Microsoft Defender ATP
- 1 minute to read
Microsoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats.
- Tenant ID (required) - The Azure Tenant ID
- Client ID (required) - The Application ID of the Axonius application
- Client Secret (required) - A user created key for the Axonius application.
- Verify SSL (required, default: False) - Verify the SSL certificate offered by the host supplied in Microsoft Defender ATP. For more details, see SSL Trust & CA Settings.
- If enabled, the SSL certificate offered by the host will be verified against the CA database inside of Axonius. If it fails validation, the connection will fail with an error.
- If disabled, the SSL certificate offered by the host will not be verified against the CA database inside of Axonius.
- HTTPS Proxy (optional, default: empty) - A proxy to use when connecting to Microsoft Defender ATP.
- If supplied, Axonius will utilize the proxy when connecting to the host defined for this connection.
- If not supplied, Axonius will connect directly to the host defined for this connection.
For details on the common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Configuring the application in the Microsoft Azure portal
Log in to the Azure Portal with an administrator account.
Select Azure Active Directory. If you have more than one directory, make sure you are logged in to the right directory. If you are not, click on the top-right account logo and then click "Switch Directory" and select the directory you want Axonius to access.
Select App registrations and click New registration. Fill in the details and click Register.
After you have created the app, you should see its Application ID and Directory ID. Keep these values, they are known as Client ID and Tenant ID.
In the left menu, click Certificates & Secrets, then click New Client Secret. Click Add and copy the secret.
In the left menu, click API Permissions and then Add a permission. Then select 'APIs my organization uses' and select the Microsoft Defender ATP API.
Add the permissions Machine.Read.All, Vulnerability.Read.All, Software.Read.All, User.Read.All.
Finally, click 'Grant admin consent for Default Directory' to apply these permissions.