Skip to main content

Microsoft Defender for Cloud

Thumbnail icon

The Sumo Logic app for Microsoft Defender for Cloud is a powerful solution designed to provide Azure cloud security analysts with actionable insights into their cloud security posture. By integrating with Microsoft Defender for Cloud, this app delivers advanced monitoring, alerting, and compliance tracking capabilities through purpose-built dashboards tailored to meet the needs of security teams.

Key features of the Microsoft Defender for Cloud app include:

  • Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational).
  • Monitor trends in alert activity over time to identify spikes and recurring threats.
  • Geolocate alerts to identify suspicious activities from embargoed or high-risk regions.
  • Leverage detailed alert summaries and remediation steps for effective threat mitigation.
  • Address vulnerabilities proactively by monitoring security recommendations grouped by risk levels (High, Medium, and Low).
  • Visualize trends in recommendation volumes and focus on affected resources, such as Virtual Machines, Apps, and Containers.
  • Analyze threats by categories like data exfiltration, unauthorized access, and account breaches.
  • Follow step-by-step remediation plans to resolve high-priority risks and strengthen your overall security posture.
  • Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark.
  • Understand pass, fail, and skip rates for specific compliance controls.
  • Identify areas requiring immediate action to ensure regulatory adherence for your Azure resources.
info

This app includes built-in monitors. For details on creating custom monitors, refer to Create monitors for Microsoft Defender for Cloud app.

Log types

The Microsoft Defender for Cloud app uses the following logs:

Collection configuration

To forward Microsoft Defender events to Sumo Logic, you can set up an efficient pipeline: Microsoft DefenderEvent Hub > Sumo Logic (Hosted Collector). This setup ensures that security events from Microsoft Defender are seamlessly ingested into Sumo Logic for monitoring and analysis.

  1. Create a Sumo Logic Azure Event Hub Source. Configure an Event Hub source to receive events from the Azure platform. This will act as the endpoint for the data pipeline.
  2. Set up continuous export in Azure. Within the Azure portal, configure the Microsoft Defender for Cloud to export its security events to the Event Hub instance created in the previous step. Continuous export ensures that the events such as alerts, recommendations, and regulatory compliance updates are forwarded in near real-time.

Sample log messages

Alerts
{
"VendorName": "Microsoft",
"AlertType": "K8S_AdmissionController",
"ProductName": "Microsoft Defender for Cloud",
"StartTimeUtc": "2024-11-20T08:32:12.950321Z",
"EndTimeUtc": "2024-11-20T08:32:12.950321Z",
"TimeGenerated": "2024-11-20T09:19:16.485Z",
"ProcessingEndTime": "2024-11-20T09:19:16.5381698Z",
"Severity": "Informational",
"Status": "New",
"ProviderAlertStatus": null,
"ConfidenceLevel": null,
"ConfidenceScore": 0.0,
"ConfidenceReasons": null,
"IsIncident": false,
"SystemAlertId": "57963b4b-3cb0-dc3a-16ed-f1e216311809",
"CorrelationKey": null,
"Intent": "Persistence, CredentialAccess",
"AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
"WorkspaceId": null,
"WorkspaceSubscriptionId": null,
"WorkspaceResourceGroup": "",
"AgentId": "",
"CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4",
"AlertDisplayName": "Creation of admission webhook configuration detected",
"Description": "Kubernetes audit log analysis detected a new admission webhook configuration. Kubernetes has two built-in generic admission controllers: MutatingAdmissionWebhook and ValidatingAdmissionWebhook. The behavior of these admission controllers is determined by an admission webhook that the user deploys to the cluster. The usage of such admission controllers can be legitimate, however attackers can use such webhooks for modifying the requests (in case of MutatingAdmissionWebhook) or inspecting the requests and gain sensitive information (in case of ValidatingAdmissionWebhook).",
"Entities": [
{
"$id": "4",
"CloudResource": {
"$id": "5",
"ResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
"ResourceType": "Kubernetes Service",
"ResourceName": "k8s--295-aks1-28-otc-dev-v4",
"Metadata": {
"IsGraphCenter": true
},
"Asset": true,
"Type": "azure-resource"
},
"Asset": false,
"Type": "K8s-cluster"
},
{
"$ref": "5"
}
],
"ExtendedLinks": null,
"RemediationSteps": [
"Review the admission controller webhook associated with this configuration. The details of the webhook configuration can be retrieved by the command:\nkubectl get mutatingwebhookconfigurations sumo1732091427516-opentelemetry-operator-mutation -o json\nIf this configuration belongs to a legitimate admission controller in the cluster, you can ignore the alert."
],
"ExtendedProperties": {
"Resource type": "mutatingwebhookconfigurations",
"Resource name": "sumo1732091427516-opentelemetry-operator-mutation",
"Webhook configuration rules": "[{\"apiGroups\":[\"\"],\"resources\":[\"pods\"],\"operations\":[\"CREATE\"],\"apiVersions\":[\"v1\"],\"scope\":\"Namespaced\"}]",
"resourceType": "Kubernetes Service",
"EffectiveAzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
"CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4",
"ProductComponentName": "Containers",
"EffectiveSubscriptionId": "1111111-1111-1111-111-11111111"
},
"ResourceIdentifiers": [
{
"$id": "2",
"AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
"Type": "AzureResource",
"AzureResourceTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea"
},
{
"$id": "3",
"AadTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea",
"Type": "AAD"
}
],
"AlertUri": "https://portal.azure.com/#blade/Microsoft_Azure_Security_AzureDefenderForData/AlertBlade/alertId/57963b4b-3cb0-dc3a-16ed-f1e216311809/subscriptionId/1111111-1111-1111-111-11111111/resourceGroup/qek8dm0-azure-k8stest/referencedFrom/alertDeepLink/location/centralus"
}
Security recommendation
{
"assessmentEventDataEnrichment": {
"action": "Insert",
"apiVersion": "2019-01-01",
"isSnapshot": false
},
"securityEventDataEnrichment": {
"action": "Insert",
"apiVersion": "2019-01-01",
"isSnapshot": false
},
"tenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea",
"type": "Microsoft.Security/assessments",
"kind": null,
"location": null,
"id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6",
"name": "1f655fb7-63ca-4980-91a3-56dbc2b715c6",
"tags": null,
"properties": {
"resourceDetails": {
"source": "Azure",
"id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test",
"resourceName": "ase-ext-test",
"resourceType": "virtualMachines",
"resourceProvider": "Microsoft.Compute",
"nativeResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test"
},
"displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)",
"status": {
"code": "NotApplicable",
"cause": "UnsupportedPricingPlan",
"description": "The subscription is not onboarded to Servers Plan 2 offering",
"statusChangeDate": "2024-11-20T10:51:36.3376828Z",
"firstEvaluationDate": "2024-11-20T10:51:36.3376828Z"
},
"additionalData": {
"subAssessmentsLink": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6/subAssessments"
},
"metadata": {
"displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)",
"assessmentType": "BuiltIn",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd",
"description": "Remediate vulnerabilities in security configuration on your Linux machines to protect them from attacks.",
"remediationDescription": "1. Select any of the findings below.<br>2. On the right pane opened, follow the instructions under 'Remediation' if exist.",
"categories": [
"Compute"
],
"severity": "Low",
"userImpact": "Moderate",
"implementationEffort": "Moderate",
"threats": [
"DataExfiltration",
"DataSpillage",
"AccountBreach"
]
},
"links": {
"azurePortal": "portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1f655fb7-63ca-4980-91a3-56dbc2b715c6/resourceId/%2fsubscriptions%2f1111111-1111-1111-111-11111111%2fresourceGroups%2fAppServiceEnvV3_group%2fproviders%2fMicrosoft.Compute%2fvirtualMachines%2fase-ext-test"
}
}
}
Regulatory compliance
{
"securityEventDataEnrichment": {
"action": "Write",
"apiVersion": "2019-01-01-preview",
"isSnapshot": false,
"interval": "00:00:00"
},
"id": "/subscriptions/1111111-1111-1111-111-11111111/providers/Microsoft.Security/regulatoryComplianceStandards/Microsoft-cloud-security-benchmark/regulatoryComplianceControls/LT.2/regulatoryComplianceAssessments/56a83a6e-c417-42ec-b567-1e6fcb3d09a9",
"name": "56a83a6e-c417-42ec-b567-1e6fcb3d09a9",
"type": "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments",
"properties": {
"description": "Azure Kubernetes Service clusters should have Defender profile enabled",
"state": "Failed",
"scope": "Subscription",
"passedResources": 1,
"failedResources": 1,
"skippedResources": 0,
"assessmentType": "AssessmentResult",
"assessmentDetailsLink": "https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/56a83a6e-c417-42ec-b567-1e6fcb3d09a9/initiativeId/Microsoft-cloud-security-benchmark"
}
}

Sample queries

Alerts
_sourceCategory=azure/defender   SystemAlertId
| json field=_raw "SystemAlertId" as alert_id
| dedup alert_id
| json field=_raw "ExtendedProperties.EffectiveSubscriptionId" as subscription_id
| json "AlertUri", "ExtendedProperties", "RemediationSteps", "Entities", "Description", "AlertDisplayName", "CompromisedEntity", "AzureResourceId", "Status", "Severity", "ProcessingEndTime", "ProductName", "AlertType", "VendorName" as alert_url,alert_properties, alert_investigation_steps, alert_entities, alert_description, alert_name, alert_compromised_entity, alert_resource_id, alert_status, alert_severity, alert_created_time, alert_product_name, alert_type, alert_vendor_name nodrop
| json field=alert_properties "resourceType" as affected_resource_type nodrop
| json field=alert_properties "CompromisedEntity" as affected_resource nodrop

| tourl(AlertUri,alert_name) as alert_name
| replace(alert_investigation_steps,"[\"", "" ) as alert_investigation_steps
| replace(alert_investigation_steps,"\"]", "" ) as alert_investigation_steps
| replace(alert_investigation_steps,"\",\"", "\n" ) as alert_investigation_steps
| replace (alert_investigation_steps, "<br>", "\n") as alert_investigation_steps
| replace (alert_investigation_steps, /\d\./, "\n --") as alert_investigation_steps
| replace (alert_investigation_steps, "</b>", "") as alert_investigation_steps
| replace(alert_investigation_steps,"\\n", "\n" ) as next_steps
| replace(next_steps,"\\u2022", "\n --" ) as next_steps


| count by alert_created_time, alert_name, alert_description, alert_type, alert_product_name, alert_severity,alert_status, affected_resource_type, affected_resource,next_steps

| fields - _count
Security Recommendation
_sourceCategory=azure/defender  "Microsoft.Security/assessments" 
| where type = "Microsoft.Security/assessments"
| json field=_raw "id"
| parse regex field=id "assessments\/(?<recommendation_id>.+)"

| dedup by recommendation_id
| json "securityEventDataEnrichment", "tenantId", "location", "properties" as security_event_data_enrichment, tenant_id, location, properties
| json field=properties "links.azurePortal" , "metadata.threats", "metadata.implementationEffort", "metadata.userImpact", "metadata.severity", "metadata.categories", "metadata.remediationDescription", "metadata.description", "metadata.policyDefinitionId", "metadata.assessmentType", "metadata.displayName" ,"status.firstEvaluationDate" as azure_portal_link, threats,implementation_effort, user_impact,severity, categories,remediation_description, description, policy_definitionId, assessment_type, display_name, recommendation_eval_date nodrop
| replace(categories,"[\"", "" ) as categories
| replace(categories,"\"]", "" ) as categories
| replace(threats,"[", "" ) as threats
| replace(threats,"]", "" ) as threats
| replace(threats,"\"", "" ) as threats
| replace(threats,"," ,"\n" ) as threats

| replace(recommendation_eval_date,/(\.\d+Z)/, "") as recommendation_eval_date
| replace(recommendation_eval_date,"T", " ") as date

| if (contains(azure_portal_link, "https://"), azure_portal_link, concat("https://", azure_portal_link )) as link
| if (isNull(display_name), "NA", display_name ) as display_name
| tourl(link,display_name) as recommendation
| json field=properties "resourceDetails.resourceType" as affected_resource_type
| json field=properties "resourceDetails.resourceName" as affected_resource_name


| replace (remediation_description, "<br>", "\n") as remediation_description
| replace (remediation_description, /\d\./, "\n --") as remediation_description
| replace (remediation_description, "</b>", "") as next_steps
| count by date, tenant_id, recommendation , severity, threats, categories ,affected_resource_type, affected_resource_name, next_steps

| fields - _count
Regulatory compliance
_sourceCategory=azure/defender  "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments"
| json "properties.assessmentDetailsLink", "securityEventDataEnrichment.isSnapshot", "name" as assesment_link, is_snapshot, id
| dedup by id
| where type = "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments"
| where is_snapshot = "false"
| parse regex field=assesment_link "initiativeId\/(?<compliance_type>.+)"
| json "properties.assessmentType", "properties.skippedResources", "properties.failedResources", "properties.passedResources", "properties.scope", "properties.state", "properties.description" as assessment_type, skipped_resources, failed_resources, passed_resources, scope, state, description
| tourl (assesment_link,description ) as compliance

| json field=_raw "id" as subscription_id
| parse regex field=subscription_id "subscriptions\/(?<subscription_id>.+)\/providers"

// Global filters
| where subscription_id matches "*"
| where compliance_type matches "*"
| where state matches "*"
| where compliance_type matches "Microsoft-cloud-security-benchmark*"
| count by compliance, compliance_type,state, passed_resources, failed_resources, skipped_resources
| fields - _count

Installing the Microsoft Defender for Cloud app

To install the app:

  1. Select App Catalog.
  2. In the 🔎 Search Apps field, run a search for your desired app, then select it.
  3. Click Install App.
    note

    Sometimes this button says Add Integration.

  4. On the next configuration page, under Select Data Source for your App, complete the following fields:
    • Data Source. Select one of the following options:
      • Choose Source Category and select a source category from the list; or
      • Choose Enter a Custom Data Filter, and enter a custom source category beginning with an underscore. For example, _sourceCategory=MyCategory.
    • Folder Name. You can retain the existing name or enter a custom name of your choice for the app.
    • All Folders (optional). The default location is the Personal folder in your Library. If desired, you can choose a different location and/or click New Folder to add it to a new folder.
  5. Click Next.
  6. Look for the dialog confirming that your app was installed successfully.
    app-success.png

Post-installation

Once your app is installed, it will appear in your Personal folder or the folder that you specified. From here, you can share it with other users in your organization. Dashboard panels will automatically start to fill with data matching the time range query received since you created the panel. Results won't be available immediately, but within about 20 minutes, you'll see completed graphs and maps.

Viewing the Microsoft Defender for Cloud app

All dashboards have a set of filters that you can apply to the entire dashboard. Use these filters to drill down and examine the data to a granular level.

  • You can change the time range for a dashboard or panel by selecting a predefined interval from a drop-down list, choosing a recently used time range, or specifying custom dates and times. Learn more.
  • You can use template variables to drill down and examine the data on a granular level. For more information, see Filtering Dashboards with Template Variables.
  • Most Next-Gen apps allow you to provide the scope at the installation time and are comprised of a key (_sourceCategory by default) and a default value for this key. Based on your input, the app dashboards will be parameterized with a dashboard variable, allowing you to change the dataset queried by all panels. This eliminates the need to create multiple copies of the same dashboard with different queries.

Alerts

The Microsoft Defender for Cloud - Alerts dashboard provides a centralized view for monitoring high-priority security alerts across Azure resources. It categorizes alerts by severity, emphasizing high and critical alerts to help analysts prioritize threats. A time trend chart highlights alert volumes over recent days, providing insight into unusual activity or potential incidents. The geographical map pinpoints the locations of alerts, identifying potential threats from high-risk regions or embargoed countries.

An affected resources table lists impacted Azure services, such as virtual machines and storage accounts, to assess the scope of incidents. The dashboard also summarizes frequent alert types, enabling recognition of recurring issues like privilege escalation or malware detections. A top action plan provides recommended steps for addressing severe alerts, helping analysts respond swiftly and effectively. Lastly, an alert summary offers detailed descriptions of recent high-severity events, supporting deeper investigation and remediation efforts. This dashboard equips security teams with the insights needed to protect their Azure environment from emerging threats.


Microsoft-Defender-for-Cloud-Alerts

Regulatory Compliance

The Microsoft Defender for Cloud - Regulatory Compliance dashboard provides Azure security analysts with a comprehensive view of their organization's compliance status across key regulatory standards. It highlights overall compliance pass percentages for frameworks such as FedRAMP, CIS Azure Foundations, PCI DSS 4, and Microsoft Cloud Security Benchmark. Analysts can easily monitor adherence levels and quickly identify gaps in compliance through visually engaging summaries.

The dashboard offers detailed breakdowns of passed, failed, and skipped controls for each framework, helping analysts pinpoint specific areas requiring remediation. For FedRAMP compliance, it provides insights into government workload readiness, while for PCI DSS 4, it focuses on safeguarding payment-related data. The CIS Azure Foundations section ensures alignment with security best practices, and the Microsoft Cloud Security Benchmark highlights adherence to recommended Azure configurations.

This dashboard empowers teams to prioritize remediation efforts, track progress over time, and strengthen their cloud security posture. With actionable insights and a focus on simplifying regulatory alignment, the dashboard is an essential resource for achieving and maintaining compliance in Azure environments.


Microsoft-Defender-for-Cloud-Regulatory-Compliance

Security Recommendations

The Microsoft Defender for Cloud - Security Recommendations dashboard helps Azure cloud security analysts identify, prioritize, and address security risks across Azure resources. It provides a clear breakdown of recommendations by risk level (High, Medium, and Low) to ensure focus on critical issues. Analysts can track recommendation trends over time to monitor recurring or escalating vulnerabilities.

The dashboard highlights affected resources, such as Virtual Machines, Storage Accounts, and Apps, allowing quick action on impacted areas. It categorizes recommendations by threats, including data exfiltration, unauthorized access, and account breaches, helping teams understand attack patterns. Analysts can also view recommendations by resource type, such as Compute, Networking, or Containers, for efficient resource-specific remediation.

Detailed remediation steps are included in the Top Action Plans, providing clear guidance for resolving high-risk vulnerabilities. This dashboard empowers security teams to proactively secure their Azure environment, streamline remediation workflows, and maintain compliance with organizational security goals.


Microsoft-Defender-for-Cloud-Security-Recommendations

Create monitors for Microsoft Defender for Cloud app

From your App Catalog:

  1. From the Sumo Logic navigation, select App Catalog.
  2. In the Search Apps field, search for and then select your app.
  3. Make sure the app is installed.
  4. Navigate to What's Included tab and scroll down to the Monitors section.
  5. Click Create next to the pre-configured monitors. In the create monitors window, adjust the trigger conditions and notifications settings based on your requirements.
  6. Scroll down to Monitor Details.
  7. Under Location click on New Folder.
    note

    By default, monitor will be saved in the root folder. So to make the maintenance easier, create a new folder in the location of your choice.

  8. Enter Folder Name. Folder Description is optional.
    tip

    Using app version in the folder name will be helpful to determine the versioning for future updates.

  9. Click Create. Once the folder is created, click on Save.

Microsoft Defender for Cloud monitors

NameDescriptionTrigger Type (Critical / Warning / MissingData)Alert Condition
Alert from Embargoed CountriesThis alert is triggered when activities or access attempts are detected from countries or regions under embargo or subject to restrictions. It highlights potential geopolitical risks or unauthorized access attempts from flagged locations.CriticalCount > 0
Critical AlertThis is a high-priority alert that is triggered when a serious issue or threat is detected within your Azure environment. These alerts often correspond to malicious activities, severe configuration vulnerabilities, or critical system failures requiring immediate attention.CriticalCount > 0
Critical Security RecommendationThis alert is triggered when a high-risk vulnerability or misconfiguration is detected in your Azure resources. It provides actionable insights for strengthening your cloud security posture.CriticalCount > 0

Troubleshooting

Verify Event Hub data flow

If your configured Event Hub instance is not successfully sending data to Sumo Logic. Follow the below steps to troubleshoot the issue:

  1. Navigate to the Event Hub Instance Blade in the Azure portal and select the Data Explorer (preview) tab to send sample events.
    event-hub-instance-blade
  2. In the Data Explorer (preview) page, click Send event and preview the sample events.
    data-explorer
  3. Verify if those events are being sent to the Sumo Logic by Live Tailing. If the data matches, then the Event Hub instance will successfully send data to Sumo Logic.
    live-tailing

Validate alerts at Event Hub

If you are not receiving any alerts from the Microsoft Defender to the Event Hub instance, first make sure that the generated sample alerts are received in your configured Event Hub instance. This ensures the connection between Defender and Event Hub is functioning correctly. To test the pipeline by sending sample alerts from Microsoft Defender, follow the below steps:

  1. In the Microsoft Defender console, select Security Alerts under General section.
  2. In the Security Alerts page, select the Sample Alerts tab.
  3. Click on Create sample alerts to receive the sample alerts. This validates that the sample alerts are forwarded to the configured Event Hub instance.

validate-microsoft-defender-alerts
info

There may be a delay in forwarding alerts from Microsoft Defender to the Event Hub instance. If you experience significant delays, reach out to Azure Support for assistance.

Upgrade/Downgrade the Microsoft Defender for Cloud app (Optional)

To update the app, do the following:

  1. Select App Catalog.
  2. In the Search Apps field, search for and then select your app.
    Optionally, you can identify apps that can be upgraded in the Upgrade available section.
  3. To upgrade the app, select Upgrade from the Manage dropdown.
    1. If the upgrade does not have any configuration or property changes, you will be redirected to the Preview & Done section.
    2. If the upgrade has any configuration or property changes, you will be redirected to Setup Data page.
      1. In the Configure section of your respective app, complete the following fields.
        • Key. Select either of these options for the data source.
          • Choose Source Category and select a source category from the list for Default Value.
          • Choose Custom and enter a custom metadata field. Insert its value in Default Value.
      2. Click Next. You will be redirected to the Preview & Done section.

Post-update

Your upgraded app will be installed in the Installed Apps folder, and dashboard panels will start to fill automatically.

note

See our Release Notes changelog for new updates in the app.

To revert the app to a previous version, do the following:

  1. Select App Catalog.
  2. In the Search Apps field, search for and then select your app.
  3. To version down the app, select Revert to < previous version of your app > from the Manage dropdown.

Uninstalling the Microsoft Defender for Cloud app (Optional)

To uninstall the app, do the following:

  1. Select App Catalog.
  2. In the 🔎 Search Apps field, run a search for your desired app, then select it.
  3. Click Uninstall.
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.