Microsoft Defender for Endpoint Integration
Forward AI interaction events to Microsoft Defender for Endpoint to gain endpoint-level visibility of AI platform usage and policy violations.
Overview
This integration enables:
- Endpoint visibility of AI platform activity
- Correlation of AI events with endpoint events
- Automated response through Defender playbooks
- Risk scoring based on AI interaction patterns
- Compliance reporting combining endpoint and AI data
Data Flow:
AI Interaction → Noxys API → Defender API → Incident correlation → Response
Prerequisites
- Microsoft Defender for Endpoint (E5 or standalone license)
- Azure AD / Entra ID tenant
- Admin role in Noxys
- Security Admin role in Microsoft Defender
- HTTPS endpoint connectivity
Step 1: Create API Client in Azure
Register Noxys in Entra ID to access Defender APIs.
- Azure Portal → App registrations → New registration
- Configure:
- Name:
Noxys Defender Integration - Supported account types:
Single tenant
- Name:
- Register
- Note Client ID
Step 2: Generate Client Secret
- Certificates & secrets → New client secret
- Configure:
- Description:
Defender API - Expires: 24 months
- Description:
- Copy secret value
Step 3: Configure API Permissions
Grant Defender API permissions.
- API permissions → Add a permission
- Select APIs my organization uses
- Search for
WindowsDefenderATP(Microsoft Defender for Endpoint) - Choose Application permissions:
Alert.ReadWrite.AllIncident.ReadWrite.AllMachine.Read.All
- Grant admin consent
Step 4: Get Defender Tenant Info
Find your Defender for Endpoint tenant ID.
- Microsoft Defender Portal → Settings → API
- Note:
- Tenant ID (displayed at top)
- API URL (e.g.,
https://api.securitycenter.windows.com)
Step 5: Enable in Noxys
Configure Defender integration in Noxys.
- Noxys Admin Panel → Integrations → Microsoft Defender
- Click Enable Integration
- Configure:
| Field | Value |
|---|---|
| Tenant ID | Your Azure tenant ID |
| Client ID | App registration Client ID |
| Client Secret | Client secret from step 2 |
| Defender API URL | From step 4 |
- Click Test Connection
- Should show: "✓ Successfully connected to Defender for Endpoint"
- Click Save
Step 6: Configure Event Forwarding
Select which events to send to Defender.
- Settings → Event Forwarding
- Enable:
- ✓
interaction.policy_violated— Policy violations - ✓
interaction.high_risk— High-risk interactions - ✓
alert.severity_critical— Critical alerts - ✓
alert.severity_high— High severity alerts
- ✓
- Click Save
Step 7: Create Defender Alerts
Noxys interactions automatically create incidents in Defender.
- Microsoft Defender Portal → Incidents
- Filter by Noxys
- Should see incidents like:
- "High-risk AI interaction detected"
- "Policy violation on user machine"
Example incident details:
Title: Policy violation - Block PII on ChatGPT
Severity: High
Category: AI Firewall
Details:
Platform: ChatGPT
Risk Score: 0.95
PII Detected: Email address
User: alice@acme.fr
Device: ALICE-LAPTOP
Timestamp: 2026-03-20 14:32:00
Step 8: Create Response Rules
Automatically respond to AI-related incidents.
- Settings → Automated investigation and response
- Click Create rule
- Configure:
| Setting | Value |
|---|---|
| Name | "Block user on critical AI violation" |
| Condition | Threat type = "AI Firewall" AND Severity = "High" |
| Action | Isolate device / Alert user / Create ticket |
- Save
Advanced: Machine Learning Integration
Use Defender's machine learning to score AI interaction risk.
- Enable: Settings → Advanced features → Automated investigation
- Noxys interaction data feeds ML models
- Defender correlates with endpoint events
- Combined risk score affects incident severity
Incident Correlation
Defender automatically correlates AI events with endpoint events:
Timeline:
14:30 - ChatGPT access from ALICE-LAPTOP
14:31 - PII classified as Restricted
14:32 - Policy violation: Block triggered
14:35 - Suspicious network activity from ALICE-LAPTOP
→ Correlated incident created
Defender Advanced Hunting
Query Noxys data using Defender's advanced hunting.
- Hunting → Advanced hunting → Create query
- Query Noxys custom table:
NoxysInteractions
| where RiskScore > 0.8
| join (DeviceNetworkInfo) on DeviceId
| summarize HighRiskCount=count() by DeviceId, DeviceName
| where HighRiskCount > 5
- Create detection rule from query
Integration with Threat Analytics
Monitor AI-related threats in Threat Analytics.
- Threat analytics → Create dashboard
- Add cards for:
- "AI platform usage trends"
- "High-risk interaction rate"
- "Policy violations by platform"
Troubleshooting
Events Not Appearing in Defender
- Verify integration is Enabled
- Settings → Integrations → Microsoft Defender
- Check event forwarding is configured
- Settings → Event Forwarding
- Test connection again
- Check Defender API URL is correct
- Verify permissions granted:
Alert.ReadWrite.AllIncident.ReadWrite.All
Incidents Not Created
- Verify events match forwarding criteria
- Check Defender is receiving API calls
- Defender Portal → Settings → API → Audit log
- Verify client secret hasn't expired
- Check network connectivity between Noxys and Defender
Correlation Not Working
- Ensure both Noxys and Defender have endpoint data
- Verify device names match between systems
- Check incident timeline overlap
- Wait 5-10 minutes for ML model update
Cost Considerations
- Defender for Endpoint: E5 license required (~$15/user/month)
- Noxys Defender integration: Included, no additional cost
- API calls: Included in Defender subscription
Best Practices
-
Forward only critical events
- Reduces noise in Defender incidents
- Focus on
policy_violatedandseverity_high+
-
Use descriptive incident details
- Include platform, risk score, PII type
- Helps SOC team investigation
-
Set up automated playbooks
- Auto-isolate devices with repeated violations
- Create tickets for incident response team
-
Monitor correlation quality
- Review incidents weekly
- Adjust rules if too many false positives
-
Leverage ML scoring
- Let Defender ML correlate patterns
- Don't override automatically-determined severity
Compliance & Audit
Defender audit log tracks all API calls:
- Defender Portal → Settings → API → Audit log
- Export for compliance:
- GDPR requests
- SOC 2 audits
- Security reviews
Disabling Integration
If you need to disable Defender integration:
- Integrations → Microsoft Defender → Disable
- No more incidents are created
- Existing incidents remain in Defender
- Data is not deleted
To re-enable:
- Follow configuration steps again
- Events resume flowing to Defender
Integration with Other Microsoft Services
Defender integrations also enable:
- Microsoft Sentinel: Export incidents to Sentinel
- Microsoft 365 Defender: Unified threat dashboard
- Intune: Device compliance enforcement
Support
- Defender Docs: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/
- Advanced Hunting: https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-overview
- Noxys Support: support@noxys.eu
Related Integrations
- Microsoft Sentinel — SIEM integration
- CrowdStrike Falcon — Alternative EDR
- Microsoft Entra ID — Identity integration