Microsoft Windows Defender ATP
The JSA DSM for Microsoft Windows Defender ATP collects events from a Microsoft Windows Defender ATP system.
To integrate Microsoft Windows Defender ATP with JSA, complete the following steps:
- If automatic updates are not enabled, download and install
the most recent version of the following RPMs on your JSA console:
Protocol Common RPM
Windows Defender ATP REST API Protocol RPM
DSMCommon RPM
Microsoft Windows Defender ATP DSM RPM
- Configure your Microsoft Windows Defender ATP appliance to send events to JSA.
- Add a Microsoft Windows Defender ATP log source that uses the Microsoft Windows Defender ATP REST API on the JSA Console. JSA does not automatically detect the Microsoft Windows Defender ATP REST API.
Microsoft Windows Defender ATP DSM Specifications
The following table identifies the specifications for the Microsoft Windows Defender ATP DSM.
Table 1: Microsoft Windows Defender ATP DSM Specifications
Specification | Value |
---|---|
Manufacturer | Microsoft |
DSM name | Microsoft Windows Defender ATP |
RPM file name | DSM-MicrosoftWindowsDefenderATP- |
Supported versions | N/A |
Protocol | JSON |
Event format | Windows Defender ATP REST API |
Recorded event types | Windows Defender ATP Windows Defender AV Third Party TI Customer TI Bitdefender |
Automatically discovered? | No |
Includes identity? | No |
Includes custom properties? | No |
More information |
Configuring JSA to Collect Events from Microsoft Windows Defender ATP by using the Windows Defender ATP REST API
The Microsoft Windows Defender ATP REST API collects alerts from the Windows Defender Advanced Threat Protection security service.
Before you can add a log source in JSA, you must obtain` the Microsoft Windows Defender ATP connection information by completing the following steps:
Log in to the Windows Defender Security Center.
From the menu on the left, click Settings.
From the Settings window, in the API section, click SIEM.
From the SIEM application details list, copy and record the values for the Client ID and the Authorization server URL and Resource fields. You need these values when you configure a log source in JSA.
You need the Client Secret value to connect to JSA. The Client Secret value is only displayed the first time that you go to the page. If you don't have access to the Client Secret value, contact your Microsoft Azure administrator to request a new client secret.
- Click the Admin tab.
- Click the Log Sources, and then click Add.
- From the Log Source Type list, select Microsoft Windows Defender ATP.
- From the Protocol Configuration list, select Windows Defender
ATP REST API, and configure the parameters.
The following table describes the parameters that require specific values to collect alerts from Microsoft Windows Defender ATP by using the Windows Defender ATP REST API.
Table 2: Windows Defender ATP REST API Log Source Parameters
Specification
Value
Authorization Server URL
The URL for the server that provides the authorization to obtain an access token. The access token is used as the authorization to obtain events from Windows Defender ATP.
The Authorization Server URL uses the format, “https://login.windows.net/”[Tenant_ID] “/oauth2/token”
Where <Tenant ID> is a UUID.
Resource
The resource that is used to access Windows Defender ATP events.
Client ID
Ensures that the user is authorized to obtain an access token.
Client Secret
Ensures that the user is authorized to obtain an access token. The Client Secret value is displayed only one time, and then is no longer visible. If you don't have access to the Client Secret value, contact your Microsoft Azure administrator to request a new client secret.
Regions
Select the regions that are associated with Windows Defender ATP that you want to collect logs from.
Other Region
Type the names of any additional regions that are associated with Windows Defender ATP that you want to collect logs from.
Use a comma-separated list; for example, region1,region2.
Use Proxy
If a proxy for JSA is configured, all traffic for the log source travels through the proxy for JSA to access Windows Defender ATP.
Configure the Proxy Server, Proxy Port, Proxy Username, and Proxy Password fields. If the proxy does not require authentication, configure the Proxy Server and Proxy Port fields.
Recurrence
You can specify how often the log collects data. The format is M/H/D for Minutes/Hours/Days.
The default is 5 M.
EPS Throttle
The upper limit for the maximum number of events per second (EPS). The default is 5000.
- Click Save.
- On the Admin tab, click Deploy Changes.
Sample Event Messages
Use these sample event messages as a way of verifying a successful integration with JSA.
The following table provides a sample event message when using the Microsoft Windows Defender ATP REST API protocol for the Microsoft Windows Defender ATP DSM:
Table 3: Microsoft Windows Defender ATP Sample Message Supported by Microsoft Windows Defender ATP
Event name | Low level category | Sample log message |
---|---|---|
Windows Defender ATP command and control alert | Suspicious Activity |
|
Windows Defender ATP malware alert | Misc. Malware |
|
Windows Defender ATP exploit alert | Misc. Exploit |
|
Windows Defender ATP backdoor alert | Backdoor Detected |
|