🛡️ Azure Subscription Integration With Microsoft Defender For Endpoint is not enabled🟢
- Contextual name: 🛡️ Integration With Microsoft Defender For Endpoint is not enabled🟢
- ID:
/ce/ca/azure/subscription/integration-with-microsoft-defender-for-endpoint - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logic
Similar Policies
- Cloud Conformity: Enable Defender for Endpoint Integration with Microsoft Defender for Cloud
- Internal:
dec-x-cff561fd
Similar Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-cff561fd | 3 |
Description
Description
The Endpoint protection component enables Microsoft Defender for Endpoint (formerly 'Advanced Threat Protection' or 'ATP' or 'WDATP' - see additional info) to communicate with Microsoft Defender for Cloud.
IMPORTANT: When enabling integration between DfE and DfC, account for potential side effects that may be undesirable.
- For Server 2019 and above, if Defender is installed (default for these server SKUs), this triggers deployment of the new unified agent and links to any extended configuration in the Defender portal.
- If the new unified agent is required for server SKUs of Windows Server 2016 or Linux and lower, additional integration needs to be enabled and agents need to be aligned.
Rationale
Microsoft Defender for Endpoint integration brings comprehensive Endpoint Detection and Response (EDR) capabilities within Microsoft Defender for Cloud. This integration helps to spot abnormalities, as well as detect and respond to advanced attacks on endpoints monitored by Microsoft Defender for Cloud.
... see more
Remediation
Remediation
From Azure Portal
- From Azure Home, select the Portal Menu.
- Go to
Microsoft Defender for Cloud.- Under
Management, selectEnvironment Settings.- Click on the subscription name.
- Click
Settings & monitoring.- Set the
StatusforEndpoint protectiontoOn.- Click
Continue.From Azure CLI
Use the below command to set
Allow Microsoft Defender for Endpoint to access my data:az account get-access-token \
--query "{subscription:subscription,accessToken:accessToken}" \
--out tsv | xargs -L1 bash -c 'curl -X PUT -H "Authorization: Bearer $1" -H "Content-Type: application/json" https://management.azure.com/subscriptions/{{subscription-id}}/providers/Microsoft.Security/settings/WDATP?api-version=2022-05-01 -d@"input.json"'Where
input.jsoncontains the Request body json data as mentioned below:{
"id": "/subscriptions/{{subscription-id}}/providers/Microsoft.Security/settings/WDATP",
"kind": "DataExportSettings",
"type": "Microsoft.Security/settings",
... [see more](remediation.md)