Rediger

Del via


Integrate Microsoft Defender for Endpoint with Microsoft Defender for Cloud Apps

Microsoft Defender for Endpoint is a security platform for intelligent protection, detection, investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture.

This article describes the out-of-the-box integration available between Microsoft Defender for Cloud Apps and Microsoft Defender for Endpoint, which simplifies cloud discovery and enabling device-based investigation.

Important

This article focuses on shadow IT discovery capabilities from Defender for Endpoint logs. For more information on shadow IT governing capabilities via Defender for Endpoint, see Govern discovered apps using Microsoft Defender for Endpoint.

Prerequisites

Note

While Microsoft Defender Antivirus is highly recommended for discovery, it's not mandatory. Some discovery data is still available when Defender Antivirus is disabled.

How it works

On its own, Defender for Cloud Apps collects logs from your endpoints using either logs you upload or by configuring automatic log upload. The out-of-the-box integration enables you to take advantage of the logs Defender for Endpoint's agent creates when it runs on Windows and monitors network transactions. Use this information for Shadow IT discovery across the Windows devices on your network.

The integration doesn't require extra deployment steps or routing or mirroring traffic from your endpoints, and works as follows:

  • Logs from your endpoints that are sent to Defender for Cloud Apps provide user and device information for traffic activities. Pairing device context with the username provides a full picture across your network enabling you to determine which user did which activity from which device.
  • When you identify a risky user, check the devices that the user accessed to detect potential risks. If you identify a risky device, check all the users who used it to detect further potential risks.
  • Once traffic information is collected, you're ready to deep dive into cloud app use in your organization. Defender for Cloud Apps takes advantage of Defender for Endpoint Network Protection capabilities to block endpoint device access to cloud apps. For more information about governing the discovered apps, see Govern discovered apps using Microsoft Defender for Endpoint.

Customers integrating with macOS devices may observe a spike in CPU consumption.

Tip

Watch our videos showing the benefits of using Defender for Endpoint with Defender for Cloud Apps.

Integrate Microsoft Defender for Endpoint with Defender for Cloud Apps

To enable Defender for Endpoint integration with Defender for Cloud Apps:

  1. In the Microsoft Defender portal, from the navigation pane, select Settings > Endpoints > General > Advanced features.
  2. Toggle the Microsoft Defender for Cloud Apps to On.
  3. Select Apply.

Note

It takes up to two hours after you enable the integration for the data to show up in Defender for Cloud Apps.

Screenshot of the Defender for Endpoint settings.

To configure the severity for alerts sent to Microsoft Defender for Endpoint:

  1. In the Microsoft Defender Portal, select Settings > Cloud Apps > Cloud Discovery > Microsoft Defender for Endpoint.

  2. Under Alerts, select the global severity level for alerts.

  3. Select Save.

    Screenshot of the Defender for Endpoint alert settings.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.