Skip to content

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

Overview

The recommended approach to provision access to Microsoft Defender XDR is through Azure Identity Governance using Access Packages. Using Identity Governance Access Packages enables Cyderes to easily and securely access client's Defender XDR environments using Cyderes SSO credentials. This approach enables:

  • Automated access life cycle management
  • Access review compliance
  • least privilege security rights assignment.

For more info on this approach for Defender XDR specifically, see the Microsoft blog post here: at Multi-tenant access for MSSP

Prerequisites

Admin Access Required

Implementation of Azure Identity Governance, setup of the Identity Governance Access Packages, and setup of permissions within Defender for Endpoint or Defender XDR depending on the permission model being used requires Global Administrator OR Security Administrator + Identity Governance Administrator roles. Azure Identity Governance itself requires Entra ID P2 licensing.

Defender for Endpoint RBAC Enablement Caution

Initially, only those with Entra ID Global Administrator or Security Administrator rights will be able to create and assign roles in Microsoft Defender for Endpoint, therefore, having the right groups ready in Entra ID is important. Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Entra ID Security reader role) to lose access until they are assigned to a role. Users with admin permissions are automatically assigned the default built-in Microsoft Defender ATP global administrator role with full permissions. After opting in to use RBAC, you can assign additional users that are not Entra ID Global or Security Administrators to the Microsoft Defender for Endpoint global administrator role. After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal.

Procedure - Access Packages

Note: A 3-step process is required for provisioning Defender access for Cyderes MSS Analysts (Tier1, Tier2 and Tier3).

  1. Log on to Azure portal.azure.com with a user that has the Global Administrator or Identity Governance Administrator role.
  2. Navigate to Entra ID | Groups
  3. Create 4 Security groups named:

    1. Cyderes MSS Tier1
    2. Cyderes MSS Tier2
    3. Cyderes MSS Tier3
    4. Cyderes MSS MSSP Analyst Approvers

    Note: These groups will be linked to the Roles you create in MDE.

  4. Log back on to Azure (portal.azure.com) with the user that has Global Administrator role.

  5. Navigate to Azure Active Directory | Identity Governance | Connected Organizations
  6. Click Add connected organization
    1. In name type Cyderes
    2. In description type Cyderes Entra ID Tenant
    3. In State select Configured
    4. Click Next: Directory + Domain
    5. Click Add directory + domain
    6. In the search field type cyderes.com
    7. Click Add
    8. Click Select
    9. Click Next: Sponsors
    10. Click Next: Review + Create
    11. Click Create
  7. To the newly created group Cyderes MSS MSSP Analyst Approvers add the following Cyderes resources:
    1. The CSM for your account and any deputy.
    2. The SOC leadership for your assigned SOC Squad. These specific people are provided during onboarding.
  8. Navigate to Entra ID | Identity Governance | Access Packages
  9. Click + New access package
    1. In Name type Cyderes MSS Tier1
    2. In Description type Cyderes MSS Tier1 Defender XDR Users
    3. Leave Catalog as General
    4. Click Next: Resource roles
    5. Click + Groups and Teams
    6. Select See all Groups and Teams…
    7. Select Cyderes MSS Tier1 and click Select
    8. Select Role from the drop down of Member
    9. Click Next: Request
    10. Select For users not in your directory
    11. Select Specific connected organisations
      • Click + Add Directories
      • Select Cyderes and click Select
    12. Select Yes for Require Approval
    13. Decide if justification is required or not
    14. Select 1, 2 or 3 for How many stages (This will determine how many members of the Cyderes MSS MSSP Analyst Approvers need to approve a new user’s membership of this Security Group)
    15. In First Approver select External Sponsor
      1. Click + Add fallback
      2. Select Cyderes MSS MSSP Analyst Approvers and click Select
      3. Click Enable new requests
      4. Click Next: Requestor Information
    16. Click Next: Lifecycle
    17. In Expiration set the assignment expiration to Never
    18. Choose if Access reviews are desired and configure as desired
    19. Click Next: Rules
    20. Click Next: Review + Create
    21. Click Create
  10. Copy the My Access portal link and provide to Cyderes
  11. Navigate to Azure Active Directory | Identity Governance | Access Packages
  12. Click + New access package
    1. In Name type Cyderes MSS Tier2
    2. In Description type Cyderes MSS Tier2 Defender XDR Users
    3. Leave Catalog as General
    4. Click Next: Resource roles
    5. Click + Groups and Teams
    6. Select See all Groups and Teams…
    7. Select Cyderes MSS Tier2 and click Select
    8. Select Role from the drop down of Member
    9. Click Next: Request
    10. Select For users not in your directory
    11. Select Specific connected organisations
      1. Click + Add Directories
      2. Select Cyderes and click Select
    12. Select Yes for Require Approval
    13. Decide if justification is required or not
    14. Select 1, 2 or 3 for How many stages (This will determine how many members of the Cyderes MSS MSSP Analyst Approvers need to approve a new user’s membership of this Security Group)
    15. In First Approver select External Sponsor
      1. Click + Add fallback
      2. Select Cyderes MSS MSSP Analyst Approvers and click Select
      3. Click Enable new requests
      4. Click Next: Requestor Information
    16. Click Next: Lifecycle
    17. For Expiration, set the assignment expiration to Never
    18. Choose if Access reviews are desired and configure as desired.
    19. Click Next: Rules
    20. Click Next: Review + Create
    21. Click Create
  13. Copy the My Access portal link and provide to Cyderes.
  14. Navigate to Azure Active Directory | Identity Governance | Access Packages
  15. Click + New access package
    1. In Name type Cyderes MSS Tier3
    2. In Description type Cyderes MSS Tier3 Defender XDR Users
    3. Leave Catalog as General
    4. Click Next: Resource roles
    5. Click + Groups and Teams
    6. Select See all Groups and Teams…
    7. Select Cyderes MSS Tier3 and click Select
    8. Select Role from the drop down of Member
    9. Click Next: Request
    10. Select For users not in your directory
    11. Select Specific connected organisations
      1. Click + Add Directories
      2. Select Cyderes and click Select
    12. Select Yes for Require Approval
    13. Decide if justification is required or not
    14. Select 1, 2 or 3 for How many stages (This will determine how many members of the Cyderes MSS MSSP Analyst Approvers need to approve a new user’s membership of this Security Group)
    15. In First Approver select External Sponsor
      1. Click + Add fallback
      2. Select Cyderes MSS MSSP Analyst Approvers and click Select
      3. Click Enable new requests
      4. Click Next: Requestor Information
    16. Click Next: Lifecycle
    17. In expiration set the assignment expiration to Never
    18. Choose if Access reviews are desired and configure as desired.
    19. Click Next: Rules
    20. Click Next: Review + Create
    21. Click Create
  16. Copy the My Access portal link and provide to Cyderes.

Role Based Access Control (RBAC) for Defender for Endpoint

Cyderes recommends using Defender XDR's Unified RBAC permissions where possible. See Microsoft's documentation for more info: Microsoft Defender XDR Unified role-based access control (RBAC)

To validate which permission model is in use, navigate to Permissions and Roles in Defender XDR > Settings > Microsoft Defender XDR > Permissions and Roles. If the "Endpoint & Vulnerability Management" workload is active, use the "Unified RBAC Permission Model" instructions below. If that workload is not active, use the "MDE Role Permission Model" instructions instead.

Unified RBAC Permission Model

Tier 1 (Unified RBAC)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Microsoft Defender XDR roles in Permissions > Microsoft Defender XDR > Roles
  3. Click + Create Custom Role
  4. Role Name: Cyderes MSS Tier1
  5. Click Next
  6. Select the "Security Operations" permission group and select:
    1. Security data basics
    2. Alerts (manage)
    3. Response (manage)
  7. Click Apply
  8. Select the "Security Posture" permission group and select:
    1. All read-only permissions
  9. Click Apply
  10. Click Next
  11. Click + Add Assignment
  12. Assignment Name: Cyderes MSS Tier1
  13. Assign users and groups: Select the Cyderes MSS Tier1 group
  14. Data sources: Select all data sources and select the checkbox for "Include future data sources automatically".
  15. Click Add
  16. Click Next
  17. Click Submit

Tier 2 (Unified RBAC)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Microsoft Defender XDR roles in Permissions > Microsoft Defender XDR > Roles
  3. Click + Create Custom Role
  4. Role Name: Cyderes MSS Tier2
  5. Click Next
  6. Select the "Security Operations" permission group and select:
    1. Security data > Security data basics (read)
    2. Security data > Alerts (manage)
    3. Security data > Response (manage)
    4. Security data > Basic Live Response (manage)
    5. Security data > File collection (manage)
  7. Click Apply
  8. Select the "Security Posture" permission group and select:
    1. All read-only permissions
  9. Click Apply
  10. Click Next
  11. Click + Add Assignment
  12. Assignment Name: Cyderes MSS Tier2
  13. Assign users and groups: Select the Cyderes MSS Tier2 group
  14. Data sources: Select all data sources and select the checkbox for "Include future data sources automatically".
  15. Click Add
  16. Click Next
  17. Click Submit

Tier 3 (Unified RBAC)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Microsoft Defender XDR roles in Permissions > Microsoft Defender XDR > Roles
  3. Click + Create Custom Role
  4. Role Name: Cyderes MSS Tier3
  5. Click Next
  6. Select the "Security Operations" permission group and select:
    1. Security data > Security data basics (read)
    2. Security data > Alerts (manage)
    3. Security data > Response (manage)
    4. Security data > Basic Live Response (manage)
    5. Security data > File collection (manage)
  7. Click Apply
  8. Select the "Security Posture" permission group and select:
    1. All read and manage permissions
  9. Select the "Authorization and settings" permission group and select:
    1. Authorization > Read and manage
    2. Security Settings > Detection tuning (manage)
    3. Security Settings > Core security settings (read)
    4. Security Settings > Core security settings (manage)
  10. Click Apply
  11. Click Next
  12. Click + Add Assignment
  13. Assignment Name: Cyderes MSS Tier3
  14. Assign users and groups: Select the Cyderes MSS Tier3 group
  15. Data sources: Select all data sources and select the checkbox for "Include future data sources automatically".
  16. Click Add
  17. Click Next
  18. Click Submit

MDE Role Permission Model

Tier 1 (Role Permission)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Settings | Endpoints | Roles
  3. Click + Add item
  4. In Role name type Cyderes MSS Tier1
  5. Select the following permissions:
    1. View Data
      1. Security operations
      2. Defender Vulnerability management
    2. Active remediation actions
      1. Security operations
    3. Alerts investigation
  6. Click Next
  7. Select Cyderes MSSTier1 then click Add selected groups
  8. If you have created device groups in Defender for Endpoint to limit visibility of system to specific teams please ensure that Cyderes MSS Tier1 are assigned users in these groups. Please see this article for further information https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-groups?view=o365-worldwide
  9. Click Save

Tier 2 (Role Permission)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Settings | Endpoints | Roles
  3. Click + Add item
  4. In Role name type Cyderes MSS Tier2
  5. Select the following permissions:
    1. View Data
      1. Security operations
      2. Defender Vulnerability management
    2. Active remediation actions
      1. Security operations
      2. Threat and vulnerability management - Exception handling
      3. Threat and vulnerability management - Remediation handling
      4. Threat and vulnerability management - Application handling
    3. Threat and vulnerability management - Manage security baselines assessment profiles
    4. Alerts investigation
    5. Manage security settings in Security Center
    6. Live response capabilities
      1. Advanced
  6. Click Next
  7. Select Cyderes MSSTier2 then click Add selected groups
  8. If you have created device groups in Defender for Endpoint to limit visibility of system to specific teams please ensure that Cyderes MSS Tier2 are assigned users in these groups. Please see this article for further information https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-groups?view=o365-worldwide
  9. Click Save

Tier 3 (Role Permission)

  1. Log on to Defender XDR (security.microsoft.com) with the Global Administrator or Security Administrator role.
  2. Navigate to Settings | Endpoints | Roles
  3. Click + Add item
  4. In Role name type Cyderes MSS Tier3
  5. Select the following permissions:
    1. View Data
      1. Security operations
      2. Defender Vulnerability management
    2. Active remediation actions
      1. Security operations
      2. Threat and vulnerability management - Exception handling
      3. Threat and vulnerability management - Remediation handling
      4. Threat and vulnerability management - Application handling
    3. Threat and vulnerability management - Manage security baselines assessment profiles
    4. Alerts investigation
    5. Manage security settings in Security Center
    6. Live response capabilities
      1. Advanced
  6. Click Next
  7. Select Cyderes MSS Tier3 then click Add selected groups
  8. If you have created device groups in Defender for Endpoint to limit visibility of system to specific teams please ensure that Cyderes MSS Tier3 are assigned users in these groups. Please see this article for further information https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-groups?view=o365-worldwide
  9. Click Save

Entra ID App Registration Setup for Defender for Endpoint Health Check Dashboard

  1. Log on to the Azure portal with a user that has Global Administrator, Application Administrator, or Cloud Application Administrator roles.
  2. Navigate to Entra ID | App registrations | New registration. microsoft-defender-endpoint-1
  3. In the registration form, type “Cyderes MDE Health Reporting Integration" and then click Register.
  4. Click API Permissions | Add permission | APIs my organization uses and type "WindowsDefenderATP" then click on WindowsDefenderATP. microsoft-defender-endpoint-2
  5. Select Application Permissions when presented with “What type of permissions does your application require?" is presented.
  6. Click Expand All and select the following permissions:
    • Software.Read.All
    • SecurityBaselinesAssessment.Read.All
    • Score.Read.All
    • Vulnerability.Read.All
    • RemediationTasks.Read.All
    • SecurityRecommendation.Read.All
    • Ti.Read.All
    • Machine.Read.All
    • AdvancedQuery.Read.All
    • Alert.Read.All
    • File.Read.All
    • Ip.Read.All
    • Url.Read.All
    • User.Read.All
  7. Click Add Permissions
  8. Again, click API Permissions | Add permission | APIs my organization uses and type "Microsoft Graph", then click on Microsoft Graph.
  9. Select Application Permissions when presented with “What type of permissions does your application require?".
  10. Click Expand All and select the following permissions:
    • SecurityAlert.Read.All
    • SecurityIncident.Read.All
  11. Click Add Permissions.
  12. Click Grant admin consent for \<tenant name> and accept the following prompt.
  13. When finished, the permissions should look like this: microsoft-defender-endpoint-3
  14. Click Certificates & secrets, then click + New client secret.
    • Type “Cyderes MDE Health Reporting Secret" in the description.
    • Select 24 Months for the expiration duration.
  15. After clicking Add, save the secret value in a safe place. You will not be able to retrieve the value after you leave the page.
  16. On your application page, go to Overview. microsoft-defender-endpoint-4
  17. Please provide the following to the Cyderes Managed Endpoint team using a secure method such as Secure Email:
    • Application (Client) ID
    • Directory (tenant) ID
    • Object ID
    • SecretID
    • Secret Value
    • Secret Expiry