0
(0)

Defender for Endpoint supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform.

The support for third-party solutions helps to further streamline, integrate, and orchestrate defenses from other vendors with Microsoft Defender for Endpoint; enabling security teams to effectively respond better to modern threats.

Microsoft Defender for Endpoint seamlessly integrates with existing security solutions. The integration provides integration with the following solutions such as:

  • SIEM
  • Ticketing and IT service management solutions
  • Managed security service providers (MSSP)
  • IoC indicators ingestions and matching
  • Automated device investigation and remediation based on external alerts
  • Integration with Security orchestration and automation response (SOAR) systems

Supported applications

Security information and analytics

SECURITY INFORMATION AND ANALYTICS
Logo Partner name Description
Image of AttackIQ logo. AttackIQ Platform AttackIQ Platform validates Defender for Endpoint is configured properly by launching continuous attacks safely on production assets
Image of Microsoft Sentinel logo. AzureSentinel Stream alerts from Microsoft Defender for Endpoint into Microsoft Sentinel
Image of Cymulate logo. Cymulate Correlate Defender for Endpoint findings with simulated attacks to validate accurate detection and effective response actions
Image of Elastic security logo. Elastic Security Elastic Security is a free and open solution for preventing, detecting, and responding to threats
Image of IBM QRadar logo. IBM QRadar Configure IBM QRadar to collect detections from Defender for Endpoint
Image of Micro Focus ArcSight logo. Micro Focus ArcSight Use Micro Focus ArcSight to pull Defender for Endpoint detections
Image of RSA NetWitness logo. RSA NetWitness Stream Defender for Endpoint Alerts to RSA NetWitness using Microsoft Graph Security API
Image of SafeBreach logo. SafeBreach Gain visibility into Defender for Endpoint security events that are automatically correlated with SafeBreach simulations
Image of Skybox Vulnerability Control logo. Skybox Vulnerability Control Skybox Vulnerability Control cuts through the noise of vulnerability management, correlating business, network, and threat context to uncover your riskiest vulnerabilities
Image of Splunk logo. Splunk The Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk
Image of XM Cyber logo. XM Cyber Prioritize your response to an alert based on risk factors and high value assets

Orchestration and automation

ORCHESTRATION AND AUTOMATION
Logo Partner name Description
Image of CyberSponse CyOps logo. CyberSponse CyOps CyOps integrates with Defender for Endpoint to automate customers’ high-speed incident response playbooks
Image of Delta Risk ActiveEye logo. Delta Risk ActiveEye Delta Risk, a leading provider of SOC-as-a-Service and security services, integrate Defender for Endpoint with its cloud-native SOAR platform, ActiveEye.
Image of Demisto, a Palo Alto Networks Company logo. Demisto, a Palo Alto Networks Company Demisto integrates with Defender for Endpoint to enable security teams to orchestrate and automate endpoint security monitoring, enrichment, and response
Image of Microsoft Flow & Azure Functions logo. Microsoft Flow & Azure Functions Use the Defender for Endpoint connectors for Azure Logic Apps & Microsoft Flow to automating security procedures
Image of Rapid7 InsightConnect logo. Rapid7 InsightConnect InsightConnect integrates with Defender for Endpoint to accelerate, streamline, and integrate your time-intensive security processes
Image of ServiceNow logo. ServiceNow Ingest alerts into ServiceNow Security Operations solution based on Microsoft Graph API integration
Image of Swimlane logo. Swimlane Maximize incident response capabilities utilizing Swimlane and Defender for Endpoint together

Threat intelligence

THREAT INTELLIGENCE
Logo Partner name Description
Image of MISP Malware Information Sharing Platform)logo. MISP (Malware Information Sharing Platform) Integrate threat indicators from the Open Source Threat Intelligence Sharing Platform into your Defender for Endpoint environment
Image of Palo Alto Networks logo. Palo Alto Networks Enrich your endpoint protection by extending Autofocus and other threat feeds to Defender for Endpoint using MineMeld
Image of ThreatConnect logo. ThreatConnect Alert and/or block on custom threat intelligence from ThreatConnect Playbooks using Defender for Endpoint indicators

Network security

NETWORK SECURITY
Logo Partner name Description
Image of Aruba ClearPass Policy Manager logo. Aruba ClearPass Policy Manager Ensure Defender for Endpoint is installed and updated on each endpoint before allowing access to the network
Image of Blue Hexagon for Network logo. Blue Hexagon for Network Blue Hexagon has built the industry’s first real-time deep learning platform for network threat protection
Image of CyberMDX logo. CyberMDX Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Defender for Endpoint environment
Image of HYAS Protect logo. HYAS Protect HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect Microsoft Defender for Endpoint endpoints from cyberattacks
Image of Vectra Network Detection and Response (NDR) logo. Vectra Network Detection and Response (NDR) Vectra applies AI & security research to detect and respond to cyber-attacks in real time

Cross platform

CROSS PLATFORM
Logo Partner name Description
Image of Bitdefender logo. Bitdefender Bitdefender GravityZone is a layered next generation endpoint protection platform offering comprehensive protection against the full spectrum of sophisticated cyber threats
Image of Better Mobile logo. Better Mobile AI-based MTD solution to stop mobile threats & phishing. Private internet browsing to protect user privacy
Image of Corrata logo. Corrata Mobile solution – Protect your mobile devices with granular visibility and control from Corrata
Image of Lookout logo. Lookout Get Lookout Mobile Threat Protection telemetry for Android and iOS mobile devices
Image of Symantec Endpoint Protection Mobile logo. Symantec Endpoint Protection Mobile SEP Mobile helps businesses predict, detect, and prevent security threats and vulnerabilities on mobile devices
Image of Zimperium logo. Zimperium Extend your Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense

Other integrations

OTHER INTEGRATIONS
Logo Partner name Description
Image of Cyren Web Filter logo. Cyren Web Filter Enhance your Defender for Endpoint with advanced Web Filtering
Image of Morphisec logo. Morphisec Provides Moving Target Defense-powered advanced threat prevention. Integrates forensics data directly into WD Defender for Cloud dashboards to help prioritize alerts, determine device at-risk score and visualize full attack timeline including internal memory information
Image of THOR Cloud logo. THOR Cloud Provides on-demand live forensics scans using a signature base with focus on persistent threats

SIEM integration

Defender for Endpoint supports SIEM integration through various of methods. This can include specialized SIEM system interface with out of the box connectors, a generic alert API enabling custom implementations, and an action API enabling alert status management. For more information, see Enable SIEM integration.

Ticketing and IT service management

Ticketing solution integration helps to implement manual and automatic response processes. Defender for Endpoint can help to create tickets automatically when an alert is generated and resolve the alerts when tickets are closed using the alerts API.

Security orchestration and automation response (SOAR) integration

Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs exposes to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others.

External alert correlation and Automated investigation and remediation

Defender for Endpoint offers unique automated investigation and remediation capabilities to drive incident response at scale.

Integrating the automated investigation and response capability with other solutions such as IDS and firewalls help to address alerts and minimize the complexities surrounding network and device signal correlation, effectively streamlining the investigation and threat remediation actions on devices.

External alerts can be pushed to Defender for Endpoint. These alerts are shown side by side with additional device-based alerts from Defender for Endpoint. This view provides a full context of the alert and can reveal the full story of an attack.

Indicators matching

You can use threat-intelligence from providers and aggregators to maintain and use indicators of compromise (IOCs).

Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also use prevention and automated response capabilities to block execution and take remediation actions when there’s a match.

Defender for Endpoint currently supports IOC matching and remediation for file and network indicators. Blocking is supported for file indicators.

Support for non-Windows platforms

Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms, including mobile devices. You’ll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization’s network.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 20 times, 1 visits today)