Microsoft Defender EASM’s assets endpoint enables discovery and monitoring of internet-facing assets like domains, IPs, and certificates. It supports filtering, enrichment, and relationship mapping to help identify exposure, shadow IT, and attack vectors. Refer to Microsoft Defender EASM official documentation for more information.
Integration Method: API
Tables: Device Inventory Info (5001), Web Resources Activity (6001), Vulnerability Finding (2002), User Inventory Info (5003)
This integration supports the following events.
Event | Description |
---|---|
Assets and Vulnerabilities | Returns information about assets which includes IP, domain, host, page, SSL certificates. |
This integration supports the following versions.
Microsoft Defender EASM API Version | 2024-10-01-preview |
Note:
Microsoft Defender EASM is a continuously updated cloud service. As of this document preparation, the latest release was in October 2024.
Prerequisites
The user must have access to the Azure portal with an account that has the Global Administrator privilege.
The user should have access to the DataBee console.
Configuration Overview
Create an application with required permission to fetch the data.
Add the Microsoft Defender EASM data feed in the DataBee console with the below parameters.
DataBee Parameter
Microsoft Defender EASM Parameter
Client Key
Application (client) ID
Client Secret
Client Secret Value
Token URL (<application_id>)
Directory (tenant) ID
Subscription ID
subscriptionId
Resource Group Name
Resource Group Name
Workspace Name
Workspace Name
Microsoft Defender EASM Configuration
Create an application
Log on to Azure with a user account that has the Global Administrator privilege.
In the search bar, search for App Registrations and select it.
On the “App registrations” page click on New registration, the “Register an application” window will appear.
On the “Register an application” window:
Under ‘Name’ enter your Application Name then click on Register to create the application.
On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
Create Resource Group and Workspace
In the search bar, search for Microsoft Defender EASM and select it.
Click on the Create button to create a new resource group.
Select the Subscription.
Click Create new to create a resource group or select an existing one from the dropdown. If creating new, enter the resource group name and click OK to proceed.
Click on Review + Create button.
Get Resource Group, Workspace, Subscription Id and Location
In the search bar, search for Microsoft Defender EASM and select it from the results. This will display a list of available workspaces.
Click on the workspace which we have created previously.
Click on JSON View.
Copy SubscriptionId, Resource Group Name, Workspace Name and Location for later use.
Add access to Subscription to retrieve data
Once the Defender EASM application is created, you must assign the necessary permissions to access the required endpoints. To begin, open the Azure subscription where the service principal resides. This allows you to configure role assignments and grant the appropriate access needed for Defender EASM API operations.
From the Azure Active Directory portal:
In the search bar, search for Subscriptions and select it.
Select the subscription where the application was created.
Navigate to Access control (IAM), then click Add and select Add role assignment from the dropdown.
Navigate to the Privileged administrator roles tab and select Contributor roles.
On the “Add role assignment” window:
Click on Select members, search for the app registered, select app from the list, and then click the Select button to confirm.
Review the information to make sure it is correct, and then click on Review + assign.
Create secret
The final step to accessing the APIs is creating a Client Secret. To create it from the Azure Portal:
Select the application created above.
Under Manage, click Certificates and secrets, and then click on Client secrets.
Click New client secret. “Add a client secret” window appears.
In “Add a client secret” window:
Enter a ‘Description’ for this client secret and select the desired expiry period from the ‘Expires’ drop-list.
Then click on Add to create the client secret.
Copy the ‘Value’ fields for later use.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for the Microsoft Defender EASM and click it as shown below.
Click on the API Ingest option for the polling mechanism.
Enter feed contact information, select the collector which we’ve created previously and click Next.
In the configuration page, confirm the following:
Authorization Method: OAuth2
API Base URL: replace the <region> placeholder with the location.
Subscription ID: paste the subscriptionId.
Resource Group Name: paste the Resource Group Name.
Workspace Name: paste the Workspace Name.
Client Key: paste the Application (client) ID.
Client Secret: paste the Value.
Token URL: replace <tenant_id> placeholder with the Directory (Tenant) ID generated earlier.
Event Types: preselected for all the event types that integration pulls.
Click Submit.
Troubleshooting Tips
If you’re facing invalid_client or unauthorized_client issues this might be possibly due to incorrect credentials. Ensure the token is pasted correctly. Since you cannot view the token after the 1st time, re-create the token, paste it on a text editor to ensure no spaces or unexpected characters are included and reconfigure the DataBee feed.
If you are facing 403 response code this might be possibly due to missing permissions. Ensure that all the required permissions are granted correctly as per the above-mentioned steps.