mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 03:13:44 +00:00
fix dead link, update related topics links
This commit is contained in:
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure an Azure Active Directory application for SIEM integration
|
title: Configure an Azure Active Directory application for SIEM integration
|
||||||
description: Configure an Azure Active Directory application so that it can communicate with supported SIEM tools.
|
description: Configure an Azure Active Directory application so that it can communicate with supported SIEM tools.
|
||||||
keywords: configure aad for siem integration, siem integration, application, oauth 2
|
keywords: configure aad for siem integration, siem integration, application, oauth 2
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -21,64 +21,60 @@ You need to add an application in your Azure Active Directory (AAD) tenant then
|
|||||||
|
|
||||||
1. Login to the [Azure management portal](https://manage.windowsazure.com).
|
1. Login to the [Azure management portal](https://manage.windowsazure.com).
|
||||||
|
|
||||||
2. Select **Active Directory**.
|
2. Select **Active Directory**.
|
||||||
|
|
||||||
3. Select your tenant.
|
3. Select your tenant.
|
||||||
|
|
||||||
4. Select **Applications**, then select **Add** to create a new application.
|
4. Select **Applications**, then select **Add** to create a new application.
|
||||||
|
|
||||||
5. Select **Add an application my organization is developing**.
|
5. Select **Add an application my organization is developing**.
|
||||||
|
|
||||||
6. Choose a client name for the application, for example, *Alert Export Client*.
|
6. Choose a client name for the application, for example, *Alert Export Client*.
|
||||||
|
|
||||||
7. Select **WEB APPLICATION AND/OR WEB API**.
|
7. Select **WEB APPLICATION AND/OR WEB API**.
|
||||||
|
|
||||||
8. Assign a sign-on URL and app ID URI to the application, for example, `https://alertexportclient`.
|
8. Assign a sign-on URL and app ID URI to the application, for example, `https://alertexportclient`.
|
||||||
|
|
||||||
9. Confirm the request details and verify that you have successfully added the app.
|
9. Confirm the request details and verify that you have successfully added the app.
|
||||||
|
|
||||||
10. Select the application you've just created from the directory application list and select **Configure**.
|
10. Select the application you've just created from the directory application list and select **Configure**.
|
||||||
|
|
||||||
11. Type the following URL in the **Reply URL** field: `https://DataAccess-PRD.trafficmanager.net:444/api/FetchAccessTokenFromAuthCode`.
|
11. Type the following URL in the **Reply URL** field: `https://DataAccess-PRD.trafficmanager.net:444/api/FetchAccessTokenFromAuthCode`.
|
||||||
|
|
||||||
12. Scroll down to the **keys** section and select a duration for the application key.
|
12. Scroll down to the **keys** section and select a duration for the application key.
|
||||||
|
|
||||||
13. Select **Save** and copy the key in a safe place. You'll need this key to authenticate the client application on Azure Active Directory.
|
13. Select **Save** and copy the key in a safe place. You'll need this key to authenticate the client application on Azure Active Directory.
|
||||||
|
|
||||||
14. Open a web browser and connect to the following URL: `https://DataAccess-PRD.trafficmanager.net:444/api/FetchToken?clientId=f7c1acd8-0458-48a0-a662-dba6de049d1c&tenantId=<tenant ID>&clientSecret=1234`. An Azure login page appears.
|
14. Open a web browser and connect to the following URL: `https://DataAccess-PRD.trafficmanager.net:444/api/FetchToken?clientId=f7c1acd8-0458-48a0-a662-dba6de049d1c&tenantId=<tenant ID>&clientSecret=1234`. An Azure login page appears.
|
||||||
|
|
||||||
> **Notes:**
|
> **Notes:**
|
||||||
- Replace *tenant ID* with your actual tenant ID.
|
- Replace *tenant ID* with your actual tenant ID.
|
||||||
- Keep the client secret as is. This is a dummy value, but the parameter must appear.
|
- Keep the client secret as is. This is a dummy value, but the parameter must appear.
|
||||||
|
|
||||||
15. Sign in with the credentials of a user from your tenant.
|
15. Sign in with the credentials of a user from your tenant.
|
||||||
|
|
||||||
16. Select **Accept** to provide consent. Ignore the error.
|
16. Select **Accept** to provide consent. Ignore the error.
|
||||||
|
|
||||||
17. Select **Application configuration** under your tenant.
|
17. Select **Application configuration** under your tenant.
|
||||||
|
|
||||||
18. Select **Permissions to other applications**, then select **Add application**.
|
18. Select **Permissions to other applications**, then select **Add application**.
|
||||||
|
|
||||||
19. Select **All apps** from the **SHOW** field and submit.
|
19. Select **All apps** from the **SHOW** field and submit.
|
||||||
|
|
||||||
20. Select **SevilleAlertExport** [RONEN, I ASSUME THIS WILL BE RENAMED?], then select **+** to add the application. You should see it on the **SELECTED** panel.
|
20. Select **SevilleAlertExport** [RONEN, I ASSUME THIS WILL BE RENAMED?], then select **+** to add the application. You should see it on the **SELECTED** panel.
|
||||||
|
|
||||||
21. Submit your changes.
|
21. Submit your changes.
|
||||||
|
|
||||||
22. On the **SevilleAlertExport** record, in the **Delegated Permissions** field, select **Access SevilleAlertExport**.
|
22. On the **SevilleAlertExport** record, in the **Delegated Permissions** field, select **Access SevilleAlertExport**.
|
||||||
|
|
||||||
23. Save the application changes.
|
23. Save the application changes.
|
||||||
|
|
||||||
After configuring the application in AAD, you can continue to configure the SIEM tool that you want to use.
|
After configuring the application in AAD, you can continue to configure the SIEM tool that you want to use.
|
||||||
|
|
||||||
RONEN - I THINK I'M MISSING SOME STEPS HERE - I THINK I NEED TO PUT IN INFORMATION ON CLICK VIEW ENDPOINT SO THAT CUSTOMERS CAN SEE THEIR OAUTH 2 TOKEN ENDPOINT AND OAUTH 2 AUTHORIZATION ENDPOINT DETAILS.
|
RONEN - I THINK I'M MISSING SOME STEPS HERE - I THINK I NEED TO PUT IN INFORMATION ON CLICK VIEW ENDPOINT SO THAT CUSTOMERS CAN SEE THEIR OAUTH 2 TOKEN ENDPOINT AND OAUTH 2 AUTHORIZATION ENDPOINT DETAILS.
|
||||||
|
|
||||||
SHOULD I INCLUDE THOSE INFORMATION HERE? OR CREATE A SEPARATE TOPIC FOR THAT? OR INCLUDE IT IN THE SPLUNK/ARCSIGHT STEPS?
|
SHOULD I INCLUDE THOSE INFORMATION HERE? OR CREATE A SEPARATE TOPIC FOR THAT? OR INCLUDE IT IN THE SPLUNK/ARCSIGHT STEPS?
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- Configure Splunk
|
- [Configure Splunk to consume alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
|
||||||
- Configure HP ArcSight
|
- [Configure HP ArcSight to consume alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ HKLM\SOFTWARE\Policies\Microsoft\Sense\AllowSampleCollection
|
|||||||
Value = 0 - block sample collection
|
Value = 0 - block sample collection
|
||||||
Value = 1 - allow sample collection
|
Value = 1 - allow sample collection
|
||||||
```
|
```
|
||||||
5. Change the organizational unit through the Group Policy. See [Configure with Group Policy](configure-gp-windows-defender-advanced-threat-protection.md).
|
5. Change the organizational unit through the Group Policy. See [Configure with Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md).
|
||||||
6. If these steps do not resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com).
|
6. If these steps do not resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com).
|
||||||
|
|
||||||
> **Note** If the value *AllowSampleCollection* is not available, the client will allow sample collection by default.
|
> **Note** If the value *AllowSampleCollection* is not available, the client will allow sample collection by default.
|
||||||
|
Reference in New Issue
Block a user