Skip to main content
Question

Best Way to Integrate Microsoft Defender for Endpoint with Google SecOps (SIEM vs SOAR)?

  • March 20, 2026
  • 1 reply
  • 41 views

Forum|alt.badge.img

I’m evaluating integration approaches for ingesting alerts from Microsoft Defender for Endpoint (MDE) into Google SecOps and facing challenges with both SIEM and SOAR options.

 

 

With Google SecOps SIEM:

 

 

  • MDE alerts and their evidences are ingested as individual events rather than a single alert/incident
  • This requires building additional detection rules to stitch events back together
  • Due to high alert volume from MDE, suppression via SIEM detection rules becomes difficult to manage

 

 

 

With Google SecOps SOAR:

 

 

  • Using the MDE connector results in 1 alert = 1 case (e.g., 1000 alerts/day → 1000 cases)
  • There is no pre-ingestion suppression/filtering mechanism
  • Any update to an alert (e.g., assignment change) generates a new alert in SOAR, leading to duplication

 

 

 

Key Questions:

 

 

  • What is the recommended architecture for integrating MDE with Google SecOps?
  • Is SIEM-based ingestion preferred over SOAR, or a hybrid approach?
  • How do you handle alert suppression and deduplication at scale?
  • Are there best practices to preserve alert context without rebuilding everything in SIEM?

 

 

Would appreciate insights from anyone who has implemented this at scale.

1 reply

Heliosfloresempirellc43
Forum|alt.badge.img

Challenge

SIEM (Event-Based)

SOAR (Case-Based)

Hybrid (Recommended)

Stitching

Manual Rules Required

Automatic via Connector

API-Driven via Incident ID

Volume

High (Hard to suppress)

High (Case Fatigue)

Low (Aggregated Stories)

Context

Fragmented Evidence

Full Alert Context