❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 12 May 2026Main stream

XdrLogRaider Defender XDR portal telemetry

A Microsoft Sentinel custom data connector that ingests Microsoft Defender XDR portal-only telemetry β€” configuration, compliance, drift, exposure, governance β€” that public Microsoft APIs (Graph Security, Microsoft 365 Defender, MDE) don't expose.

Platform Azure Functions (PowerShell 7.4), Log Analytics, Sentinel
Auth Two unattended auto-refreshing methods: Credentials+TOTP, Software Passkey. DirectCookies for diagnostic / one-shot use.
Scope Microsoft Defender XDR portal (security.microsoft.com) β€” telemetry streams across 10 functional categories (Endpoint Device Management, Endpoint Configuration, Vulnerability Management, Identity Protection, Configuration & Settings, Exposure Management, Threat Analytics, Action Center, Multi-Tenant Operations, Streaming API). Every stream documented + live-captured. Some streams activate only when the tenant provisions the underlying feature (MDI / TVM / MCAS / Intune / MDO / Custom Collection).
Prerequisite Existing Sentinel-enabled Log Analytics workspace (any RG / subscription in the same tenant). This template does NOT create a workspace.
Deployment One-click Deploy to Azure + one ./tools/Initialize-XdrLogRaiderAuth.ps1 run post-deploy. Cross-RG / cross-region workspace supported.
Content 8 workbooks Β· 20 analytic rules (14 detection + 6 XdrOps incl. RowVolumeSpike cost-budget gate) Β· 9 hunting queries Β· 4 KQL drift parsers + 11 consolidated LA tables (10 Defender_<Category>_CL + 1 XdrConnectorHealth_CL) Β· 390 sample queries (5 per active stream) β€” all auto-deployed via nested ARM. Every parser / rule / query / workbook column reference verified against live fix

Happy Hunting πŸ₯³ πŸŽ‰

submitted by /u/akefallonitis
[link] [comments]
❌
❌