Microsoft Defender for Endpoint Integration

Microsoft Defender for Endpoint is an Endpoint Detection and Response (EDR) offering. In Cisco XDR, we enable Defender for Endpoint users to leverage it for incident detection functions, threat hunting and investigation features, rapid response actions to understand and defend against threats on the endpoint, and providing important device inventory context to help triage detected threats.

Integration with Microsoft Defender for Endpoint allows you to incorporate Microsoft Defender for Endpoint detections alongside detections from other telemetry sources into Cisco XDR's overall incident detection and correlation capabilities.

Use the Microsoft Defender for Endpoint integration to search for security detections involving specific hostnames, machine IDs, IPs, and file hashes. Microsoft Defender for Endpoint can be used through Cisco XDR to isolate hosts from the network and block many types of observables, including file hashes, network resources (such as IP addresses, domains, and URLs), and certificates.

This integration can be used to provide host information, including vulnerability information for use in triaging incidents and detections. It creates a target automatically in Automation for out-of-box workflows and it provides important device inventory context to help triage detected threats.