Skip to main content

Microsoft Defender for Clouds Apps

Thumbnail icon

Microsoft Defender for Cloud Apps delivers full protection for SaaS applications, helping you monitor and protect your cloud app data across the following feature areas:

  • Fundamental cloud access security broker (CASB) functionality
  • SaaS Security Posture Management (SSPM)
  • Advanced threat protection
  • App-to-app protection

This document outlines the steps required to collect and analyse the Microsoft Defender for Cloud Apps alerts in the Sumo Logic platform.

Set up collection

note

Skip this step if you have already configured the Microsoft Graph Security API Source.

Use the Cloud-to-Cloud Integration for Microsoft Graph Security API to ingest security alerts data from the Microsoft Defender for Cloud Apps to the Sumo Logic platform.

Search alerts

Use the following query to retrieve alerts generated by the Microsoft Defender for Cloud Apps.

_sourcecategory=Labs/MicrosoftGraphSecurity
| json field=_raw "serviceSource" as service_source
| where service_source = "microsoftDefenderForCloudApps"

Analyse alerts

Use the following query to extract detailed insights from the alert data:

_sourceCategory=Labs/MicrosoftGraphSecurity  
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as  alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
| where service_source = "microsoftDefenderForCloudApps"
| where severity matches "*" and status matches "*" and classification matches "*" 
| if(isNull(category),"-",category) as category
| if(isNull(classification),"-",classification) as classification
| if(isNull(determination),"-",determination) as determination
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
| tourl (alert_url,alert_id) as alert_id
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
| fields -_messageTime    
| sort by time
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.