Microsoft Defender for Endpoint connector and action

edit
A newer version is available. Check out the latest documentation.

Microsoft Defender for Endpoint connector and action

edit

The Microsoft Defender for Endpoint connector enables you to perform actions on Microsoft Defender-enrolled hosts.

Create connectors in Kibana

edit

You can create connectors in Stack Management > Connectors or as needed when you’re creating a rule. For example:

Microsoft Defender for Endpoint connector
Connector configuration
edit

Microsoft Defender for Endpoint connectors have the following configuration properties:

API URL
The URL of the Microsoft Defender for Endpoint API. If you are using the xpack.actions.allowedHosts setting, make sure the hostname is added to the allowed hosts.
Application client ID
The application (client) identifier for your app in the Azure portal.
Client secret value
The client secret for your app in the Azure portal.
Name
The name of the connector.
OAuth scope
The OAuth scopes or permission sets for the Microsoft Defender for Endpoint API.
OAuth server URL
The OAuth server URL where authentication is sent and received for the Microsoft Defender for Endpoint API.
Tenant ID
The tenant identifier for your app in the Azure portal.

Test connectors

edit

You can test connectors as you’re creating or editing the connector in Kibana. For example:

Microsoft Defender for Endpoint connector test

Configure Microsoft Defender for Endpoint

edit

Before you create the connector, you must create a new application on your Azure domain. The procedure to create an application is found in the Microsoft Defender documentation.

Make note of the client ID, client secret, and tenant ID, since you must provide this information when you create your connector.