How to Connect Microsoft Defender XDR to Microsoft Sentinel

Microsoft Sentinel’s Microsoft Defender XDR connector with incident integration allows you to stream all Microsoft Defender XDR incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They also include alerts from Microsoft Defender XDR’s component services Microsoft Defender for EndpointMicrosoft Defender for IdentityMicrosoft Defender for Office 365, and Microsoft Defender for Cloud Apps, as well as alerts from other services such as Microsoft Purview Data Loss Prevention and Microsoft Entra ID Protection. The Microsoft Defender XDR connector also brings incidents from Microsoft Defender for Cloud, although in order to synchronize alerts and entities from these incidents, you must enable the Microsoft Defender for Cloud connector, otherwise your Microsoft Defender for Cloud incidents will appear empty. Learn more about the available connectors for Microsoft Defender for Cloud.

The connector also lets you stream advanced hunting events from all of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components’ advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components’ raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.

For more information about incident integration and advanced hunting event collection, see Microsoft Defender XDR integration with Microsoft Sentinel.

The Microsoft Defender XDR connector is now generally available.


For information about feature availability in US Government clouds, see the Microsoft Sentinel tables in Cloud feature availability for US Government customers.


Prerequisites for Active Directory sync via MDI

  • Your tenant must be onboarded to Microsoft Defender for Identity.
  • You must have the MDI sensor installed.

Connect to Microsoft Defender XDR

In Microsoft Sentinel, select Data connectors, select Microsoft Defender XDR from the gallery and select Open connector page.

The Configuration section has three parts:

  1. Connect incidents and alerts enables the basic integration between Microsoft Defender XDR and Microsoft Sentinel, synchronizing incidents and their alerts between the two platforms.
  2. Connect entities enables the integration of on-premises Active Directory user identities into Microsoft Sentinel through Microsoft Defender for Identity.
  3. Connect events enables the collection of raw advanced hunting events from Defender components.

These are explained in greater detail below. See Microsoft Defender XDR integration with Microsoft Sentinel for more information.

Connect incidents and alerts

To ingest and synchronize Microsoft Defender XDR incidents, with all their alerts, to your Microsoft Sentinel incidents queue:

  1. Mark the check box labeled Turn off all Microsoft incident creation rules for these products. Recommended, to avoid duplication of incidents.
    (This check box will not appear once the Microsoft Defender XDR connector is connected.)
  2. Select the Connect incidents & alerts button.


When you enable the Microsoft Defender XDR connector, all of the Microsoft Defender XDR components’ connectors (the ones mentioned at the beginning of this article) are automatically connected in the background. In order to disconnect one of the components’ connectors, you must first disconnect the Microsoft Defender XDR connector.

To query Microsoft Defender XDR incident data, use the following statement in the query window:


| where ProviderName == "Microsoft 365 Defender"

Connect entities

Use Microsoft Defender for Identity to sync user entities from your on-premises Active Directory to Microsoft Sentinel.

Verify that you’ve satisfied the prerequisites for syncing on-premises Active Directory users through Microsoft Defender for Identity (MDI).

  1. Select the Go the UEBA configuration page link.
  2. In the Entity behavior configuration page, if you haven’t yet enabled UEBA, then at the top of the page, move the toggle to On.
  3. Mark the Active Directory (Preview) check box and select Apply.Screenshot of UEBA configuration page for connecting user entities to Sentinel.

Ref: Connect Microsoft Defender XDR data to Microsoft Sentinel | Microsoft Learn