This article guides you through the process of connecting Red Canary to your Microsoft Defender for Endpoint instance.
Prerequisites
Please review the following articles before connecting Red Canary to your Microsoft Defender for Endpoint instance:
Set up a Red Canary onboarding account
Before beginning the onboarding process, you must provide Red Canary with the name and email address for an account with global administrator privileges within your Azure organization. You’ll use this account throughout the onboarding process.
If you already have a global administrator account, follow these steps:
- Provide the name and email address of the account to your Red Canary contact.
- Check your email for an invitation to accept access permissions. If your account doesn’t have an associated email inbox, notify your Red Canary contact, who will provide you with an invitation link.
Note: When logging in to this site, you should be prompted to accept certain permissions. If you do not see this permissions page on your first login, try accessing this link via an incognito or private window.
If you don’t have a global administrator account, follow these steps:
- Log in to your Azure tenant at https://portal.azure.com.
- Create a new user by following the steps in Add or delete users using Azure Active Directory.
- Assign “Global Administrator” or “Security Administrator” to the new user by following the steps in Assign administrator and non-administrator roles to users with Azure Active Directory.
- Confirm that permissions are correct by logging into Azure, searching for the new user, and validating that the user belongs to the “Global Administrator” or “Security Administrator” role.
- Provide the name and email address of the account to your Red Canary contact.
- Check your email for an invitation to accept access permissions. If your account doesn’t have an associated email inbox, you can accept the invitation by logging in to https://portal.azure.com/microsoft-production.redcanary.co.
Set up data export (Streaming API)
After you configure your onboarding account, you can set up data export from your Defender for Endpoint instance to Red Canary’s Event Hub. This configuration instructs the Defender for Endpoint platform to begin sending your telemetry to Red Canary for processing.
- Log in to Microsoft Defender Security Center using your global administrator account.
- Navigate to Settings > Microsoft 365 Defender, and then select Streaming API.
- Click + Add.
- Please name the export “MXDRPartner-{ Your Company Name}”
- Click Forward events to Event Hub.
- Fill in the values of Event-Hub Resource ID and Event-Hub name using the credentials Red Canary has provided to you via email.
- Select all Event Types.
- Click Submit. It will take 30 minutes to four hours after the final step is completed before the data stream is established within Red Canary.
Note: If you get “Failed to created Streaming API Settings Request Body is invalid or missing” dialogue box try the steps below:
- The Event Hub Resource ID and Event Hub name are really sensitive. If you have a space in it, it will not allow you to submit it. You can try loading the resource ID and event-hub name into notepad to ensure that no spaces are copied, and attempt to resubmit.
- Clear all the event fields, refresh the window, and try again.
- Try to do this step from an incognito browser if the above steps do not resolve.
For a walkthrough of these steps, review this video:
Grant Red Canary permissions to your Microsoft Defender for Endpoint API
After you configure your onboarding account, you can grant Red Canary permissions to your Defender for Endpoint API. This enables the Red Canary platform to retrieve alerts, process endpoint metadata, and orchestrate actions on endpoints.
To grant permissions to your Microsoft Defender for Endpoint API:
NOTE: WAIT 15 MINUTES AFTER CONFIGURING STREAMING API TO PERFORM THESE STEPS.
- Log in to your global administrator Microsoft account.
- Approve permissions for Red Canary API integration by clicking this link: https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=69561a74-a59d-43f4-a113-8bc2da00f822&response_type=code&sso_reload=true
Grant Red Canary analysts read-only access to your Microsoft Defender console
After you grant permissions to your Microsoft Defender for Endpoint API, you can give Red Canary read-only access to your Defender for Endpoint console using role-based access control; see Manage portal access using role-based access control in Microsoft Docs for more information. This enables your Red Canary teams, such as your threat hunting and detection engineering teams, to perform ad-hoc hunting and investigation of potential threats in your environment.
Note: This process requires an Azure AD Premium P2 license. If you have an Azure AD Premium P1 license, see P1 Azure License - Granting Red Canary analysts read-only access to Microsoft Defender in the Red Canary Help Center.
For a guided walkthrough of these steps, review this video.
Step 1: Prepare your Microsoft Azure group for Role-Based Access Control, and link the Red Canary active directory tenant
- Navigate to https://portal.azure.com, and log in with your global administrator account.
- Expand the navigation pane, and then select Azure Active Directory | Groups | New Group.
- Fill in the group parameters with the following values:
- Group Type: Security
- Group Name: Red Canary
- Group Description: Red Canary Access Group
- Azure AD roles can be assigned to the group (Preview): Yes
- Roles: Security Reader
- Membership Type: Assigned
- Owners: No owners selected
- Members: No members selected
- Click Create, and then click Identity Governance. (You may need to enter this in the search bar)
- Under Entitlement Management, select Connected organizations, and then Add connected organization.
- Fill out the form with the following values:
-
- Basics
-
- Name: Red Canary
- Description: Red Canary Access Group
- State: Configured
-
- Directory + domain
-
- Click Add directory + domain.
- Type
redcanary.com
into the tenant ID search bar. - Highlight the entry, and click Select.
-
- Sponsors
-
- Under Add Internal Sponsor, click Add/Remove.
- Search for the name of your active directory administrator, highlight the account, and click Select.
-
- Basics
-
- Review the parameters, and then click Create.
Step 2: Enable Role-Based Access Controls (RBAC) in Microsoft Defender for Endpoint
Create a RBAC role within Defender for your endpoint, and then assign the Red Canary Azure AD security group to the role.
- Navigate to https://security.microsoft.com, and log in with your global administrator account.
- Select Settings | Endpoints | Roles | Add Role.
- Fill out the form with the following values:
- Role Name: Red Canary
- Description: Red Canary Access Role
- Check the following boxes:
-
- View Data
-
- Security Operations
- Threat and Vulnerability Management
-
- View Data
-
- Click Next to advance to "Assigned user groups" section, search for the Red Canary Group we created earlier in the search bar, and then Add Selected Groups.
- Click Save.
Step 3: Configure your Microsoft Azure Identity Governance Access Packages
- Navigate to https://portal.azure.com and log in with your global administrator account.
- Expand the navigation pane, and then select Azure Active Directory | Identity Governance.
- Under Entitlement Management, select Catalogs, and then New Catalog.
- Fill out the form with the following values:
-
- Name: Red Canary Access
- Description: Red Canary MTP Service Access Catalog
- Enabled: Yes
- Enabled for external users: Yes
-
- Under Entitlement Management, select Access Package, and then New Access Package.
- Fill out the forms with the following values:
- Basics
-
- Name: Red Canary Access Package
- Description: Red Canary Access
- Catalog: Red Canary Access
-
- Resource Roles
-
- Select Groups and Teams | Red Canary | Member | Select.
- Important: In order to select the Red Canary Group, make sure to select See all Group and Team(s) not in the Red Canary Access catalog. You must have the correct permissions to add them in this access package.
- Select Groups and Teams | Red Canary | Member | Select.
-
- Requests
-
- Select For users not in your directory, Specific connected organizations, and then Red Canary.
- Require Approval: No
- Enable new requests and assignments: Yes
-
- Lifecycle
-
- Access package assignments expire: Never
- Require access reviews: Yes
- Starting on: [today's date]
- Review frequency: Bi-annually
- Duration in days: 90
- Reviewers: Specific reviewers
-
- Click Add reviewers.
- Select the members of your organization responsible for IAM review procedures.
-
-
- Basics
- Review the parameters, and then click Create.
- Select the newly created access package under Azure Portal | Active Directory | Identity Governance | Access Packages | Red Canary.
- Under Properties, copy the “My access portal link.”
- Provide the link to your Red Canary contact.
What if my organization uses device groups?
If your organization uses device groups, add permissions by completing the following steps:
- Navigate to https://security.microsoft.com and log in with your global administrator account.
- Select Settings | Endpoints | Device Groups.
- Navigate to Assigned User Groups.
- Select the Red Canary group previously created in Azure AD. Add that group to Azure AD user groups with this role, and click Save.
- Go to Settings | Permissions | Machine Groups.
- Click on a machine group name.
- From User Access, select the checkbox to grant access to the Red Canary group.
- Repeat steps 6 and 7 for all machine groups.
- IMPORTANT: Once you've added the Red Canary Group to the Device Groups, go back out to Settings | Endpoints | Device Groups and be sure to hit "Apply Changes" otherwise the Device Group settings will NOT be saved.
Integrate Graph v2 Security Alerts
As a last step to integrating this EDR source, please follow the directions in Integrate Microsoft Graph v2 with red Canary.
Comments
2 comments
Azure P2 license is not very descriptive, can you clarify what P2 license you require?
Thanks for the feedback, Dan! We've updated the article with the info that you requested.
Please sign in to leave a comment.