CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender EDR
CrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions like Microsoft Defender, enabling unified detection and response across diverse environments, addressing the challenges of cross-domain attacks and fragmented security systems.
CrowdStrike’s Falcon Next-Gen SIEM is expanding its capabilities to support third-party EDR solutions, beginning with Microsoft Defender. Announced on March 23, 2026, this enhancement allows organizations to integrate Microsoft Defender telemetry into Falcon Next-Gen SIEM, streamlining detection, investigation, and response without requiring changes to existing endpoint deployments. This integration addresses the increasing challenge of adversaries exploiting gaps across endpoint, identity, network, and cloud environments. Falcon Next-Gen SIEM aims to unify disparate security tools and workflows, improve data fidelity, and accelerate security outcomes by eliminating the traditional “data tax” associated with legacy SIEMs. The updates also include Falcon Onum for real-time data control, federated search capabilities, and third-party indicator management to improve threat intelligence operationalization.
Attack Chain
- Adversary gains initial access to a target environment through various means, potentially bypassing existing endpoint security measures.
- Microsoft Defender detects suspicious activity on an endpoint and generates telemetry data.
- Falcon Next-Gen SIEM ingests the Microsoft Defender telemetry data.
- Falcon Onum filters, enriches, and routes the telemetry data, reducing noise and improving data fidelity.
- Falcon Next-Gen SIEM analyzes the processed data, correlating it with other security event data.
- AI-powered threat detection identifies potentially malicious activity based on the combined data.
- Security analysts investigate the detected activity within the Falcon Next-Gen SIEM console, leveraging federated search capabilities to access additional data sources if needed.
- Based on the investigation, analysts initiate response actions through Falcon Fusion SOAR.
Impact
The integration of third-party EDR solutions like Microsoft Defender into CrowdStrike Falcon Next-Gen SIEM aims to reduce the time to detect and respond to threats. By unifying security data and workflows, organizations can eliminate blind spots, improve data fidelity, and accelerate investigations. Successful attacks can lead to data breaches, system compromise, and financial losses. The number of affected organizations and the specific financial impact will depend on the effectiveness of the integrated security measures.
Recommendation
- Deploy the Sigma rules provided in this brief to your SIEM and tune them according to your environment to detect suspicious activity correlated across multiple data sources.
- Enable and configure Microsoft Defender to generate detailed telemetry data, which can then be ingested into Falcon Next-Gen SIEM for enhanced analysis.
- Utilize Falcon Onum to filter, enrich, and route telemetry data to improve data fidelity and reduce storage costs, as mentioned in the overview.
- Leverage the federated search capabilities of Falcon Next-Gen SIEM to investigate threats across live, network, and archived data sources without costly re-ingestion, as described in the overview.
- Implement third-party indicator management to operationalize threat intelligence at scale by ingesting, enriching, scoring, and managing external indicators of compromise.
Detection coverage 2
Detect Data Ingestion from Microsoft Defender into Falcon SIEM
infoDetects when Microsoft Defender data is being ingested into Falcon SIEM, which may indicate the integration is being used for broader analysis.
Detect Suspicious Activity After Defender-SIEM Integration
mediumDetects suspicious network connections originating from processes that have been correlated with Defender telemetry.
Detection queries are kept inside the platform. Get full rules →