Microsoft
Supported Products
The Microsoft Defender for Endpoint NetoFuse module provides enriched asset context to Netography Fusion from Microsoft Defender for Endpoint. It connects to the Microsoft Defender for Endpoint API, retrieves asset information associated with a collection of Machines, then uploads it as Context Labels to the Netography Fusion API.
The Microsoft Defender XDR NetoFuse module provides enriched asset context to Netography Fusion from Microsoft Defender XDR. It connects to the Microsoft Security Graph API, allowing you to define a custom Kusto (KQL) query to retrieve data from any schema available in Microsoft Defender XDR's advanced hunting tool, and then uploads the results as Context Labels to the Netography Fusion API.
Microsoft Defender for Endpoint
The Microsoft Defender for Endpoint NetoFuse module provides enriched asset context to Netography Fusion from Microsoft Defender for Endpoint. It connects to the Microsoft Defender for Endpoint API, retrieves asset information associated with a collection of Machines, then uploads it as Context Labels to the Netography Fusion API.
This utilizes the Microsoft Defender for Endpoint List machines API.
API Configuration Parameters for Microsoft Defender for Endpoint
All the fields required for this integration are listed here, along with the corresponding environment variable name used to set that field in the NetoFuse module.
tenant ID
Yes
NETO__DEFENDER__CREDENTIALS__TENANT_IT
Azure tenant ID
Application ID
Yes
NETO__DEFENDER__CREDENTIALS__APP_ID
Azure application id
App Secret
Yes
NETO__DEFENDER__CREDENTIALS__APP_SECRET
Azure application secret
Microsoft Defender for Endpoint Configuration
You need to create a Microsoft Entra application withMachine.Read.All permission in the WindowsDefenderATP API. An Azure user with the Global Administrator role must perform this step.
See: Create an app to access Microsoft Defender for Endpoint without a user
defender NetoFuse Module Configuration
defender NetoFuse Module ConfigurationThe Microsoft Defender For Endpoint module is named defender in NetoFuse.
All the fields required for this integration are listed above in the Microsoft Defender for Endpoint API Configuration Parameters section above. See Configure > module for additional options for setting configuration fields and Credential Storage for additional options for setting credentials.
Advanced Configuration Options
You can edit the module configuration to add a filter: that limits what Machines are retrieved by the API.
Microsoft documentation for the filter field is available at: OData queries with Microsoft Defender for Endpoint.
default defender module configuration
Microsoft Defender XDR
The Microsoft Defender XDR NetoFuse module provides enriched asset context to Netography Fusion from Microsoft Defender XDR. It connects to the Microsoft Security Graph API, allowing you to define a custom Kusto (KQL) query to retrieve data from any schema available in Microsoft Defender XDR's advanced hunting tool, and then uploads the results as Context Labels to the Netography Fusion API.
This utilizes the runHuntingQueryAPI endpoint in the Microsoft Security Graph API.
Requirements
❗️The Microsoft Defender XDR NetoFuse module requires you are using a Microsoft Defender for Endpoint Plan 2 (P2) license from Microsoft to access device information
Device level data collected through Microsoft Defender for Endpoint is only available through the API this module uses I with a Microsoft Defender for Endpoint Plan 2 (P2) license. If your organization is using a Plan 1 (P1) license, use the Microsoft Defender for Endpoint module and not the Microsoft Defender XDR module. For more details on this, see: Compare Microsoft endpoint security plans.
If you are a Microsoft Defender admin, you can go to https://security.microsoft.com/v2/advanced-hunting, and click the Schemas tab to see what access you have to this feature. If you see a Devices schema with a DeviceInfo table, you have the right access. If that is missing, you may be on a P1 plan or do not have permissions for advanced hunting in your user role.
You could still theoretically use this module without access to the Devices schema, but you will need to determine if the schemas available to you can provide asset information that can be used as context labels.
API Configuration Parameters for Microsoft Defender XDR
All the fields required for this integration are listed here, along with the corresponding environment variable name used to set that field in the NetoFuse module.
tenant ID
Yes
NETO__MICROSOFTXDR_CREDENTIALS__TENANT_ID
Azure tenant ID
Application ID
Yes
NETO__MICROSOFTXDR__CREDENTIALS__APP_ID
Azure application id
App Secret
Yes
NETO__MICROSOFTXDR__CREDENTIALS__APP_SECRET
Azure application secret
Microsoft Defender XDR Configuration
You need to create a Microsoft Entra application with the ThreatHunting.Read.All permission in the Microsoft Graph API. An Azure user with the Global Administrator role must perform this step.
microsoftxdr NetoFuse Module Configuration
microsoftxdr NetoFuse Module ConfigurationThe Microsoft XDR module is named microsoftxdr in NetoFuse.
All the fields required for this integration are listed above in the Microsoft Defender XDR API Configuration Parameters section above. See Configure > module for additional options for setting configuration fields and Credential Storage for additional options for setting credentials.
Configuring KQL Queries
KQL Queries are the base of the Microsoft Defender XDR module. Developing queries in the Microsoft Defender Advanced Hunting Portal is recommended, and then copy the queries once they return the results you want into the module configuration.
The DeviceInfo table in the Devices schema is the source of the basic asset information in queries. More information on building KQL queries is available from Microsoft at Proactively hunt for threats with advanced hunting in Microsoft Defender XDR and Microsoft Security Copilot in advanced hunting.
KQL Query Examples
Below are some KQL query configurations.
Get Public IP and Device Platform
Retrieve newest Device ID, OS, OS Version and Onboarding Status from Device Info
Add DeviceName, OS, OSVer, Architecture, Interface Name, Mac Address, Manufacturer, ip, and Logged On Users.
default microsoftxdr module configuration
microsoftxdr module configurationmicrosoftxdr NetoFuse Context Transform
microsoftxdr NetoFuse Context TransformLast updated