvents, DeviceRegistryEvents, DeviceLogonEvents, DeviceImageLoadEvents, DeviceEvents | Defender for Endpoint |
| Email telemetry | EmailEvents, EmailUrlInfo, EmailAttachmentInfo, EmailPostDeliveryEvents, UrlClickEvents | Defender for Office 365 |
| Identity telemetry | IdentityLogonEvents, IdentityQueryEvents, IdentityDirectoryEvents | Defender for Identity |
| Cloud app telemetry | CloudAppEvents | Defender for Cloud Apps |
| Alert/incident data | AlertInfo, AlertEvidence | Defender XDR (cross-product) |
Configuration walkthrough
- In the Sentinel portal, navigate to Configuration → Data connectors
- Search for “Microsoft Defender XDR” (formerly Microsoft 365 Defender)
- Click Open connector page
- Under Connect incidents and alerts, toggle to On — this sends Defender XDR incidents to your Sentinel incident queue
- Under Connect events, select which raw event tables to ingest:
DeviceFileEvents, DeviceRegistryEvents, and DeviceImageLoadEvents generate massive volume (see the cost analysis in 5.4). Start with the tables you will build detection rules against, then add others as needed. You can always enable additional tables later.
Recommended initial selection:
- DeviceProcessEvents — essential for endpoint investigation
- DeviceNetworkEvents — essential for C2 and data exfiltration detection
- DeviceLogonEvents — essential for lateral movement detection
- EmailEvents — essential for phishing investigation
- EmailUrlInfo — URL analysis in phishing campaigns
- UrlClickEvents — Safe Links click tracking
- CloudAppEvents — inbox rules, OAuth grants, cloud app activity
- IdentityLogonEvents — on-premises AD sign-in activity
- AlertInfo + AlertEvidence — cross-product alert data
Defer initially (enable when needed):
- DeviceFileEvents — high volume, enable for specific investigations
- DeviceRegistryEvents — high volume, enable for malware analysis
- DeviceImageLoadEvents — very high volume, enable for DLL sideloading hunts
- Click Apply Changes
Data begins flowing within 5-10 minutes. The connector status changes to “Connected.”
Verification queries
After enabling the connector, verify data is flowing into each table:
| |
| TableName | EventCount | LastEvent |
|---|---|---|
| AlertInfo | 3 | 2026-03-21 14:28 |
| CloudAppEvents | 247 | 2026-03-21 14:31 |
| DeviceLogonEvents | 1,842 | 2026-03-21 14:32 |
| DeviceNetworkEvents | 5,621 | 2026-03-21 14:32 |
| DeviceProcessEvents | 3,417 | 2026-03-21 14:32 |
| EmailEvents | 892 | 2026-03-21 14:30 |
Ingestion latency check:
| |
| AvgDelaySeconds | MaxDelaySeconds | P95DelaySeconds |
|---|---|---|
| 45 | 180 | 90 |
Check your understanding
1. Why start with a subset of Defender tables instead of enabling everything?
2. Your ingestion latency check shows an average delay of 8 minutes. What is the impact?