Skip to main content
Status: Available (sub-feature of Azure AD integration)
Prerequisite: Azure AD integration must be connected first
License required: Microsoft Defender for Endpoint P1 or P2
Syncs: Devices, alerts, CVEs, secure score

Prerequisites

Defender data is synced as part of the Azure AD integration using the same app registration. You do NOT need a separate OAuth connection. Before proceeding:
  1. Complete the Azure AD setup guide first
  2. Confirm your tenant has Defender for Endpoint P1 or P2 licensing

Add Defender Permissions to Your App Registration

  1. Go to portal.azure.com → App registrations
  2. Open your SecurAtlas Integration app (created in the Azure AD guide)
  3. Click API permissionsAdd a permission
  4. Select APIs my organization uses
  5. Search for “WindowsDefenderATP” → select it
  6. Choose Application permissions and add:
PermissionPurpose
Alert.Read.AllRead all Defender alerts
Machine.Read.AllRead all enrolled machines/devices
SecurityRecommendation.Read.AllRead security recommendations
Vulnerability.Read.AllRead CVE and vulnerability data
AdvancedQuery.Read.AllRun advanced hunting queries
  1. Click Grant admin consent for [your org]

Verify Defender is Working

After the next sync, check the integration hub in SecurAtlas. You should see entity types including:
  • defender_device (your enrolled endpoints)
  • defender_alert (active security alerts)
  • defender_vulnerability (CVEs affecting your devices)

Findings Generated

FindingTrigger
defender_at_risk_deviceDevices with High or Critical risk score
defender_critical_alertActive critical security alerts
defender_high_alertActive high severity alerts
defender_unpatched_critical_vulnCritical CVEs with public exploits
defender_low_secure_scoreDefender Secure Score below 50
defender_no_av_signatureDevices with outdated AV signatures