MSDefenderEndpoints

MSDefender-IsolateMachine

Details

Author

Keijo Korte

Version

1.0

License

AGPL-V3

Requires Registration

Yes

Requires Subscription

Yes

Free Subscription Available

No

DataType Supported

thehive:case_artifact

Service Homepage

MSDefender-IsolateMachine

Description

Isolate machine with Microsoft Defender for Endpoints

Configuration

Name

Description

tenantId

Azure tenant ID

appId

Azure app ID

appSecret

Azure app secret

resourceAppIdUri

Security Center URI, usually doens’t need to change

oAuthUri

Azure oAuth2 authentication endpoint

MSDefender-PushIOC-Alert

Details

Author

Keijo Korte

Version

1.0

License

AGPL-V3

Requires Registration

Yes

Requires Subscription

Yes

Free Subscription Available

No

DataType Supported

thehive:case_artifact

Service Homepage

MSDefender-PushIOC-Alert

Description

Push IOC to Defender client. Alert mode

Configuration

Name

Description

tenantId

Azure tenant ID

appId

Azure app ID

appSecret

Azure app secret

resourceAppIdUri

Security Center URI, usually doens’t need to change

oAuthUri

Azure oAuth2 authentication endpoint

MSDefender-PushIOC-Block

Details

Author

Keijo Korte

Version

1.0

License

AGPL-V3

Requires Registration

Yes

Requires Subscription

Yes

Free Subscription Available

No

DataType Supported

thehive:case_artifact

Service Homepage

MSDefender-PushIOC-Block

Description

Push IOC to Defender client. Blocking mode

Configuration

Name

Description

tenantId

Azure tenant ID

appId

Azure app ID

appSecret

Azure app secret

resourceAppIdUri

Security Center URI, usually doens’t need to change

oAuthUri

Azure oAuth2 authentication endpoint

MSDefender-UnisolateMachine

Details

Author

Keijo Korte

Version

1.0

License

AGPL-V3

Requires Registration

Yes

Requires Subscription

Yes

Free Subscription Available

No

DataType Supported

thehive:case_artifact

Service Homepage

MSDefender-UnisolateMachine

Description

Unisolate machine with Microsoft Defender for Endpoints

Configuration

Name

Description

tenantId

Azure tenant ID

appId

Azure app ID

appSecret

Azure app secret

resourceAppIdUri

Security Center URI, usually doens’t need to change

oAuthUri

Azure oAuth2 authentication endpoint

MSDefender-FullVirusscan

Details

Author

Keijo Korte

Version

1.0

License

AGPL-V3

Requires Registration

Yes

Requires Subscription

Yes

Free Subscription Available

No

DataType Supported

thehive:case_artifact

Service Homepage

MSDefender-FullVirusscan

Description

Run full virus scan to machine with Microsoft Defender for Endpoints

Configuration

Name

Description

tenantId

Azure tenant ID

appId

Azure app ID

appSecret

Azure app secret

resourceAppIdUri

Security Center URI, usually doens’t need to change

oAuthUri

Azure oAuth2 authentication endpoint

Additional details from the README file:

Cortex responder for Microsoft Defender for Endpoints (formerly know as Microsoft ATP)

With this responder you can

  • Isolate machine

  • Unisolate machine

  • Run full antivirus scan

  • Push IoC to Microsoft defender

    • Alert

    • BlockAndAlert

  • (future: Collect investigation package)

NOTE: Microsft API for finding machines via IP-addresses is little bit limited “Find Machines seen with the requested internal IP in the time range of 15 minutes prior and after a given timestamp.”, because of this “hostname” is preferable observable type”

Responder needs one of the following licenses:

  • Windows 10 Enterprise E5

  • Microsoft 365 E5 (M365 E5) which includes Windows 10 Enterprise E5

  • Microsoft 365 E5 Security

In general, you’ll need to take the following steps to use the responder
  • Create an Azure AD application

  • Grant permissions to App

Steps

With your Global administrator credentials, login to the Azure portal.

  • Azure Active Directory > App registrations > New registration.

In the registration form:

  • Name - Name your application.

  • Supported account type – leave the default setting.

  • Redirect Uri – leave empty.

API permission

On your new application page, click API Permissions > Add permission > APIs my organization uses > type WindowsDefenderATP and click on WindowsDefenderATP Choose Application permissions, select Alert.Read.All AND TI.ReadWrite.All AND Machine.ReadAll AND Machine.Isolate AND Machine.Scan > Click on Add permissions.

After clicking the Add Permissions button, on the next screen we need to grant consent for the permission to take effect. Press the “Grant admin consent for {your tenant name}” button.

To get client credentials:

  • In your application page, Click Certificate & Secrets

  • Specify a key description and set an expiration for 1 year.

  • Click Add and the application key will appear.

IMPORTANT: Copy and store this key in a safe place. Treat it like a password.

Detailed permissions:
Permissions

How to create Azure App (link to MS blog)