Skip to main content

Microsoft Defender XDR Microsoft Defender XDR

Microsoft XDR (Extended Detection and Response), formerly known as 365 Defender, is a comprehensive cybersecurity solution that integrates multiple Microsoft security products for threat detection, investigation, and response across various domains like endpoints, email, and cloud to provide unified protection for an organization's digital environment.

Microsoft Defender XDR alerts are generated by many sources

Solutions that are part of Microsoft Defender XDR:

  • Microsoft Defender for Endpoint
  • Microsoft Defender for Office 365
  • Microsoft Defender for Identity
  • Microsoft Defender for Cloud Apps
  • The app governance add-on for Microsoft Defender for Cloud Apps
  • Microsoft Entra ID Protection
  • Microsoft Data Loss Prevention

Other services that have integrations with the Microsoft Defender security portal:

  • Microsoft Sentinel
  • Non-Microsoft security solutions that pass their alerts to Microsoft Sentinel
  • Microsoft Defender for Cloud

Creating a Microsoft Defender XDR connection

Using App Registration

To create the connection you need:

  • A client ID
  • A client secret
  • A tenant ID

Obtaining the credentials

  1. Log into the Azure Portal.

  2. Go to the Microsoft Entra ID resource.

    Azure Active Directory Resource

  3. In the left-hand menu, click App registrations.

    App Registrations

  4. Create a new application registration or click on one of your existing applications.

    My App

  5. In the left-hand menu, click API permissions.

    API Permissions

  6. Click Add a permission and select Microsoft Graph.

    Add Permission

  7. Choose Application permissions and mark the permissions you wish to add.

    Application Permissions

To support all of Blink's actions, these are the required application permissions:

info

As a best practice, request the least privileged permissions that your app needs in order to access data and function correctly. Requesting permissions with more than the necessary privileges is poor security practice, which may cause users to refrain from consenting and affect your app's usage. For additional information, refer to Microsoft Graph permissions.

Least privileged permissionsHigher privileged permissions
SecurityAlert.Read.AllSecurityAlert.ReadWrite.All
SecurityIncident.Read.AllSecurityIncident.ReadWrite.All
SecurityAlert.ReadWrite.All
SecurityIncident.ReadWrite.All
  1. Click Add permissions to save the changes.

  2. Click Grant admin consent for <your tenant> on the API permissions page. Only admins can grant consent.

    Grant Admin Consent

  3. Confirm that the added permissions are now verified.

    Granted Admin Consent

  4. Navigate to Overview and Copy your client ID and tenant ID.

    Client ID &amp; Tenant ID

  5. Create a new client secret.

    Client Secret

  6. Copy the secret value.

    Client Secret

Creating your connection

  1. In the Blink platform, navigate to the Connections page > Add connection. A New Connection dialog box opens displaying icons of external service providers available.
  2. Select the Microsoft Defender XDR icon. A dialog box with name of the connection and connection methods appear.
  3. (Optional) Edit the name of the connection. At a later stage you cannot edit the name.
  4. Select App Registration as the method to create the connection.
  5. Fill in the parameters:
    • The Client ID
    • The Client Secret
    • The Tenant ID
  6. (Optional) Click Test Connection to test it.
  7. Click Create connection. The new connection appears on the Connections page.