Enable SIEM integration in Microsoft Defender ATP
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Enable security information and event management (SIEM) integration so you can pull detections from Microsoft Defender Security Center using your SIEM solution or by connecting directly to the detections REST API.
- Microsoft Defender ATP Alert is composed from one or more detections.
- Microsoft Defender ATP Detection is composed from the suspicious event occurred on the Device and its related Alert details.
- The Microsoft Defender ATP Alert API is the latest API for alert consumption and contain a detailed list of related evidence for each alert. For more information, see Alert methods and properties and List alerts.
- The user who activates the setting must have permissions to create an app in Azure Active Directory (AAD). This is typically someone with a Global administrator role.
- During the initial activation, a pop-up screen is displayed for credentials to be entered. Make sure that you allow pop-ups for this site.
Enabling SIEM integration
In the navigation pane, select Settings > SIEM.
If you encounter an error when trying to enable the SIEM connector application, check the pop-up blocker settings of your browser. It might be blocking the new window being opened when you enable the capability.
Select Enable SIEM integration. This activates the SIEM connector access details section with pre-populated values and an application is created under you Azure Active Directory (AAD) tenant.
The client secret is only displayed once. Make sure you keep a copy of it in a safe place.
Choose the SIEM type you use in your organization.
If you select HP ArcSight, you'll need to save these two configuration files:
If you want to connect directly to the detections REST API through programmatic access, choose Generic API.
Copy the individual values or select Save details to file to download a file that contains all the values.
Select Generate tokens to get an access and refresh token.
You'll need to generate a new Refresh token every 90 days.
Follow the instructions for creating an Azure AD app registration for Microsoft Defender ATP and assign the correct permissions to it to read alerts.
You can now proceed with configuring your SIEM solution or connecting to the detections REST API through programmatic access. You'll need to use the tokens when configuring your SIEM solution to allow it to receive detections from Microsoft Defender Security Center.
Integrate Microsoft Defender ATP with IBM QRadar
You can configure IBM QRadar to collect detections from Microsoft Defender ATP. For more information, see IBM Knowledge Center.