- 28 Apr 2025
- 3 Minutes to read
- Print
- DarkLight
Microsoft Defender for Cloud FIM
- Updated on 28 Apr 2025
- 3 Minutes to read
- Print
- DarkLight
The file integrity monitoring feature in Defender for Servers Plan 2, part of Microsoft Defender for Cloud, helps to keep enterprise assets and resources secure by scanning and analysing operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack. More information can be found at the official page for Microsoft Defender for Cloud FIM.
Integration Method: API
Tables: File System Activity (1001), Entity Management (3004)
This integration supports the following events.
Event | Description |
---|---|
File Integrity Monitoring | Return the changes of Windows and Linux Files, as well as of software registry keys. |
This integration supports the following versions.
Log analytics API version supported | v1.0 |
Note:
Log analytics doesn’t follow a traditional versioning system. Instead, it is a continuously updated cloud service. Please find more details here.
Prerequisites
The user required at least Global Administrator privilege to create and manage application in azure cloud.
The user should have access to the DataBee platform.
Configuration Overview
Create an application with required permissions to fetch the data.
Add Microsoft Defender for Cloud FIM in the DataBee console with the parameter below.
DataBee Feed Parameter
Azure Parameter
Workspace ID
Workspace ID
Client Key
Application (Client) ID
Client Secret
Client Secret
Token URL(<tenant_id>)
Directory (tenant) ID
Azure Configuration
Create an application
Log on to Azure portal with an account that has the Global Administrator privileges.
In the search bar, search for App Registrations and select it.
On the “App registrations” page, click on New registration. The “Register an application” window will appear.
On the “Register an application” window:
Under ‘Name’ enter your application name then click on Register to create the application.
On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
Add Endpoint Access
Once the application is created, appropriate permission should be provided to fetch data. The appropriate permission for the application is needed to access these endpoints. The following section details how to configure and add permissions to the required endpoints.
Add Permissions
From the Azure Active Directory portal:
Select the application registered in the previous step.
Under Manage, click API Permissions and then click Add a Permission, the “Request API permissions” window will appear. Go to APIs my organization uses > Search for the “Log analytics API” and select the Log Analytics API.
Click on Log Analytics API then select Application Permissions as Permission type.
Event
Type
Permission
File Integrity Monitoring
Application
Data.Read
Click the Add permissions button after selecting all required permissions.
On the API permissions page,
Click Grant Admin Consent for <tenant>.
Click the Yes button on the consent confirmation.
The required permissions are now added for the endpoints. Overall permission looks like this and make sure that type is application for all.
Get Workspace ID
In the Azure console, search for Log Analytics workspaces and navigate there.
Identify and select the workspace where the file monitoring activity is stored and save the workspace ID.
Create the client secret
To create it from the Azure Portal:
Select the application created earlier.
Under Manage, Click Certificates and Secrets, and then Client Secrets.
Click New client secret. Then “Add a client secret” window appears.
On “Add a client secret” window:
Enter a ‘Description’ for this client secret and select the desired expiry period from the ‘Expires’ drop-list. Select the maximum expiry from the drop list to avoid API interruption.
Click on Add to create the client secret.
Note:
The user needs to re-create the client secret when it expires
Save the Client Secret.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for the Microsoft Defender for Cloud FIM and click it as shown below.
Click on the API Ingest option for collection method.
Enter feed contact information and click Next.
In the configuration page, enter the following
Authentication Method: OAuth2
Client Key: Client ID found in the application overview page.
Client Secret: Client Secret generated for the application.
Token URL: update the Tenant ID found in the application overview page.
API Base URL: this is the base URL that DataBee will interact with.
Event Types: preselected for all the event types that integration pulls.
Workspace ID: provide Workspace ID for the application.
Click Submit.
Troubleshooting Tips
Ensure the token is pasted correctly. Since you cannot view the token after the 1st time, re-create the token, paste it on a text editor to ensure no spaces or unexpected characters are included and reconfigure the DataBee feed.
Ensure that the application has necessary permissions as mentioned in the document.
If we are not able to ingest logs make sure you have enabled file integrity monitoring in your system. Here are the steps to enable the file integrity monitoring Enable File Integrity.