# Windows Defender

Scanner supports Windows Defender logs, which contain information related to security events, malware detections, and system scans. In order for Scanner to receive Windows Defender log events, you need to configure a worfklow to push these logs to an S3 bucket that Scanner is linked to.

## Step 1: Publish to S3

You can use the [Winlogbeats](https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html) agent to write Windows Defender log events as JSON to local files. You will need to set the event\_logs.name configuration parameter to read from the Windows Defender channel, which is `Microsoft-Windows-Windows Defender/Operational`.

See the Winlogbeats documentation for more information:

* [Winlogbeats configuration - event\_logs.name](https://www.elastic.co/guide/en/beats/winlogbeat/current/configuration-winlogbeat-options.html#configuration-winlogbeat-options-event_logs-name)
* [Configure the File output](https://www.elastic.co/guide/en/beats/winlogbeat/current/file-output.html)

You can use the [Fluentd](https://docs.fluentd.org/) agent to read Windows Defender logs from local file and write the logs to your S3 bucket. Make sure to configure the output format to be **JSON**. See the following Fluentd documentation articles:

* [Fluentd tail input module](https://docs.fluentd.org/input/tail)
* [Fluentd s3 output module](https://docs.fluentd.org/output/s3)

## Step 2: Ingest via Scanner Collect

Follow the instructions [here](https://docs.scanner.dev/scanner/using-scanner-complete-feature-reference/data-ingestion/sources/custom-logs-aws-s3) to ingest logs from S3 via Scanner Collect
