Skip to content

Microsoft Defender for Endpoint is a comprehensive endpoint security platform that provides vulnerability management capabilities. This connector enables you to query vulnerability assets (device/machine inventory) and vulnerability findings (CVE-level vulnerability data) from Microsoft Defender for Endpoint.

2. Prerequisites

Before you begin, ensure you have:

  • Access to an Azure account via the Entra Portal or Azure Portal
  • Permission to create new app registrations
  • Microsoft Defender for Endpoint licensed and deployed in your environment
  • Devices onboarded to Microsoft Defender for Endpoint

3. Create Application Registration

  1. Log in to the Entra or Azure portal.
  2. Navigate to "App registrations", then select "New registration".
  3. Provide a name for your application (e.g., "Synqly Defender Vulnerabilities Connector").
  4. Click "Register" to complete the application registration.
  5. Be sure to note the Application (client) ID and Directory (tenant) ID.

4. Configure Permissions

  1. Within the app registration you just created, navigate to "Manage" > "API Permissions".
  2. Click "Add a permission".
  3. Select "APIs my organization uses" and search for "WindowsDefenderATP" or "Microsoft Defender for Endpoint".
  4. Select Application permissions (not Delegated permissions).
  5. Add the following permissions:
    • Machine.Read.All - Required to query device/machine inventory for vulnerability assets
    • Vulnerability.Read.All - Required to query vulnerability findings and CVE data
  6. Click "Add permissions".
  7. Click "Grant admin consent" for your tenant.
  8. Before proceeding, verify the following:
    • All permissions you added are Application permissions and not Delegated permissions
    • All required permissions are present
    • Admin consent shows up as "granted" for your tenant

5. Create an API Key

  1. Within the app registration you created earlier, navigate to "Manage" > "Certificates & secrets" > "Client secrets".
  2. Click "New client secret".
  3. Fill in a description and select an expiration period.
  4. Click "Add" to create the secret.
  5. Be sure to note the Value and Secret ID. Keep in mind you will not be able to view the secret value again after you navigate away from the page.

6. Determine URL

The Microsoft Defender for Endpoint API requires a base URL for your specific region. The base URL follows this format: https://api-{region}.securitycenter.microsoft.com

For example:

  • US region: https://api-us.securitycenter.microsoft.com
  • EU region: https://api-eu.securitycenter.microsoft.com
  • UK region: https://api-uk.securitycenter.microsoft.com

For most US-based tenants, you can also use https://api.securitycenter.microsoft.com which automatically routes to your region.

7. Configure the Integration

Create your integration by supplying all of the required values below:

URL: the regional API URL you determined in step 6 (e.g., https://api-us.securitycenter.microsoft.com).

Client ID: the Application (client) ID you gathered in step 3.

Client Secret: the client secret value you gathered in step 5.

Tenant ID: the Directory (tenant) ID you gathered in step 3.