Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Request] MS Defender for Endpoint, third party response integration #6303

Closed
caitlinbetz opened this issue Dec 12, 2024 · 5 comments · Fixed by #6478
Closed

[Request] MS Defender for Endpoint, third party response integration #6303

caitlinbetz opened this issue Dec 12, 2024 · 5 comments · Fixed by #6478
Assignees
Labels
Docset: ESS Issues that apply to docs in the Stack release Docset: Serverless Issues for Serverless Security Effort: Medium Issues that take moderate but not substantial time to complete Priority: Medium Issues that have relevance, but aren't urgent Team: EDR Workflows Formerly Defend Workflows, Onboarding and Lifecycle Management v8.18.0

Comments

@caitlinbetz
Copy link

caitlinbetz commented Dec 12, 2024

Description

We are releasing our bidirectional capability with Microsoft Defender for Endpoint, which will allow users to execute host isolation / release of a MDE agent through elastic security.

This is similar to the functionality (and docs) we previously added for Sentinel One and Crowdstrike: https://www.elastic.co/guide/en/security/current/response-actions-config.html

Background & resources

Which documentation set does this change impact?

ESS and serverless

ESS release

N/A

Serverless release

January 27, 2025

Feature differences

Feature will be the same in serverless/ESS

ESS release: 8.18

API docs impact

TBD

Prerequisites, privileges, feature flags

ESS & Serverless, Kibana privileges:

Security solution privilege: Host Isolation (ALL)

Actions and Connectors privilege:: EDR Connectors

@nicpenning
Copy link

👀

@natasha-moore-elastic natasha-moore-elastic self-assigned this Dec 17, 2024
@natasha-moore-elastic natasha-moore-elastic added Team: EDR Workflows Formerly Defend Workflows, Onboarding and Lifecycle Management Priority: Medium Issues that have relevance, but aren't urgent Effort: Medium Issues that take moderate but not substantial time to complete Docset: Serverless Issues for Serverless Security Docset: ESS Issues that apply to docs in the Stack release labels Dec 17, 2024
@natasha-moore-elastic
Copy link
Contributor

Hi @caitlinbetz @ashokaditya 👋
A few questions about this feature:

  • Are isolate and release the only response actions being added for MS Defender?
  • What's the process for setting up MS Defender response actions? We’ll need to add those instructions as a new section on this page.
  • Is there a test environment we could use to test out (or at least see) these response actions for Defender?

Thanks!

@paul-tavares
Copy link
Contributor

Hi @natasha-moore-elastic ,

RE:
Are isolate and release the only response actions being added for MS Defender?

➡ Yes, these are the only ones with this release.




Re:
What's the process for setting up MS Defender response actions? We’ll need to add those instructions as a new section on this page.

➡ The process is similar to Crowstrike and SentinelONe. At a high-level:

  1. Generate credentials in MS Defender in order to setup the integration. The privileges needed should be detailed in the integration its self so you likely don't need to do much here other than point at the integration docs.
  2. Create integration policy(s) and deploy them (similar to others)
  3. Create the Connector and populate the needed info. for access
    1. See this issue on the ResponseOps side to add documentation for Microsoft Defender
    2. The credentials used here for the connector must have privileges to Machine.Isolate and Machine.Read.All at the very least
  4. create a SIEM rule to promote events to alerts - perhaps @raqueltabuyo may be able to provide some high-level info here on how to setup the rule, since she has been doing allot of testing with it. For example, a rule could be setup like this:
    1. Index patterns: logs-microsoft_defender_endpoint.log-default* logs-m365_defender.alert-default* logs-m365_defender.incident-default* logs-m365_defender.log-default*
    2. Custom query: cloud.instance.id:*

Screen capture of the integration setup below to give you a quick view on its setup:

Image




Re:
Is there a test environment we could use to test out (or at least see) these response actions for Defender?

No, but you can create a 9.0 env. in cloud using the latest snapshot. click below to see some instructions. QASource has started testing this feature and in an issue they opened today, they list an env. you can access - maybe use that? See details here.

But - if you would like to have your own - once you have the stack env. created, I could just run a script against to set it all up. Just send me the env. URL and login credentials and I'll do that for you.

Expand to see instruction

Enable feature flags:

  • Stack Connectors: microsoftDefenderEndpointOn
  • Security Solution: responseActionsMSDefenderEndpointEnabled

Connector Setup

Integration Setup

  • An "agentless" integration needs to be setup in Fleet for Microsoft Defender for Endpoint. Use the same credentials as the connector (above).

Setup a SIEM rule

A SIEM rule needs to be setup to promote events ingested from Microsoft Defender for Endpoint to SIEM alerts. Use the following information when creating that rule:

  • Index patterns: logs-microsoft_defender_endpoint.log-default*
  • Custom query: cloud.instance.id:*

Onboard a new host in Microsoft Defender

You will likely need to login to MS Defender for Endpoint management system to complete the host onboarding process. The following login credentials can used:

@raqueltabuyo
Copy link

@paul-tavares @natasha-moore-elastic yes, those index patterns look good to me, the only thing I would add is: logs-m365_defender.event-*. For the custom query, I think Paul is right as there were some issues with the hostID vs cloudID so better to add what he said.

@natasha-moore-elastic
Copy link
Contributor

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Docset: ESS Issues that apply to docs in the Stack release Docset: Serverless Issues for Serverless Security Effort: Medium Issues that take moderate but not substantial time to complete Priority: Medium Issues that have relevance, but aren't urgent Team: EDR Workflows Formerly Defend Workflows, Onboarding and Lifecycle Management v8.18.0
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants