Should Microsoft Defender and Identity Protection logs be collected via Microsoft Security (Graph API) instead of Event Hub?

We’re currently forwarding Azure AD Identity Protection logs (Risk Detections / Risky Users) to InsightIDR via Azure Event Hub.
The data is successfully received, but all of these logs appear as Unparsed Logs . there are no AAD_Identity_Protection events categorized under Third-Party Alarms.

Meanwhile, I’ve noticed that:

  • Defender for Cloud logs are correctly parsed via Event Hub (supported schema).
  • Office 365 logs are ingested via the Cloud Service Activity event source.
  • However, based on the latest Rapid7 documentation, it seems that all Defender products (Cloud, Identity, Office 365, Endpoint, etc.) are now expected to be collected through the Microsoft Security (Graph API) connector instead of Event Hub.

So my questions are:

  1. Should we now migrate all Microsoft security products (Defender for Cloud, O365, Identity Protection, etc.) to the Microsoft Security (Graph API) connector for consistency?
  2. Is Event Hub ingestion still officially supported for some products (like Cloud or SignInLogs), or is it being phased out?
  3. Are there any plans for InsightIDR to parse Identity Protection (Risk Detection) logs natively via either Event Hub or the Graph API connector?

Thanks for clarifying the recommended approach . it seems logical to consolidate all Defender-related logs under the Microsoft Security connector if that’s the future-proof method.

@rthen You might help me to find right way :slight_smile:

I´m also interested

Hi testuser,

You should use both. This is recommended by Rapid7.

There are 2 big differences:

  • The data ingestion via the API might take hours or even longer while the data ingestion via the hub is almost instant
  • Both event sources ingest different meta data

Hope this helps