Skip to content

Latest commit

 

History

History
73 lines (41 loc) · 2.21 KB

File metadata and controls

73 lines (41 loc) · 2.21 KB

Integration logo

Joe-Sandbox-Microsoft-Defender-Connector

This script will enrich your Microsoft Defender Alerts with Joe Sandbox analysis data (Score, Detection, Threatname and a link to the full analysis)

Requirements

  • Python 3.x with required packages (Required Packages)
  • Microsoft Defender for Endpoint
  • Joe Sandbox Cloud Pro or Basic API key

Installation & Setup

Clone the repository into your folder.

git clone https://github.com/joesecurity/Joe-Sandbox-Microsoft-Defender-Addon.git

Install the requirements.

pip install -r requirements.txt

Joe Sandbox Setup

Generate an API Key in User Settings - API key and copy it to jbxAPIKey in connectory.py

Microsoft Defender for Endpoint Setup

Creating Application for API Access

1

  • Click New registration button, enter the name Joe Sandbox Sync and click register
  • Copy the Applicatin (client) ID and Directory (tenant) ID to msClientId and msTenantId in connectory.py

2

  • Now we need to grant permissions to the App. Click on API permissions then Add a permission

3

  • Choose APIs my organization uses and then type WindowsDefenderATP

4

  • Select Application Permission

5

  • Add Alert.Read.All, Alert.ReadWrite.All and click Add permission

6

  • Goto Certificates and secrets
  • Click New client secret
  • Copy Value to msAppSecret in connectory.py

7

  • Finally goto API Permissions again and click Grant admin consens for all permissions

Running the Connector

Running with CLI

Simply start the connector via cmdline. You likely want to add it crontab to run it regularly. Adjust the timeSpan in connectory.py to change the search span of alerts.

python connector.py

If the connector finds Joe Sandbox analyses which match Microsoft Defender alerts then a new comment is added:

8