# Microsoft Defender

The NetSPI Platform has a broad integration with Microsoft Defender.

This integration supports the Microsoft Defender product, which must be properly licensed in order for the integration to work.

Similar to our other integrations, the Microsoft Defender integration is read-only and does not perform actions to configure systems or otherwise change anything about your Microsoft Defencer system.

# Supported asset types

The Microsoft Defender integration provides the NetSPI Platform visibility into the following asset types:

  • Applications
  • IPV4 Addresses
  • Systems
  • Users

# Endpoints used

This integration needs access to the following API endpoints:

# Required permissions

This integration needs an API key with the following access permissions:

  • Device.Read.All
  • DeviceManagementConfiguration.Read.All
  • DeviceManagementManagedDevices.Read.All
  • DeviceManagementApps.Read.All
  • DeviceManagementRBAC.Read.All
  • DeviceManagementServiceConfig.Read.All
  • Directory.Read.All
  • User.Read
  • User.Read.All
  • AuditLogs.Read.All
  • UserAuthenticationMethod.Read.All
  • Vulnerability.Read.All
  • Software.Read.All
  • Machine.Read.All (for DefenderATP only)
  • Machine.Read.All
  • User.Read.All
  • SecurityRecommendation.Read.All
  • Software.Read.All
  • Vulnerability.Read.All

# Configuration steps

Use the section below for configuring Microsoft Defender to integrate with the NetSPI Platform.

# Step one: Microsoft Defender system configuration

  1. Sign in to the Microsoft Entra ID portal (https://portal.azure.com/), and select View for the Manage Microsfot Entra ID option.

    MS Graph Config Step 1

  2. Select App registrations in the left pane.

    MS Graph Config Step 2

  1. Select New registration along the top row of tabs.

    MS Graph Config Step 3

  2. Provide a descriptive name for the registration and select Register at the bottom.

    MS Graph Config Step 4

  3. Copy the values for Application (client) ID and Directory (tenant) ID as they will be needed when configuring the integration in the NetSPI Platform. Once copied, select Certificates & secrets in the left pane.

    MS Graph Config Step 5

  4. On the Client secrets tab, select New client secret.

    MS Graph Config Step 6

  5. Select an appropriate expiration period for the client secret and then select the Add button.

    MS Graph Config Step 7

  6. Once the client secret has been created, select the Copy icon to the right of the Value field and record the value as it will be needed when configuring the integration in the NetSPI Platform.

    MS Graph Config Step 8

  7. When completing steps 9 - 12, use the appropriate API permissions to add:

  8. Repeat the steps, granting both application permissions and delegated permissions to the application.

  9. When complete, the permissions list should look like the following:

MS Graph Config Step 11

  1. Select the Grant admin consent for <your domain> button and then select yes.

# Step two: NetSPI Platform CAASM module configuration

Use the steps below to configure the Microsoft Defender Integration in the NetSPI Platform.

  1. Log into the NetSPI Platform as a Client Admin user.

  2. Navigate to Settings -> CAASM Integrations to display the Integrations page.

    Platform Integrations page

  3. Select the Integration Library tab -> Integration Categories / Managed Detection and Response (MDR) -> Microsoft Defender Integration.

    Integration Library tab

    This brings the Microsoft Defender integration card into focus.

  4. Select the Add button on the Microsoft Defender card to display the Microsoft Defender integration configuration page.

    MS Defender integration page

  5. Select and enter values for the following fields.

    1. Select the integration type from the Integration drop-down list. In this case, Microsoft Defender Integration, which is already selected by default.

    2. Select the integration scope from the Scope drop-down list. The Microsoft Defender integration can only run on a cloud scope, which was configured by NetSPI and Cloud displays as the default value.

    3. Enter an integration name and description in the Integration Name and Description fields.

    4. Select the Enabled slider button to display as either on (blue) or off (light gray).

    5. In the Microsoft Defender Parameters field group, enter or select the following in the corresponding fields:

      Field Value
      Tenant ID The Directory (tenant) ID from step 5 in the section above
      Client ID the Application (client) ID from step 5 in the section above
      OAuth2 Secret The client secret generated in step 8 in the section above
      Ingest logged on users? drop-down list Select Yes or No to pull in data from logged-in users
      Ingest security recommendations? drop-down list Select Yes or No to pull in data from Microsoft Defender security recommendations
      Ingest vulnerabilities? Select Yes or No to pull in data from Microsoft Defender vulnerabilities
  6. Select Create to create the integration. The new integration now displays on the Applied Integrations tab with its statuses: current and last run, last run time, and status (enabled/disabled).