Microsoft Windows Defender ATP
The JSA DSM for Microsoft Windows Defender ATP collects events from a Microsoft Windows Defender ATP system.
To integrate Microsoft Windows Defender ATP with JSA, complete the following steps:
- If automatic updates are not enabled, download and install
the most recent version of the following RPMs on your JSA console:
Protocol Common RPM
Windows Defender ATP REST API Protocol RPM
DSMCommon RPM
Microsoft Windows Defender ATP DSM RPM
- Configure your Microsoft Windows Defender ATP appliance to send events to JSA.
- Add a Microsoft Windows Defender ATP log source that uses the Microsoft Windows Defender ATP REST API on the JSA Console. JSA does not automatically detect the Microsoft Windows Defender ATP REST API.
Microsoft Windows Defender ATP DSM Specifications
The following table identifies the specifications for the Microsoft Windows Defender ATP DSM.
Table 1: Microsoft Windows Defender ATP DSM Specifications
Specification | Value |
---|---|
Manufacturer | Microsoft |
DSM name | Microsoft Windows Defender ATP |
RPM file name | DSM-MicrosoftWindowsDefenderATP- |
Supported versions | N/A |
Protocol | JSON |
Event format | Windows Defender ATP REST API |
Recorded event types | Windows Defender ATP Windows Defender AV Third Party TI Customer TI Bitdefender |
Automatically discovered? | No |
Includes identity? | No |
Includes custom properties? | No |
More information |
Windows Defender ATP REST API Log Source Parameters for Microsoft Windows Defender ATP
If JSA does not automatically detect the log source, add a Microsoft Windows Defender ATP log source on the JSA Console by using the Windows Defender ATP REST API protocol.
When using the Windows Defender ATP REST API protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Windows Defender ATP REST API events from Microsoft Windows Defender ATP:
Table 2: Windows Defender ATP REST API Log Source Parameters for the Microsoft Windows Defender ATP DSM
Specification | Value |
---|---|
Log Source type | Microsoft Windows Defender ATP |
Protocol Configuration | Windows Defender ATP REST API |
Authorization Server URL | The URL for the server that provides the authorization to obtain an access token. The access token is used as the authorization to obtain events from Windows Defender ATP. The Authorization Server URL uses the format, “https://login.windows.net/”[Tenant_ID] “/oauth2/token” Where <Tenant ID> is a UUID. |
Resource | The resource that is used to access Windows Defender ATP events. |
Client ID | Ensures that the user is authorized to obtain an access token. |
Client Secret | Ensures that the user is authorized to obtain an access token. The Client Secret value is displayed only one time, and then is no longer visible. If you don't have access to the Client Secret value, contact your Microsoft Azure administrator to request a new client secret. |
Regions | Select the regions that are associated with Windows Defender ATP that you want to collect logs from. |
Other Region | Type the names of any additional regions that are associated with Windows Defender ATP that you want to collect logs from. Use a comma-separated list; for example, region1,region2. |
Use Proxy | If a proxy for JSA is configured, all traffic for the log source travels through the proxy for JSA to access Windows Defender ATP. Configure the Proxy Server, Proxy Port, Proxy Username, and Proxy Password fields. If the proxy does not require authentication, configure the Proxy Server and Proxy Port fields. |
Recurrence | You can specify how often the log collects data. The format is M/H/D for Minutes/Hours/Days. The default is 5 M. |
EPS Throttle | The upper limit for the maximum number of events per second (EPS). The default is 5000. |
Sample Event Messages
Use these sample event messages as a way of verifying a successful integration with JSA.
The following table provides a sample event message when using the Microsoft Windows Defender ATP REST API protocol for the Microsoft Windows Defender ATP DSM:
Table 3: Microsoft Windows Defender ATP Sample Message Supported by Microsoft Windows Defender ATP
Event name | Low level category | Sample log message |
---|---|---|
Windows Defender ATP command and control alert | Suspicious Activity |
|
Windows Defender ATP malware alert | Misc. Malware |
|
Windows Defender ATP exploit alert | Misc. Exploit |
|
Windows Defender ATP backdoor alert | Backdoor Detected |
|