Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Microsoft Windows Defender for Endpoint is an advanced security solution that helps to protect devices and networks from cyber threats. In this article, we will focus on the steps required to integrate Microsoft Defender for Endpoint with the platform, a cloud security posture management platform.

Microsoft Defender for Endpoint Setup

Before setting up the integration, you need to prepare your instance of Defender to be connected to the platform. Here are the steps to do so:

...

Permission Name

Permission Display Name

Permission Type

Requirement

Vulnerability.Read.All

Read Threat and Vulnerability Management vulnerability information

Application

Required

Machine.Read.All

Read all machine profiles

Application

Required

Machine.ReadWrite.All

Read and write all machine profiles

Application

Highly Recommended

SecurityRecommendation.Read.All

Read Threat and Vulnerability Management security recommendation information

Application

Highly recommended

RemediationTasks.Read.All

Read Threat and Vulnerability Management vulnerability information

Application

Highly recommended

Connecting Microsoft Defender for Endpoint to the Platform

Note

The platform only supports one subscription per tenant.

...