π Microsoft Defender For Cloud Integration With Microsoft Defender For Endpoint is not enabled π’
- Contextual name: π Integration With Microsoft Defender For Endpoint is not enabled π’
- ID:
/ce/ca/azure/subscription/integration-with-microsoft-defender-for-endpoint
- Located in: π Azure Subscription
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-cff561fd
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-cff561fd | 3 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
This integration setting enables Microsoft Defender for Endpoint (formerly 'Advanced Threat Protection' or 'ATP' or 'WDATP' - see additional info) to communicate with Microsoft Defender for Cloud.
IMPORTANT: When enabling integration between DfE & DfC it needs to be taken into account that this will have some side effects that may be undesirable.
- For server 2019 & above if defender is installed (default for these server SKU's) this will trigger a deployment of the new unified agent and link to any of the extended configuration in the Defender portal.
- If the new unified agent is required for server SKU's of Win 2016 or Linux and lower there is additional integration that needs to be switched on and agents need to be aligned.
Rationaleβ
Microsoft Defender for Endpoint integration brings comprehensive Endpoint Detection and Response (EDR) capabilities within Microsoft Defender for Cloud. This integration helps to spot abnormalities, as well as detect and respond to advanced attacks on endpoints monitored by Microsoft Defender for Cloud.
... see more
Remediationβ
Remediationβ
From Azure Consoleβ
- From Azure Home select the Portal Menu.
- Go to
Microsoft Defender for Cloud
.- Under
Management
, selectEnvironment Settings
.- Click on the subscription name.
- Click
Settings & monitoring
.- Set the
Status
forEndpoint protection
toOn
.- Click
Continue
.From Azure CLIβ
Use the below command to set
Allow Microsoft Defender for Endpoint to access my data
:az account get-access-token --query "{subscription:subscription,accessToken:accessToken}" --out tsv | xargs -L1 bash -c 'curl -X PUT -H "Authorization: Bearer $1" -H "Content-Type: application/json" https://management.azure.com/subscriptions/<subscriptionID>/providers/Microsoft.Security/settings/WDATP?api-version=2021-06-01 -d@"input.json"'
Where
input.json
contains the Request body json data as mentioned below:{
"id": "/subscriptions/<Your_Subscription_Id>/providers/Microsoft.Security/settings/WDATP",
"kind": "DataExportSettings",
"type": "Microsoft.Security/settings",
"properties": {
... [see more](remediation.md)