What this integration is
This integration ingests Microsoft Defender for Endpoint alerts via the Defender for Endpoint API. Vendor reference:Data path (how it flows)
- Microsoft Defender for Endpoint → API polling (OAuth2)
- Collector → syslog/ingest into Graylog (implementation-dependent)
- Graylog → stream/index/dashboards
Prerequisites
- Azure app registration for API access
- API permissions granted:
Alert.Read.AllAlert.ReadWrite.All
Credentials & config you’ll need
- Tenant ID
- Client ID
- Client secret
- Token URL:
https://login.microsoftonline.com/<TENANT_ID>/oauth2/token - Syslog host/port (Graylog)
CoPilot setup (recommended workflow)
- Provision the customer.
- Add Defender for Endpoint integration under the customer.
- Provide tenant/client credentials.
- Deploy/start the connector container generated during provisioning.
- Graylog input + stream + index
- Grafana datasource + dashboards
- A customer-specific docker compose + Filebeat config
Deployment notes (connector container)
Success criteria
- Defender alerts are arriving
- Events are routed to the correct customer index/stream
Troubleshooting
- Confirm the Azure app has the required permissions and admin consent.
- Confirm tenant ID/client ID/secret match.
- Check connector logs for OAuth failures.
