7.2.1. Microsoft Defender Integration

Cyber Triage can integrate with Defender for Endpoint in two ways:

7.2.1.1. Configure Defender API Access

7.2.1.1.1. Create an Azure App

To access the data via an API, you need to create credentials by making an “App”. You can find the instructions on the Microsoft Site.

The basic process is:

  • Create the App within Microsoft Entra

  • Give it Defender Graph API permissions:
    • SecurityAlert.Read.All

    • ThreatHunting.Read.All

  • Generate a ‘client secret’

At the end of this process, you will need to know:
  • Client ID / Application ID

  • Client Secret

  • Tenant ID / Directory ID

7.2.1.1.2. Add API Credentials into Cyber Triage

Once you’ve created the App, you can configure the tokens in Cyber Triage.

  • Go to the options panel and choose “Integrations / Microsoft Defender”.

  • Enter in the Client ID, Client Secret, and Tenant ID.

  • Press Test Connection to verify Cyber Triage can talk to the server.

../../_images/integ_defend_api_config.png

7.2.1.2. Export Defender CSV Telemetry

To export telemetry data so that it can be imported into Cyber Triage:

  • Pick the device you want to analyze

  • Select the “Timeline” tab and, if needed, navigate to the relevant time range

  • Press the Export button

  • This will save 7 days of activity to your local system.

  • You can repeat this process by moving the timeline to a different 7-day range and exporting again. Cyber Triage can import multiple CSV files.

../../_images/integ_defend_timeline_export.png