Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity sensor
Each Microsoft Defender for Identity sensor requires Internet connectivity to the Defender for Identity cloud service to report sensor data and operate successfully. In some organizations, the domain controllers aren't directly connected to the internet, but are connected through a web proxy connection. SSL inspection and intercepting proxies are not supported for security reasons. Your proxy server should allow the data to directly pass from the Defender for Identity sensors to the relevant URLs without interception.
We recommend using the command line to configure your proxy server as doing so ensures that only the Defender for Identity sensor services communicate through the proxy.
Note
Microsoft does not provide a proxy server. The URLs will be accessible via the proxy server that you configure.
Configure proxy server using the command line
You can configure your proxy server during sensor installation using the following command-line switches.
Syntax
"Azure ATP sensor Setup.exe" [/quiet] [/Help] [ProxyUrl="http://proxy.internal.com"] [ProxyUserName="domain\proxyuser"] [ProxyUserPassword="ProxyPassword"]
Switch descriptions
Name | Syntax | Mandatory for silent installation? | Description |
---|---|---|---|
ProxyUrl | ProxyUrl="http://proxy.contoso.com:8080" | No | Specifies the ProxyUrl and port number for the Defender for Identity sensor. |
ProxyUserName | ProxyUserName="Contoso\ProxyUser" | No | If your proxy service requires authentication, supply a user name in the DOMAIN\user format. |
ProxyUserPassword | ProxyUserPassword="P@ssw0rd" | No | Specifies the password for proxy user name. *Credentials are encrypted and stored locally by the Defender for Identity sensor. |
Note
Since changing the sensor's proxy configuration (if installed via the command line as described above) requires removing and reinstalling the sensor, we recommend creating and using a custom DNS A record for the proxy server. With a custom DNS A record, you can change the proxy server's address when needed, and also use the hosts file for testing.
Alternative methods to configure your proxy server
You can use one of the following alternative methods to configure your proxy server. When configuring the proxy settings using these methods, other services running in the context as Local System or Local Service will also direct traffic through the proxy.
Configure proxy server using WinINet
You can configure your proxy server using Microsoft Windows Internet (WinINet) proxy configuration, to allow Defender for Identity sensor to report diagnostic data and communicate with Defender for Identity cloud service when a computer isn't permitted to connect to the Internet. If you use WinHTTP for proxy configuration, you still need to configure Windows Internet (WinINet) browser proxy settings for communication between the sensor and the Defender for Identity cloud service.
When configuring the proxy, remember that the embedded Defender for Identity sensor service runs in system context using the LocalService account, and that the Defender for Identity Sensor Updater service runs in the system context using LocalSystem account.
Note
If you're using Transparent proxy or WPAD in your network topology, you don't need to configure WinINet for your proxy.
Configure proxy server using the registry
You can also configure your proxy server manually using a registry-based static proxy, to allow Defender for Identity sensor to report diagnostic data and communicate with Defender for Identity cloud service when a computer isn't permitted to connect to the Internet.
Note
The registry changes should be applied only to LocalService and LocalSystem.
The static proxy is configurable through the Registry. You must copy the proxy configuration that you use in user context to the LocalSystem and LocalService. To copy your user context proxy settings:
Make sure to back up the registry keys before you modify them.
In the registry, search for the value
DefaultConnectionSettings
as REG_BINARY under the registry keyHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings
and copy it.If the LocalSystem doesn't have the correct proxy settings (either they aren't configured or they're different from the Current_User), then copy the proxy setting from the Current_User to the LocalSystem. Under the registry key
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings
.Paste the value from the Current_user
DefaultConnectionSettings
as REG_BINARY.If the LocalService doesn't have the correct proxy settings, then copy the proxy setting from the Current_User to the LocalService. Under the registry key
HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings
.Paste the value from the Current_User
DefaultConnectionSettings
as REG_BINARY.
Note
This will affect all applications including Windows services which use WinINET with LocalService, LocalSytem context.
Enable access to Defender for Identity service URLs in the proxy server
To enable access to Defender for Identity, we recommend allowing traffic to the following URLs. The URLs automatically map to the correct service location for your Defender for Identity instance.
<your-instance-name>.atp.azure.com
– for console connectivity. For example,contoso-corp.atp.azure.com
<your-instance-name>sensorapi.atp.azure.com
– for sensors connectivity. For example,contoso-corpsensorapi.atp.azure.com
You can also use the IP address ranges in our Azure service tag (AzureAdvancedThreatProtection) to enable access to Defender for Identity. For more information about service tags, see Virtual network service tags.
If you would like to download the "Azure IP Ranges and Service Tags - Public Cloud" file, you can do so here. For US Government offerings, see Get started with US Government offerings.
Note
- To ensure maximal security and data privacy, Defender for Identity uses certificate based mutual authentication between each Defender for Identity sensor and the Defender for Identity cloud backend. SSL inspection and interception are not supported, as they interfere in the authentication process.
- Occasionally, the Defender for Identity service IP addresses may change. Therefore, if you manually configure IP addresses or if your proxy automatically resolves DNS names to their IP address and uses them, you should periodically check that the configured IP addresses are still up-to-date.
Test proxy connectivity
The Defender for Identity sensor requires network connectivity to the Defender for Identity service running in Azure. Most organizations control access to the internet via firewall or proxies. When using a proxy, you can allow access port 443 via a single URL. For more information about the ports that the Defender for Identity requires, see Required ports.
After the proxy has been configured to allow the sensor access to the Defender for Identity service, follow the steps below to confirm that everything is working as expected. This can be done:
- before you deploy the sensor
- if the sensor experiences connectivity issues after being installed
Open a browser using the same proxy settings being used by the sensor.
Note
If the proxy settings are defined for Local System, you'll need to use PSExec to open a session as Local System and open the browser from that session.
Browse to the following URL:
https://<your_workspace_name>sensorapi.atp.azure.com.
Replace<your_workspace_name>
with the name of your Defender for Identity workspace.Important
You must specify HTTPS, not HTTP, to properly test connectivity.
Result: You should get an Error 503 The service is unavailable, which indicates you were successfully able to route to the Defender for Identity HTTPS endpoint. This is the desired result.
If you don't get Error 503 The service is unavailable, then you may have a problem with your proxy configuration. Check your network and proxy settings.
If you get a certificate error, ensure that you have the required trusted root certificates installed before continuing. For more information, see Proxy authentication problem presents as a connection error. The certificate details should look like this:
Next steps
Feedback
Submit and view feedback for