Skip to main content
This matrix shows which ContraForce features are available for each supported security integration. Use it to understand what your team can do based on the tools deployed in your customer environments.
Looking for Microsoft Defender XDR-specific capability details by license tier (Business Premium, E3, E5)? See the Microsoft Defender Capability Matrix.

Legend

SymbolMeaning
Capability fully available
✓(1)Requires Microsoft Entra ID connection
✓(2)Requires Microsoft Defender for Endpoint
✓(3)Requires Microsoft 365 Exchange license
Not available

Supported Integrations

CategoryIntegration
SIEMMicrosoft Sentinel
XDR / EDRMicrosoft Defender XDR, CrowdStrike Falcon, SentinelOne
IdentityMicrosoft Entra ID
EmailMicrosoft 365 Exchange

Incident Management

Unified incident queue with cross-workspace handling, bidirectional sync, and analyst assignment.
CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Bidirectional incident sync
Fetch incident entities
Fetch incident evidence (logs)
Alert timelines
Investigation audit trail

Entity Enrichment & Triage

Contextual intelligence for users, devices, IPs, files, emails, and URLs during investigations.

User Insights

CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Related incident search
Sign-in logs✓(1)
Audit logs✓(1)
Entra ID profile✓(1)

Device Insights

CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Device info
Device timeline✓(2)
Related incidents✓(2)

IP Address Insights

CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Sign-in activity
Related incidents✓(2)

Email, File & URL Insights

CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Email info✓(2)
File info
URL info✓(2)
(1) Requires Microsoft Entra ID connection.(2) Requires Defender for Endpoint — included with E5 or available as an add-on for Business Premium and E3.

Direct query access to log data for deep investigation and threat hunting.
CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Log search (Advanced Hunting)✓(2)

Gamebook Response Actions

Automated response playbooks for endpoint, file, identity, and email threats.

Endpoint Actions

ActionMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Isolate device✓(2)
Anti-virus scan✓(2)
Release from isolation✓(2)

File Actions

ActionMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Quarantine file✓(2)

User Actions

ActionMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Invalidate sessions✓(1)✓(1)
Reset password✓(1)✓(1)
Lock user✓(1)✓(1)
Unlock user✓(1)✓(1)

Email Actions

ActionMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Soft delete email✓(3)✓(3)
(1) Requires Microsoft Entra ID connection and the Gamebooks for Identity enterprise application.(2) Requires Defender for Endpoint — Sentinel gamebook actions execute through Defender for Endpoint.(3) Requires Microsoft 365 Exchange license and the Microsoft 365 Response enterprise application.

Endpoint Management

View and manage devices across your customer environments.
CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
View device list
View device details

Content Management System (CMS)

Deploy and manage detection rules across workspaces.
CapabilityMicrosoft SentinelDefender XDRCrowdStrike FalconSentinelOne
Deploy detection rules
Remove detection rules
Auto-update subscription
CMS requires the XDR + SIEM module. Microsoft Sentinel must be connected to use CMS.

Incident Notifications

Email notifications when new incidents arrive.
IntegrationEmail Notification
Microsoft Sentinel
Microsoft Defender XDR
CrowdStrike Falcon
SentinelOne
Incident email notifications require the XDR + SIEM module. Email notifications for Gamebook activity are available across all modules.


Questions about capabilities or integrations? Contact us at support@contraforce.com.