AlienVault® USM Anywhere™

Microsoft Defender ATP

When you configure Microsoft Defender Advanced Threat Protection (ATP) to send log data to USM Anywhere, you can use the Microsoft Defender Advanced Threat Protection JSON plugin to translate raw log data into normalized events for analysis. The table below provides some basic information for the plugin:

Plugin Information
Device Details
Vendor Microsoft
Device Type Unified Threat Management
Connection Type Syslog

Integrating Microsoft Defender ATP

In Microsoft Defender ATP, you can forward events to Azure Event Hubs and let USM Anywhere collect them through the Azure Sensor. See Collect Logs from Azure Event Hubs for detailed instructions.

Plugin Enablement

For plugin enablement information, see Manual Integration Management.

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • access_control_outcome
  • asset_status
  • authentication_type
  • customfield_1
  • customfield_2
  • customfield_3
  • customfield_4
  • customfield_5
  • customheader_1
  • customheader_2
  • customheader_3
  • customheader_4
  • customheader_5
  • destination_address
  • destination_port
  • device_external_id
  • dns_server_address
  • event_action
  • event_category
  • event_description_url
  • event_name
  • event_type
  • external_id
  • file_hash_md5
  • file_hash_sha1
  • file_hash_sha256
  • file_name
  • file_path
  • highlight_fields
  • ip_addresses
  • source_address
  • source_hostname
  • source_mac
  • source_nat_address
  • source_port
  • source_process
  • source_process_commandline
  • source_process_id
  • source_process_parent
  • source_process_parent_process_id
  • source_username
  • transport_protocol

Raw Log Sample

{ "time":"2020-01-13T06:09:45.9982901Z",

"tenantId":"503e94b9-1f79-406c-840a-f30c9f084807",

"operationName":"Publish",

"category":"AdvancedHunting-ProcessCreationEvents",

"properties":{ "ProcessIntegrityLevel":null,

"AccountSid":null,

"LogonId":0,

"AccountName":null,

"AccountDomain":null,

"ProcessTokenElevation":"None",

"ProcessCreationTime":"2020-01-13T06:00:01.5790649Z",

"ProcessId":8672,

"FileName":"SpeechModelDownload.exe",

"ProcessCommandLine":"SpeechModelDownload.exe",

"FolderPath":"C:\\Windows\\System32\\Speech_OneCore\\Common\\SpeechModelDownload.exe",

"MD5":"ebbb4d68a3f7cdd7048b1bee36ca582b",

"SHA256":"472fb4b413344d2753c145237fcb83c4d3f1fb555f7330092fba59ad63ac8622",

"SHA1":"e7a64af9e4060646a00e3310ec8d47334a9f49d3",

"InitiatingProcessFolderPath":"c:\\windows\\system32\\svchost.exe",

"InitiatingProcessMD5":"36f670d89040709013f6a460176767ec",

"InitiatingProcessSHA256":null,

"InitiatingProcessSHA1":"0dac68816ae7c09efc24d11c27c3274dfd147dee",

"InitiatingProcessLogonId":null,

"InitiatingProcessAccountSid":"S-1-5-18",

"InitiatingProcessAccountDomain":"nt authority",

"InitiatingProcessAccountName":"system",

"InitiatingProcessCreationTime":"2020-01-09T23:46:50.0162404Z",

"InitiatingProcessId":1572,

"InitiatingProcessFileName":"svchost.exe",

"InitiatingProcessCommandLine":"svchost.exe -k netsvcs",

"InitiatingProcessParentCreationTime":"2020-01-09T23:46:43.6159476Z",

"InitiatingProcessParentId":852,

"InitiatingProcessParentFileName":"services.exe",

"InitiatingProcessIntegrityLevel":"System",

"InitiatingProcessTokenElevation":"TokenElevationTypeDefault",

"MachineId":"132a68e61877a89e688355b7b4752e5f3a9585a7",

"AppGuardContainerId":null,

"MachineGroup":null,

"EventTime":"2020-01-13T06:00:02.3932114Z",

"ComputerName":"xxxxx.alienlab.cloud",

"ReportId":3538,

"ActionType":"ProcessCreated"

}

}