Collect Microsoft Defender for Cloud alerts
This document explains how to collect Microsoft Defender for Cloud (formerly Azure Security Center) alerts by setting up a Google Security Operations feed. You can configure ingestion using two methods: Azure Event Hub (recommended) or the Third Party API.
Microsoft Defender for Cloud is a cloud-native application protection platform that provides unified security management and threat protection across Azure, hybrid, and multi-cloud workloads.
Before you begin
Ensure that you have the following prerequisites:
- A Google SecOps instance
- Privileged access to the Microsoft Azureportal
- Security Adminor Contributorrole on the Azure subscription containing Defender for Cloud
- Microsoft Defender for Cloud enabled on the subscription with at least one Defender plan active
Method 1: Azure Event Hub (recommended)
This method uses Defender for Cloud's Continuous Export feature to stream security alerts to an Azure Event Hub. Event Hub Capture writes the data to Azure Blob Storage, and Google SecOps ingests the logs from Blob Storage.
Configure Azure Storage Account
Create Storage Account
- In the Azure portal, search for Storage accounts.
- Click + Create.
-
Provide the following configuration details:
Setting Value Subscription Select your Azure subscription Resource group Select existing or create new Storage account name Enter a unique name (for example, secopsdefenderalerts)Region Select the region closest to your Event Hub namespace Performance Standard (recommended) Redundancy LRS (Locally redundant storage) or GRS (Geo-redundant storage) -
Click Review + create.
-
Review the overview and click Create.
-
Wait for the deployment to complete.
Get Storage Account credentials
- Go to the Storage Accountyou created.
- In the left navigation, select Access keysunder Security + networking.
- Click Show keys.
- Copy and save the following:
- Storage account name
- Key 1or Key 2: The shared access key.
Create Event Hub namespace and Event Hub
Create Event Hub namespace
- In the Azure portal, search for Event Hubs.
- Click + Create.
-
Provide the following configuration details:
Setting Value Subscription Select your Azure subscription Resource group Select the same resource group as your storage account Namespace name Enter a unique name (for example, secops-defender-alerts)Location Select the same region as your storage account Pricing tier Standard (required for Event Hub Capture) -
Click Review + create, then click Create.
-
Wait for the deployment to complete.
Create Event Hub
- Go to the Event Hub namespace you created.
- Click + Event Hubat the top.
- Provide the following configuration details:
- Name: Enter a name (for example,
defender-alerts). - Partition count: 2 (default, increase for higher throughput).
- Cleanup policy: Delete.
- Retention time (hrs): 24 (minimum, increase if needed for resilience).
- Name: Enter a name (for example,
- Click Review + create, then click Create.
Enable Event Hub Capture
- Go to the Event Hub you created (inside the namespace).
- In the left navigation, select Capture.
- Set Captureto On.
-
Provide the following configuration details:
Setting Value Time window (minutes) 5 (or lower for near-real-time) Size window (MB) 300 Capture Provider Azure Blob Storage Azure Subscription Select your subscription Storage Account Select the storage account you created Blob Container Create or select a container (for example, defender-alerts-capture) -
Click Save.
Configure Continuous Export to Event Hub
- In the Azure portal, search for Microsoft Defender for Cloud.
- In the left navigation, go to Environment settings.
- Select the subscription you want to export alerts from.
- In the left navigation, select Continuous export.
- Select the Event Hubtab.
- Set Export statusto On.
- In the Exported data typessection, select Security alerts.
- Optionally, set Include alert severityto filter by severity (for example, High and Medium only).
- In the Export configurationsection, provide the following details:
- Resource group: Select the resource group containing your Event Hub.
- Event hub namespace: Select the namespace you created (for example,
secops-defender-alerts). - Event hub name: Select the Event Hub you created (for example,
defender-alerts). - Event hub policy name: Select RootManageSharedAccessKey.
-
Click Save.
Configure a feed in Google SecOps to ingest Defender for Cloud alerts
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- On the next page, click Configure a single feed.
- In the Feed namefield, enter a name for the feed (for example,
Defender for Cloud Alerts - Event Hub). - Select Microsoft Azure Blob Storage V2as the Source type.
- Select Microsoft Security Centeras the Log type.
- Click Next.
-
Specify values for the following input parameters:
-
Azure URI: Enter the Blob Service endpoint URL with the capture container path:
https://<storage-account>.blob.core.windows.net/defender-alerts-capture/- Replace
<storage-account>with your Azure storage account name.
- Replace
-
Source deletion option: Select the deletion option according to your preference:
- Never: Never deletes any files after transfers.
- Delete transferred files: Deletes files after successful transfer.
- Delete transferred files and empty directories: Deletes files and empty directories after successful transfer.
-
Maximum File Age: Include files modified in the last number of days. Default is 180 days.
-
Shared key: Enter the shared access key value from the Storage Account.
-
Asset namespace: The asset namespace .
-
Ingestion labels: The label to be applied to the events from this feed.
-
-
Click Next.
-
Review your new feed configuration in the Finalizescreen, and then click Submit.
Configure Azure Storage firewall (if enabled)
If your Azure Storage Account uses a firewall, you must add Google SecOps IP ranges.
- In the Azure portal, go to your Storage Account.
- Select Networkingunder Security + networking.
- Under Firewalls and virtual networks, select Enabled from selected virtual networks and IP addresses.
- In the Firewallsection, under Address range, click + Add IP range.
- Add each Google SecOps IP range in CIDR notation.
- See IP Allowlisting documentation .
- Or retrieve them programmatically using the Feed Management API .
- Click Save.
Method 2: Third Party API
This method uses the Azure Resource Manager API to retrieve Defender for Cloud alerts directly from your Azure subscription.
Configure IP allowlisting
Before creating the feed, you must allowlist Google SecOps IP ranges in your Microsoft Azure network settings.
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- Note the IP ranges displayed in the feed creation interface.
- Alternatively, retrieve IP ranges programmatically using the Feed Management API .
Configure Microsoft Entra app registration
Create app registration
- Sign in to the Microsoft Entra admin center or Azure portal .
- Go to Identity > Applications > App registrations.
- Click New registration.
- Provide the following configuration details:
- Name: Enter a descriptive name (for example,
Google SecOps Defender for Cloud Integration). - Supported account types: Select Accounts in this organizational directory only (Single tenant).
- Redirect URI: Leave blank (not required for service principal authentication).
- Name: Enter a descriptive name (for example,
- Click Register.
- After registration, copy and save the following values:
- Application (client) ID
- Directory (tenant) ID
Create client secret
- In the app registration, go to Certificates & secrets.
- Click New client secret.
-
Provide the following configuration details:
- Description: Enter a descriptive name (for example,
Google SecOps Feed). - Expires: Select an expiration period.
- Description: Enter a descriptive name (for example,
-
Click Add.
-
Copy the client secret Valueimmediately.
Assign subscription-level role
The app registration requires read access to the Azure subscription to retrieve Defender for Cloud alerts.
- In the Azure portal, go to Subscriptions.
- Select the subscription containing Defender for Cloud.
- Copy and save the Subscription ID(UUID format, for example,
a1b2c3d4-e5f6-7890-abcd-ef1234567890). - Go to Access control (IAM).
- Click + Add > Add role assignment.
- In the Roletab, search for and select Security Reader.
- Click Next.
- In the Memberstab, click + Select members.
- Search for your app registration name and select it.
-
Click Select, then click Review + assign.
Configure a feed in Google SecOps to ingest Defender for Cloud alerts
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- On the next page, click Configure a single feed.
- In the Feed namefield, enter a name for the feed (for example,
Microsoft Defender for Cloud Alerts). - Select Third Party APIas the Source type.
- Select Microsoft Security Centeras the Log type.
- Click Next.
-
Specify values for the following input parameters:
- OAuth Client ID: Enter the Application (client) IDfrom the app registration.
- OAuth Client Secret: Enter the client secret valueyou copied earlier.
- Subscription ID: Enter the Subscription IDyou copied earlier in UUID format (for example,
a1b2c3d4-e5f6-7890-abcd-ef1234567890). - Tenant ID: Enter the Directory (tenant) IDfrom the app registration in UUID format.
-
API Hostname: Enter the Azure Resource Manager API hostname:
management.azure.com -
API Authentication Endpoint: Enter the Microsoft Active Directory authentication endpoint:
login.microsoftonline.com -
Asset namespace: The asset namespace .
-
Ingestion labels: The label to be applied to the events from this feed.
-
Click Next.
-
Review your new feed configuration in the Finalizescreen, and then click Submit.
Regional endpoints
For Microsoft Azure deployments in sovereign clouds, use the appropriate regional endpoints:
| Cloud Environment | API Hostname | API Authentication Endpoint |
|---|---|---|
|
Global
|
management.azure.com
|
login.microsoftonline.com
|
|
US Government
|
management.usgovcloudapi.net
|
login.microsoftonline.us
|
|
China (21Vianet)
|
management.chinacloudapi.cn
|
login.chinacloudapi.cn
|
Multi-subscription ingestion
To ingest Defender for Cloud alerts from multiple Azure subscriptions, create a separate feed for each subscription. Each feed requires its own Subscription ID.
Alternatively, use the Event Hub method (Method 1) with Continuous Export configured on each subscription pointing to the same Event Hub namespace. This consolidates alerts from multiple subscriptions into a single Google SecOps feed.
Need more help? Get answers from Community members and Google SecOps professionals.

