Microsoft Windows Defender for Endpoint is an advanced security solution that helps to protect devices and networks from cyber threats. In this article, we will focus on the steps required to integrate Microsoft Defender for Endpoint with the platform, a cloud security posture management platform.

Microsoft Defender for Endpoint Setup

Before setting up the integration, you need to prepare your instance of Defender to be connected to the platform. Here are the steps to do so:

Depending on the expiration date set, the credentials may need to be regenerated and updated within the platform. Otherwise, the connected accounts and imports would fail.

Make sure to copy the secret value as it will be obfuscated once you move away from that page.

note

The required permissions have been detailed below to troubleshoot any missing permissions or authorization errors.

The required permissions have been detailed below to troubleshoot any missing permissions or authorization errors.

Permission Name

Permission Display Name

Permission Type

Requirement

Vulnerability.Read.All

Read Threat and Vulnerability Management vulnerability information

Application

Required

Machine.Read.All

Read all machine profiles

Application

Required

Machine.ReadWrite.All

Read and write all machine profiles

Application

Highly Recommended

SecurityRecommendation.Read.All

Read Threat and Vulnerability Management security recommendation information

Application

Highly recommended

RemediationTasks.Read.All

Read Threat and Vulnerability Management vulnerability information

Application

Highly recommended

Connecting Microsoft Defender for Endpoint to the Platform

The platform only supports one subscription per tenant.

After completing the steps to prepare Defender to accept connections from the platform, follow the steps below to set up the Connected Accounts details:

By following these steps, you can easily integrate Microsoft Defender for Endpoint with the platform, enabling you to enhance your security posture and protect your devices and networks from cyber threats.