Join us as we sit down with Doug Cahill and talk about Cybersecurity Integrations: The ROI Black Hole

PARTNER

Microsoft Defender for Endpoint

Microsoft | EDR

Microsoft Defender for Endpoint is an enterprise endpoint detection and response (EDR) platform that provides threat prevention, detection, investigation, and automated response across Windows, macOS, Linux, iOS, and Android.

Vendors building a Microsoft Defender for Endpoint integration can access normalized endpoint detections, vulnerabilities, and device health data through Synqly's connector. Integrate Defender for Endpoint to power security workflows with Microsoft endpoint telemetry without per-customer API configuration.

Configuration for Microsoft Defender for Endpoint.

[Configuration guide](https://docs.synqly.com/guides/provider-configuration/defender-setup)

Integration Use Cases

gpp_maybe

Create IOCs

Creates a list of iocs that match the stix input for the EDR source.

list_alt_check

Delete IOCs

Deletes a list of iocs that match the input of ids in the query param

computer

Get Endpoint

Gets a single endpoint assets matching the UID from the token-linked EDR source.

remove_from_queue

Quarantine Endpoints

Connect or disconnect one or more endpoints assets to the network, allowing or disallowing connections.

notifications_active

Query Alerts

Returns a list of alerts that match the query from the token-linked EDR source.

database_search

Query Applications

Returns a list of applications matching the query from the token-linked EDR source.

devices

Query Endpoints

Returns a list of endpoint assets matching the query from the token-linked EDR source.

gpp_maybe

Query IOCs

Returns a list of iocs that match the query from the token-linked EDR source.

grading

Query Posture Score

Returns the posture score of the endpoint assets that match the query from the token-linked EDR source.

event_list

Query Threat Events

Returns a list of threats that match the query from the token-linked EDR source.

Integration Resources