...
Microsoft Windows Defender for Endpoint is an advanced security solution that helps to protect devices and networks from cyber threats. In this article, we will focus on the steps required to integrate Microsoft Defender for Endpoint with the platform, a cloud security posture management platform.
Microsoft Defender for Endpoint Setup
Before setting up the integration, you need to prepare your instance of Defender to be connected to the platform. Here are the steps to do so:
...
Permission Name | Permission Display Name | Permission Type | Requirement |
Vulnerability.Read.All | Read Threat and Vulnerability Management vulnerability information | Application | Required |
Machine.Read.All | Read all machine profiles | Application | Required |
Machine.ReadWrite.All | Read and write all machine profiles | Application | Highly Recommended |
SecurityRecommendation.Read.All | Read Threat and Vulnerability Management security recommendation information | Application | Highly recommended |
RemediationTasks.Read.All | Read Threat and Vulnerability Management vulnerability information | Application | Highly recommended |
Connecting Microsoft Defender for Endpoint to the Platform
Note |
---|
The platform only supports one subscription per tenant. |
After completing the steps to prepare Defender to accept connections from the platform, follow the steps below to set up the Connected Accounts details:
...