diff --git a/blog-service/2025-09-29-apps.md b/blog-service/2025-09-29-apps.md
new file mode 100644
index 0000000000..27b9011abd
--- /dev/null
+++ b/blog-service/2025-09-29-apps.md
@@ -0,0 +1,14 @@
+---
+title: Azure Security - Microsoft Defender for Identity (Apps)
+image: https://help.sumologic.com/img/reuse/rss-image.jpg
+keywords:
+ - apps
+ - azure
+ - microsoft
+ - azure-security-microsoft-defender-for-identity
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+We're excited to introduce the new Sumo Logic app for Azure Security - Microsoft Defender for Identity. This app offers you enhanced capabilities to protect endpoints and defend against advanced cyber threats. [Learn more](/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity).
\ No newline at end of file
diff --git a/cid-redirects.json b/cid-redirects.json
index 4f5ecc11bc..0720d64315 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -2940,6 +2940,8 @@
"/cid/1107": "/docs/integrations/saas-cloud/aws-iam-users",
"/cid/1109": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365",
"/cid/1108": "/docs/integrations/saas-cloud/trellix-mvision-epo",
+ "/cid/1110": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity",
+ "/docs/integrations/microsoft-azure/microsoft-defender-for-identity/": "/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity",
"/Cloud_SIEM_Enterprise": "/docs/cse",
"/Cloud_SIEM_Enterprise/Administration": "/docs/cse/administration",
"/Cloud_SIEM_Enterprise/Administration/Cloud_SIEM_Enterprise_Feature_Update_(2022)": "/docs/cse/administration",
diff --git a/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity.md b/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity.md
new file mode 100644
index 0000000000..074dda3bc9
--- /dev/null
+++ b/docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity.md
@@ -0,0 +1,249 @@
+---
+id: azure-security-microsoft-defender-for-identity
+title: Azure Security - Microsoft Defender for Identity
+description: Learn how to collect alerts from the Azure Security - Microsoft Defender for Identity platform and send them to Sumo Logic for analysis.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for Azure Security – Microsoft Defender for Identity enhances endpoint protection by centralizing alert data from various devices, enabling faster detection, investigation, and response to cyber threats. It uses advanced analytics and threat intelligence to identify malicious behavior and high-risk activity. With detailed dashboards and visualizations, it helps security teams track recurring incidents, assess vulnerabilities, and reduce response time, offering a comprehensive view of your organization’s endpoint security posture.
+
+:::info
+This app includes [built-in monitors](#azure-security---microsoft-defender-for-identity-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Microsoft Defender for Identity app](#create-monitors-for-azure-security---microsoft-defender-for-identity-app).
+:::
+
+## Log types
+
+The Azure Security – Microsoft Defender for Identity app uses Sumo Logic’s Microsoft Graph Security source to collect [alerts](https://learn.microsoft.com/en-us/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http) from the Microsoft Graph Security source.
+
+### Sample log messages
+
+
Alert Log
+
+```json
+{
+ "@odata.type": "#microsoft.graph.security.alert",
+ "id": "da637551227677560813_-961444813",
+ "providerAlertId": "da637551227677560813_-961444813",
+ "incidentId": "28282",
+ "status": "new",
+ "severity": "low",
+ "classification": "unknown",
+ "determination": "unknown",
+ "serviceSource": "microsoftDefenderForIdenity",
+ "detectionSource": "antivirus",
+ "detectorId": "e0da400f-affd-43ef-b1d5-afc2eb6f2756",
+ "tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
+ "title": "Suspicious execution of hidden file",
+ "description": "A hidden file has been launched. This activity could indicate a compromised host. Attackers often hide files associated with malicious tools to evade file system inspection and defenses.",
+ "recommendedActions": "Collect artifacts and determine scope Review the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) Look for the presence of relevant artifacts on other systems.",
+ "category": "DefenseEvasion",
+ "assignedTo": null,
+ "alertWebUrl": "https://security.microsoft.com/alerts/da637551227677560813_-961444813?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
+ "incidentWebUrl": "https://security.microsoft.com/incidents/28282?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
+ "actorDisplayName": null,
+ "threatDisplayName": null,
+ "threatFamilyName": null,
+ "mitreTechniques": [
+ "T1564.001"
+ ],
+ "createdDateTime": "2021-04-27T12:19:27.7211305Z",
+ "lastUpdateDateTime": "2021-05-02T14:19:01.3266667Z",
+ "resolvedDateTime": null,
+ "firstActivityDateTime": "2021-04-26T07:45:50.116Z",
+ "lastActivityDateTime": "2021-05-02T07:56:58.222Z",
+ "comments": [],
+ "evidence": [
+ {
+ "@odata.type": "#microsoft.graph.security.deviceEvidence",
+ "createdDateTime": "2021-04-27T12:19:27.7211305Z",
+ "verdict": "unknown",
+ "remediationStatus": "none",
+ "remediationStatusDetails": null,
+ "firstSeenDateTime": "2020-09-12T07:28:32.4321753Z",
+ "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",
+ "azureAdDeviceId": null,
+ "deviceDnsName": "yonif-lap3.middleeast.corp.microsoft.com",
+ "hostName": "yonif-lap3",
+ "ntDomain": null,
+ "dnsDomain": "middleeast.corp.microsoft.com",
+ "osPlatform": "Windows10",
+ "osBuild": 22424,
+ "version": "Other",
+ "healthStatus": "active",
+ "riskScore": "medium",
+ "rbacGroupId": 75,
+ "rbacGroupName": "UnassignedGroup",
+ "onboardingStatus": "onboarded",
+ "defenderAvStatus": "unknown",
+ "ipInterfaces": [
+ "1.1.1.1"
+ ],
+ "loggedOnUsers": [],
+ "roles": [
+ "compromised"
+ ],
+ "detailedRoles": [
+ "Main device"
+ ],
+ "tags": [
+ "Test Machine"
+ ],
+ "vmMetadata": {
+ "vmId": "ca1b0d41-5a3b-4d95-b48b-f220aed11d78",
+ "cloudProvider": "azure",
+ "resourceId": "/subscriptions/8700d3a3-3bb7-4fbe-a090-488a1ad04161/resourceGroups/WdatpApi-EUS-STG/providers/Microsoft.Compute/virtualMachines/NirLaviTests",
+ "subscriptionId": "8700d3a3-3bb7-4fbe-a090-488a1ad04161"
+ }
+ }
+ ],
+ "systemTags" : [
+ "Defender Experts"
+ ]
+}
+```
+
+
+### Security
+
+The **Azure Security - Microsoft Defender for Identity - Security** dashboard offers a strategic, high-level view of the organisation’s endpoint threat landscape, enabling security teams to pinpoint risk concentrations and monitor how threats evolve over time. Interactive trend panels display shifts in alert severity, helping teams quickly identify surges in high-risk incidents and prioritise their response accordingly.
+
+Geo-location insights spotlight alerts originating from high-risk regions, supporting threat assessments tied to specific geopolitical contexts. The dashboard also provides critical visibility into top user accounts with compromised or privileged roles—potential indicators of targeted attacks or insider threats.
+
+Additionally, it ranks the most frequently attacked devices and highlights countries linked to malicious or suspicious IP activity, offering clear insight into the most vulnerable assets and regions. This intelligence allows for more focused defences and faster, more effective threat mitigation.
+
+By integrating trend analysis, threat origin mapping, and user risk profiling, the Security dashboard empowers analysts to detect emerging patterns, respond proactively, and strengthen the organisation’s resilience against sophisticated endpoint threats.
+
+
+## Create monitors for Azure Security - Microsoft Defender for Identity app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+
Learn about the Sumo Logic collection process for the Azure Security - Defender for Cloud service.
+Learn about the Sumo Logic collection process for the Azure Security - Microsoft Defender for Identity
+})
-
-Microsoft Defender for Identity is a cloud-based security solution that help you secure your identity monitoring across your organization. It helps deliver a modern identity threat detection (ITDR) solution across hybrid environments, including:
-- Prevent breaches, using proactive identity security posture assessments.
-- Detect threats, using real-time analytics and data intelligence.
-- Investigate suspicious activities, using clear, actionable incident information.
-- Respond to attacks, using automatic response to compromised identities.
-
-This document outlines the steps required to collect and analyse the [Microsoft Defender for Identity](https://learn.microsoft.com/en-us/defender-for-identity/what-is) alerts in the Sumo Logic platform.
-
-## Set up collection
-
-:::note
-Skip this step if you have already configured the Microsoft Graph Security API Source.
-:::
-
-Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Defender for Identity to the Sumo Logic platform.
-
-## Search alerts
-
-Use the following query to retrieve alerts generated by the Microsoft Defender for Identity.
-
-```sql
-_sourcecategory=Labs/MicrosoftGraphSecurity
-| json field=_raw "serviceSource" as service_source
-| where service_source = "microsoftDefenderForIdentity"
-```
-
-## Analyse alerts
-
-Use the following query to extract detailed insights from the alert data:
-
-```sql
-_sourceCategory=Labs/MicrosoftGraphSecurity
-|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
-| where service_source = "microsoftDefenderForIdentity"
-| where severity matches "*" and status matches "*" and classification matches "*"
-| if(isNull(category),"-",category) as category
-| if(isNull(classification),"-",classification) as classification
-| if(isNull(determination),"-",determination) as determination
-| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
-| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
-| tourl (alert_url,alert_id) as alert_id
-| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
-| fields -_messageTime
-| sort by time
-```
\ No newline at end of file
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md
index 5c3b919abb..27b7b5320d 100644
--- a/docs/integrations/product-list/product-list-a-l.md
+++ b/docs/integrations/product-list/product-list-a-l.md
@@ -119,7 +119,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
|
| [AWS Simple Notification Service](https://aws.amazon.com/sns/) | Automation integration: [AWS Simple Notification Service](/docs/platform-services/automation-service/app-central/integrations/aws-simple-notification-service/) |
|
| [AWS WAF](https://aws.amazon.com/waf/) | Apps:
| [Axonius](https://www.axonius.com/) | Automation integration: [Axonius](/docs/platform-services/automation-service/app-central/integrations/axonius/) |
-|
| [Azure](https://azure.microsoft.com/en-us) | Apps:
| [Azure](https://azure.microsoft.com/en-us) | Apps: