Become a Microsoft Defender for Endpoint partner
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft 365 Defender
To become a Defender for Endpoint solution partner, you'll need to follow and complete the following steps.
Step 1: Subscribe to a Microsoft Defender for Endpoint license
Want to experience Defender for Endpoint? Sign up for a free trial.. Subscribing allows you to use a Microsoft Defender for Endpoint tenant with up to three devices to developing solutions that integrate with Microsoft Defender for Endpoint.
Step 2: Fulfill the solution validation and certification requirements
The best way for technology partners to certify that their integration works is to have a joint customer approve the suggested integration design (the customer can use the Recommend a partner option in the Partner Application page in the Microsoft Defender Security Center) and have it tested and demoed to the Microsoft Defender for Endpoint team.
Once the Microsoft Defender for Endpoint team has reviewed and approves the integration, we will direct you to be included as a partner at the Microsoft Intelligent Security Association.
Step 3: Get listed in the Microsoft Defender for Endpoint partner application portal
Microsoft Defender for Endpoint supports third-party applications discovery and integration using the in-product partner page that is embedded within the Microsoft Defender for Endpoint management portal.
To have your company listed as a partner in the in-product partner page, you will need to provide the following information:
A square logo (SVG).
Name of the product to be presented.
Provide a 15-word product description.
Link to the landing page for the customer to complete the integration or blog post that will include sufficient information for customers. Any press release including the Microsoft Defender for Endpoint product name should be reviewed by the marketing and engineering teams. Wait for at least 10 days for the review process to be done.
If you use a multi-tenant Azure AD approach, we will need the Azure AD application name to track usage of the application.
Include the User-Agent field in each API call made to Microsoft Defender for Endpoint public set of APIs or Graph Security APIs. This will be used for statistical purposes, troubleshooting, and partner recognition. In addition, this step is a requirement for membership in Microsoft Intelligent Security Association (MISA).
Follow these steps:
Set the User-Agent field in each HTTP request header to the below format.
For example, User-Agent:
For more information, see RFC 2616 section-14.43.
Partnerships with Microsoft Defender for Endpoint help our mutual customers to further streamline, integrate, and orchestrate defenses. We are happy that you chose to become a Microsoft Defender for Endpoint partner and to achieve our common goal of effectively protecting customers and their assets by preventing and responding to modern threats together.
Managed security service providers (MSSP) and independent software vendors (ISV) can be nominated to the Microsoft Intelligent Security Association (MISA). For more information, see MISA information page.