Microsoft Defender for Endpoint ContainmentUpdated Nov 20, 2023
- Configure Microsoft Defender for Endpoint for Arctic Wolf containment
With the Active Response service, Arctic Wolf® can contain hosts in your network using Microsoft Defender for Endpoint® containment, if you configured the Microsoft Defender for Endpoint API to send the necessary logs to Arctic Wolf for security monitoring.
Containment functionality is available for these Microsoft Defender for Endpoint versions:
- Microsoft Defender for Endpoint Commercial
- Microsoft Defender for Endpoint for Government Community Cloud (GCC)
Note: The Microsoft Defender for Endpoint containment integration is different from the Endpoint Detection and Response (EDR) integration. These steps are only required if you want Arctic Wolf to contain your endpoints using Microsoft Defender for Endpoint. For more information, see Configuring Microsoft Defender for Endpoint Monitoring.
Caution: You can only configure one containment sensor. Configuring multiple containment sensors may prevent successful containment.
- A Microsoft account with administrator permissions
- A Microsoft licensing package containing one of these service plans:
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft 365 Defender
- One of these operating systems:
- Windows 10, version 1703
- Windows 11
- Complete Configure Microsoft Defender for Endpoint to configure the EDR integration.
- Register the application.
- Configure the API permissions.
- Provide your Microsoft Defender credentials to Arctic Wolf.
- Test Microsoft Defender for Endpoint containment
Sign in to the Microsoft Entra ID (formerly Azure AD) admin center.
In the navigation menu, click Microsoft Entra ID (Azure AD) > App registrations.
Click + New registration.
Configure these settings:
- Name — Enter a name for the application.
- Supported Account Types — Select the Accounts in this organizational directory only (<Organization-Name> only - Single Tenant) checkbox.
- For all other fields, keep the default values.
The page for the newly registered application opens.
Copy the Application (client) ID and Directory (tenant) ID values, and then save them in a safe, encrypted location. You will provide them to Arctic Wolf later.
In the navigation menu, click Manage > Certificates & secrets.
In the Client secrets section, click + New client secret, and then configure these settings:
- Description — Enter a description for the client secret.
- Expires — Select an expiration date for the client secret.
On the Client secrets tab, verify that your new client secret appears.
Copy the Value value, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.
- The Value value is only available immediately after creation. Do not exit the Certificates & Secrets page until the value is saved in a safe, encrypted location.
- The Value value is the secret ID or client secret. You will provide the value to Arctic Wolf later. You do not need to copy the Secret ID field.
- You must submit the updated client secret credentials to Arctic Wolf before the credentials expire.
In the navigation menu, click Manage > API permissions.
Find the User.Read permission, and click Menu > Remove permission.
Click Yes, remove.
In the Select an API section, click APIs my organization uses.
In the search bar, enter
WindowsDefenderATP, and then select it.
Click Application permissions.
In the Machine section, select these permission types:
Click Add permissions.
You are redirected to the API permissions page where the new permissions appear in a list.
In the Configured permissions section, click Grant admin consent for <Organization Name>, and then click Yes.
Note: If API credentials fail, for example due to expired credentials, Arctic Wolf will notify you and request a new set of credentials. After a polling failure, Arctic Wolf cannot perform actions such as containment until the updated credentials are provided.
Sign in to the Arctic Wolf Unified Portal.
In the menu bar, click Telemetry Management > Connected Accounts.
Click Add Account +.
On the Add Account page, in the Account Type list, select Cloud Detection and Response.
From the list of cloud services, select Microsoft Defender for Endpoint Containment.
On the Add Account page, complete these steps:
- Account Name — Enter a unique and descriptive name for the account.
- For each of these fields, paste the appropriate value from Register the application:
- Application (client) ID
- Directory (tenant) ID
- Client Secret Value
- In the API Base URL list, select the Microsoft Defender for Endpoint version that you are providing credentials for:
- Commercial — Select https://api.securitycenter.microsoft.com.
- GCC — Select https://api-gcc.securitycenter.microsoft.us.
- Credential Expiry — (Optional) Enter the expiration date if the credentials have an expiry date.
Click Test and submit credentials.
After your Concierge Security® Team (CST) enables security monitoring for this account, the connected account status changes to Healthy.
Schedule a call with your CST for containment testing.
An hour or more before the scheduled call with your CST, to generate a test observation, do one of these actions:
If you can access the EICAR file website — Download the
eicar.com.txtfile from Anti malware testfile to the host that you want to contain.
Tip: If you are unable to download the
eicar.com.txtfile because of browser security, try downloading one of the zip files, and then extract the
If you are unable to access the EICAR file website or download the EICAR file — Create the
eicar.com.txtfile on the host you want to contain, with this content:
Contact your CST if these actions are unsuccessful.
Directly before your call with your CST, turn off your auto-mitigation policy. Arctic Wolf is unable to contain a host if the relevant application already addressed the possible threat.
Have the scheduled call with your CST. During this call, your CST:
- Promotes the test observation to an incident, making it eligible for containment.
- Contains the affected host to make sure that the containment works as expected.
- Resolves issues that may arise. For example, misconfigured containment permissions.
- Lifts containment from the host.