MicrosoftDefenderXDR

Microsoft Defender for Endpoint is an Endpoint Detection and Response (EDR) product that monitors the security of endpoints. The module required, at least, the Microsoft Defender for Endpoint plan 1
Configuration
| Name | Type | Description |
|---|---|---|
base_url |
string |
Base URL |
app_id |
string |
The identifier of the Azure Application |
app_secret |
string |
The value of the secret associated to the Azure Application |
tenant_id |
string |
The identifier of the Azure Directory |
Actions
Comment an alert
Comment an alert
Arguments
| Name | Type | Description |
|---|---|---|
alert_id |
string |
Alert ID |
comment |
string |
Comment |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the alert |
Cancel machine action
Cancel machine action
Arguments
| Name | Type | Description |
|---|---|---|
action_id |
string |
Action ID |
comment |
string |
Comment |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Get action info
Retrieve the status of an action of the machine
Arguments
| Name | Type | Description |
|---|---|---|
action_id |
string |
Action ID |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Isolate a machine
Isolate a machine
Arguments
| Name | Type | Description |
|---|---|---|
machine_id |
string |
Machine ID |
comment |
string |
Comment |
isolation_type |
string |
Isolation Type |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
scope |
string |
The scope of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Push IOCs
Push IOCs in the TI API of Microsoft Defender
Arguments
| Name | Type | Description |
|---|---|---|
stix_objects_path |
string |
Filepath of the STIX objects fetched from the collection |
sekoia_base_url |
string |
[Optional] Sekoia base url, used to generate direct links to IOCs |
action |
string |
Action to apply |
severity |
string |
Severity |
generate_alert |
boolean |
Generate Alert? |
Restrict code execution
Restrict the execution of code on a machine
Arguments
| Name | Type | Description |
|---|---|---|
machine_id |
string |
Machine ID |
comment |
string |
Comment |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Scan a machine
Run an Anti-Virus scan on a machine
Arguments
| Name | Type | Description |
|---|---|---|
machine_id |
string |
Machine ID |
comment |
string |
Comment |
scan_type |
string |
Scan Type |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
scope |
string |
The scope of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Deisolate a machine
Deisolate a machine
Arguments
| Name | Type | Description |
|---|---|---|
machine_id |
string |
Machine ID |
comment |
string |
Comment |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Unrestrict code execution
Remove the restriction of the code execution on a machine
Arguments
| Name | Type | Description |
|---|---|---|
machine_id |
string |
Machine ID |
comment |
string |
Comment |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the action |
type |
string |
The type of the action |
status |
string |
The status of the action |
requestor |
string |
Identify who executed the action |
title |
string |
The title of the action |
machineid |
string |
The identifier of the machine |
Update an alert
Update an alert
Arguments
| Name | Type | Description |
|---|---|---|
alert_id |
string |
Alert ID |
status |
string |
Status |
classification |
string |
Classification of the alert |
determination |
string |
Determination of the alert. The determination must match the classification (see https://learn.microsoft.com/en-us/defender-endpoint/api/update-alert) |
comment |
string |
Comment |
owner |
string |
Owner of the alert |
Outputs
| Name | Type | Description |
|---|---|---|
id |
string |
The identifier of the alert |
title |
string |
The title of the alert |
description |
string |
The description of the alert |
status |
string |
The status of the alert |
classification |
string |
The classification of the alert |
determination |
string |
The determination of the alert |
category |
string |
The category of the alert |
Set up
Configuration
Collect events
Create an Azure application
- On the Azure Portal, in the search bar, go to
App registrations - Click
+ New registration - Type a name
- Select
Accounts in this organizational directory onlyoption as account type - Click
Register - From the
Overviewpage, copyApplication (client) IDandDirectory (tenant) ID
Create a client secret
- Go to
Manage>Certificates & secrets - Click
+ New client secret - Type a description and select the desirated expiration period
- Click
Add - Copy the
Valueof the client secret
Add permissions
- Go to
Manage>API permissions - Click
Add a permissions - On the right panel, Select
APIs my organization usestab - Click
Office 365 Management APIs - Click
Application permissions - Select
ActivityFeed.Read - Click
Add permissions - In the
API permissionspage, clickGrant admin consent for TENANT_NAME - Click
Yesin theGrant admin consent confirmationmodal
Install Agent
- On security.microsoft.com, go to
System > Parameters - Click
Endpoints - Go to
Device Management > Onboarding - Download the Integration package
Create an application with the permission
- In Microsoft EntraID, create a new application under
App registrations. - For the permissions, go to
API permission - Click
+ Add a permission. SelectAPIs my organization usesand typeWindowsDefenderATP. - Select
WindowsDefenderATP. - In the permissions, select:
- Machine.Isolate
- Machine.Offboard
- Machine.Read.All
- Machine.RestrictExecution
- Machine.Scan
- Machine.StopAndQuarantine
- Ti.Read.All
- Ti.ReadWrite
- Ti.ReadWrite.All
- Alert.ReadWrite.All
- After permissions selection, grant the admin consent.
Extra
Module MicrosoftDefenderXDR v1.0.0