Microsoft Defender for Endpoint – Setup

Overview

You must create a Microsoft Azure application to obtain credentials to install a Microsoft Defender for Endpoint Connector.

Two different authentication methods can be used:

  • Application permissions
  • Delegated permissions

You can find an overview of the differences between these authentication methods here.

Remote Setup in Microsoft Azure – performed by Cyclr Partner

You must create a Microsoft Azure application to obtain an Application (client) IDClient Secret, and Directory (tenant) ID.

The Application (client) ID and Directory (tenant) ID can be found on the Overview screen and the Client Secret can be created and found on the Manage > Certificates & secrets screen:

Application permissions

Microsoft’s guide on creating a Microsoft Azure application with application permissions can be found here. Step 9 of the guide should be skipped if you’re using a single-tenanted application for internal processes. The following permissions should be added depending on which Connector methods you wish to use:

MethodPermission
AlertsGet Alert Related Machine InformationMachine.Read.All or Machine.ReadWrite.All
List AlertsAlert.Read.All or Alert.ReadWrite.All
Browser ExtensionsList Browser Extensions Permission InformationSoftware.Read.All
Device HealthList Antivirus Health ReportMachine.Read.All
MachinesGet MachineMachine.Read.All or Machine.ReadWrite.All
List Machine Discovered VulnerabilitiesVulnerability.Read.All
List Machine Installed SoftwareSoftware.Read.All
List Machine Logon UsersUser.Read.All
List Machine Related AlertsAlert.Read.All or Alert.ReadWrite.All
List Machine Security RecommendationsSecurityRecommendation.Read.All
List MachinesMachine.Read.All or Machine.ReadWrite.All

Delegated permissions

Microsoft’s guide on creating a Microsoft Azure application with delegated permissions can be found here.

The following permissions should be added depending on which Connector Methods you wish to use:

Method categoryMethodPermission
AlertsGet Alert Related Machine InformationMachine.Read or Machine.ReadWrite
List AlertsAlert.Read or Alert.ReadWrite
Browser ExtensionsList Browser Extensions Permission InformationSoftware.Read
Device HealthList Antivirus Health ReportMachine.Read
MachinesGet MachineMachine.Read or Machine.ReadWrite
List Machine Discovered VulnerabilitiesVulnerability.Read
List Machine Installed SoftwareSoftware.Read
List Machine Logon UsersUser.Read.All
List Machine Related AlertsAlert.Read or Alert.ReadWrite
List Machine Security RecommendationsSecurityRecommendation.Read
List MachinesMachine.Read or Machine.ReadWrite

Partner Setup in Cyclr Console

Having created an application within Microsoft Azure, go into your Cyclr Partner Console:

  1. Go to Connectors > Application Connector Library.
  2. Use the search box to locate the Microsoft Defender for Endpoint Connector entry.
  3. Select the Pencil button.
  4. Select the Settings tab.
  5. Enter the below values:

PropertyDescription
Client IDThe Application (client) ID from the Overview page of your Microsoft Azure application.
Client SecretThe Client secret from the Manage > Certificates & secrets page of your Microsoft Azure application.
  1. If using a multi-tenanted application, enter the below value:

PropertyDescription
Tenant IDSet this to “Common” in order to allow multi-tenanted auth.
  1. Select Save Changes.

If you leave these values blank, they must be provided each time the Connector is installed.

Cyclr Connector Installation

When installing the Microsoft Defender for Endpoint Connector, the following values are used:

PropertyDescription
Client IDThe Application (client) ID from the Overview page of your Microsoft Azure application.Only required if not set in your Cyclr Partner Console.
Client SecretThe Client secret from the Manage > Certificates & secrets page of your Microsoft Azure application.Only required if not set in your Cyclr Partner Console.
UsernameThe Username of the Microsoft Azure account to authenticate with.Delegated permissions only.
PasswordThe Password of the Microsoft Azure account to authenticate with.Delegated permissions only.
Tenant IDThe Directory (tenant) ID from the Overview page of your Microsoft Azure application.