Skip to main content

Microsoft 365 Defender

Microsoft Defender for Office 365 helps organizations secure their enterprise with a set of prevention, detection, investigation, and hunting capabilities to protect emails and Office 365 resources.

To learn more about the service see the documentation on Microsoft 365 Defender.

Prerequisites

Permissions

  • "Global Administrator" role in Azure AD

  • "Organization Admin" role in MD.ECO

  • At least one Microsoft 365 Defender module configured and licensed

    • Microsoft Defender for Endpoint

      • Defender for Endpoint Plan 2 licenses

        or

      • Defender for Business licenses

        or

      • Defender for Cloud - Defender for Server Plan 2 licenses

    • Microsoft Defender for Identity

    • Microsoft Defender for Office 365

      • Defender for Office 365 Plan 2 licenses
    • Microsoft Defender for Cloud Apps

    • Microsoft Data Loss Prevention

Configuration Steps

Registering an application for the connector

Required Configuration

  • General settings
    • Name: MD.ECO - Connector - Microsoft Sentinel
    • Supported account types: Accounts in this organizational directory only (default option)
  • One secret
  • Required API permissions

Required API permissions

Microsoft Graph (2)
Permission NamePermission TypeDescription
User.Read.AllApplicationRead user profile information
SecurityIncident.ReadWrite.AllApplicationRead and write to all security incidents
WindowsDefenderATP (6)
Permission NamePermission TypeDescription
Machine.Read.AllApplicationRead all machine profiles
Vulnerability.Read.AllApplicationRead vulnerability information for threat and vulnerability management
Software.Read.AllApplicationRead software information for threat and vulnerability management
User.Read.AllApplicationRead user profile information
AdvancedQuery.Read.AllApplicationExecute advanced queries

Step-by-Step Guide

(Optional) Registering a remediation application [Beta]

It is possible to register a new application to separate remediation rights from the base application for the connector. It's also possible to simply add the required permissions in the same application.

Required Configurations
  • General settings
    • Name: MD.ECO - Connector - Microsoft 365 Defender - Remediation
    • Supported account types: Accounts in this organizational directory only (Default option)
  • One secret
  • Remediation API permissions
Remediation API permissions
Microsoft Graph (1)
Permission NamePermission Type
User.ReadWrite.AllApplication
WindowsDefenderATP (2)
Permission NamePermission Type
Machine.IsolateApplication
Machine.ScanApplication

Create the Azure application secret in MD.ECO and notify Mondata when completed

MD.ECO - Secrets - Create