Microsoft Defender for Endpoint - Monitoring
Microsoft Defender for Endpoint Containment Direct link to this section
Arctic Wolf® monitors Microsoft Defender for Endpoint logs to alert you about suspicious or malicious activity. When required, the Active Response service can then contain compromised hosts using Microsoft Defender for Endpoint containment. Containment functionality is available for the following operating systems:
- Windows 10, version 1703
- Windows 11
Note: The Microsoft Defender for Endpoint containment integration is different from the Endpoint Detection and Response (EDR) integration. You only need to complete these steps if you want to enable Arctic Wolf to contain your endpoints. For more information on EDR configuration, see Configuring Microsoft Defender for Endpoint.
To implement this functionality, you must provide the following information about your Microsoft Defender for Endpoint application from the Microsoft Azure Portal to Arctic Wolf® using the Arctic Wolf Portal:
- Application (client) ID
- Directory (tenant) ID
- Client Secret
Note: The Client Secret is only available to view during the application registration. If this information is lost before it is submitted to Arctic Wolf, you must create a new Client Secret for the application.
Configure Microsoft Defender for Endpoint Containment Direct link to this section
Once successfully configured, Arctic Wolf can use the active response integration to contain compromised hosts.
Requirements Direct link to this section
- A Microsoft account with administrator access.
- A Microsoft licensing package containing one of the following service plans:
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft 365 Defender
Before you begin Direct link to this section
- Complete the steps in Configure Microsoft Defender for Endpoint to configure the EDR integration.
Steps Direct link to this section
Step 1: Register the application Direct link to this section
-
Sign in to the Microsoft Azure Portal.
-
Open the navigation menu, and then select Azure Active Directory.
-
Select App registrations from the navigation pane.
-
Select + New registration.
-
Enter a memorable name for the application in the Name field.
-
In the Supported Account types section, confirm that Accounts in this organizational directory only (<Organization-Name> only - Single Tenant) is selected.
Note: Leave all other fields as their defaults.
-
Click Register. This opens the page for the newly registered application.
-
Record the Application (client) ID and Directory (tenant) ID values to provide to Arctic Wolf in a later step.
-
In the navigation pane, under Manage, select Certificates & secrets.
-
In the Client secrets section, select + New client secret, and then create the secret:
-
Enter a meaningful description for the Client Secret.
-
Select your desired option for the Expires field.
Tip: You must submit updated credentials to Arctic Wolf before the credentials expire.
-
Click Add.
-
-
Verify that your new Client Secret appears in the Client secrets section, and then copy the Value field to a secure location. You must provide this value to Arctic Wolf later.

Note: Ensure that you copy the Value field before exiting the page, as this value is only viewable immediately after creation. Do not copy the Secret ID field.
Step 2: Configure API permissions Direct link to this section
To configure API permissions for the registered application:
-
In the navigation pane, under Manage, click API permissions.
-
Find the User.Read permission which is enabled by default, and then click Menu to open the menu.
-
Click Remove permission and then click Yes, remove.
-
In the Configured permissions section, click + Add a permission.
-
In the Select an API section, click APIs my organization uses.
-
In the search bar, search for and click WindowsDefenderATP.
-
Click Application permissions to open the permission type list.
-
Under Machine, select the following permission types:
- Machine.Isolate
- Machine.Read.All
-
Click Add permissions to apply. This returns you to the API permissions page where the new permissions appear in a list.
-
In the Configured permissions section, click Grant admin consent for <Organization Name>, and then click Yes to confirm the change.
Step 3: Provide credentials to Arctic Wolf Direct link to this section
Note: If API credentials fail, for example, due to expired credentials, we notify you and request a new set of credentials. After a polling failure, we cannot perform actions such as containment until the updated credentials are provided.
-
Sign in to the Arctic Wolf Portal.
-
Select Connected Accounts in the banner menu to open the Connected Accounts page.
-
Select +Add Account to open the Add Account page.
-
Select Cloud Detection and Response as the Account Type.
-
In the Cloud Applications section, click Microsoft Defender for Endpoint CONTAINMENT, and then fill in the form:
- In the Account Name field, enter a descriptive name for the credentials.
- For each of these fields, paste the appropriate value from Register the application:
- Application (client) ID
- Directory (tenant) ID
- Client Secret
-
Select Submit to CST.
-
When prompted with the confirmation message, review your submission, and then select Done. You are returned to the Connected Accounts page.
-
Verify that the newly-submitted credential entry appears in the cloud services list with the status Connection Pending.
After your Concierge Security® Team provisions security monitoring for your account, the status of your credentials changes to Connected.