Microsoft 365 Defender

Microsoft 365 Defender

Integration

The integration is working with the product Microsoft Defender XDR, the unified enterprise defense solution that automatically aggregates and analyzes signal data from multiple sources, for example, anomalous behavior from Microsoft Defender for Endpoint or a suspicious sign-in from Microsoft Defender for Identity. It then correlates the data into an incident that represents an attack and provides easy investigation and response across endpoints, identities, emails, and applications.

References

API creation and configuration

Be aware that for APIs creation you need to ask azure, because we don’t have permissions to do that.

  1. Log on  Azure with a user that has the Global Administrator role

  2. Navigate to Azure Active Directory > App registrations > New registration

  3. In the registration form, choose a name for your application, and then select Register

  4. To enable your app to access Defender for Endpoint, on your application page, select API Permissions > Add permission and select the following permissions

  5. Select Grant consent

  6. Write down your application ID and your tenant ID. On your application page, go to Overview and copy the following.

  7. Copy all the data into RedCarbon integrations page

Mapping

Severity

OriginalRC SeverityRebased
Low105
Medium4020
High7035
Critical9045
Informational00
UnSpecified00
DEFAULT4020