Microsoft Defender for Endpoint
Integrate Microsoft Defender alerts, incidents and vulnerabilities
The Microsoft Defender for Endpoint connector allows you to integrate your security data into OverSOC for centralized visibility of detected incidents and vulnerabilities.
Overview
The Microsoft Defender for Endpoint connector enables you to collect the following information:
- Machine inventory
- Security alerts and incidents
- Vulnerabilities (Threat & Vulnerability Management)
Prerequisites
- Microsoft 365 tenant with Microsoft Defender for Endpoint enabled
- Azure AD application configured with appropriate permissions
- Access to Azure portal to create/manage applications
Information to provide in OverSOC
| Field | Description |
|---|---|
| API URL* | Microsoft Defender API URL (e.g., https://api.security.microsoft.com) |
| Token URL* | Azure AD token endpoint URL (e.g., https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/token) |
| Tenant ID* | Azure AD tenant ID |
| Application (Client) ID* | Client ID of the Azure AD application |
| Client Secret* | Client secret of the Azure AD application |
Configuration
Register an application in Microsoft Entra ID
- Navigate to the Microsoft Entra admin center.
- Go to Microsoft Entra ID > App registrations > New registration.
- Fill in the application details:
- Name: OverSOC Microsoft Defender Connector
- Supported account types: Accounts in this organizational directory only
- Click Register.
- From the app overview page, note the Application (Client) ID and Directory (Tenant) ID.
Add Microsoft Defender API permissions
- In your app registration, go to API permissions > Add a permission.
- Select APIs my organization uses and search for WindowsDefenderATP.
- Click WindowsDefenderATP.
- Select Application permissions and add the following:
Machine.Read.AllAlert.Read.AllVulnerability.Read.AllSecurityRecommendation.Read.All
- Click Add permissions.
- Click Grant admin consent for Organization and confirm.
Generate a client secret
- In your app registration, go to Certificates & secrets > New client secret.
- Add a description (e.g., "OverSOC Connector").
- Select an expiration period.
- Click Add.
- Immediately copy the Value (it will only be displayed once).
Configure the connector in OverSOC
- In OverSOC, go to Data Sources Settings > Sources.
- Select Microsoft Defender for Endpoint and click Configure.
- Fill in the required fields:
- API URL: https://api.security.microsoft.com
- Token URL: https://login.microsoftonline.com/{Tenant ID}/oauth2/v2.0/token
- Tenant ID: Your Directory (Tenant) ID
- Application (Client) ID: Your Client ID
- Client Secret: Your generated secret value
- Click Save Configuration.
Reference: Microsoft Defender for Endpoint API - Create an app
Required Permissions
The Azure AD application must have the following minimum permissions:
Machine.Read.All: Read machine inventoryAlert.Read.All: Read alerts and incidentsVulnerability.Read.All: Vulnerability data accessSecurityRecommendation.Read.All: Security recommendations access