Skip to main content
The Microsoft Defender XDR enterprise application enables ContraForce to access Microsoft Defender for Endpoint (MDE) data. Once consented, you gain visibility into endpoints across your managed tenants and can perform response actions directly from ContraForce.
This enterprise application is required for the Endpoints page, device insights, and endpoint-related Gamebook actions in ContraForce.

What This Application Enables

Endpoint Visibility

View all devices managed by Defender for Endpoint across your workspaces

Device Details

Access device information including OS, health state, and exposure level

Incident Correlation

See device-related incidents and timeline data during investigations

Response Actions

Execute endpoint Gamebooks (with additional consent)

Features Enabled

Once consented, the Microsoft Defender XDR enterprise application enables the following capabilities:

Endpoints Page

The ContraForce Endpoints page aggregates MDE data from all connected workspaces:
ContraForce Endpoints page with MDE data
FeatureDescription
Device ListView all endpoints across managed tenants
Device InfoAccess hardware, OS, and configuration details
Health StateMonitor device security health
Exposure LevelSee risk assessment for each device
Last SeenTrack when devices last checked in

Entity Insights

During incident investigation, access device-related insights:
InsightDescription
Device TimelineChronological view of events on the endpoint
Device InfoDetailed hardware and software information
Related IncidentsOther incidents involving the same device

Incident Data

The application also enables:
  • Bi-directional incident streaming from Defender XDR
  • Fetching incident entities and evidence
  • Alert timelines and investigation audit trails
For full endpoint response capabilities (isolate, scan, quarantine), you’ll also need to consent the Gamebooks for Defender XDR enterprise application.

Permissions

The Microsoft Defender XDR enterprise application requests the following Microsoft Graph and Defender API permissions:

Required Permissions

PermissionTypePurpose
Machine.Read.AllApplicationRead device information from MDE
Machine.ReadWrite.AllDelegatedAccess device details during user sessions
SecurityEvents.Read.AllApplicationRead security alerts and incidents
SecurityEvents.ReadWrite.AllDelegatedUpdate incident status and assignments
These permissions grant read access to endpoint data across the tenant. Ensure you have proper authorization before consenting on behalf of customers.

Permission Types Explained

TypeDescriptionUse Case
ApplicationRuns without user contextBackground data synchronization
DelegatedRuns on behalf of signed-in userInteractive portal access

Prerequisites

Before consenting this enterprise application:
1

Microsoft Defender for Endpoint

MDE must be deployed and active in the target tenant
2

Appropriate Licensing

Microsoft 365 Business Premium, E3, or E5 (or standalone MDE license)
3

Admin Permissions

Global Administrator role in the target tenant
4

ContraForce Workspace

The workspace must be created and the tenant onboarded

Step 1: Navigate to Workspace Modules

1

Open Workspaces

Go to the Workspaces page in ContraForce
2

Select Workspace

Find the workspace you want to configure
3

Open Modules

Click the gear icon or Modules to access workspace settings

Step 2: Add the Module

1

Click Add Module

Click the Add Module button
2

Select Microsoft Defender XDR

Choose Microsoft Defender XDR from the list
3

Confirm

Click Confirm to add the module to the workspace
1

Open the Module

Click on the Microsoft Defender XDR module you just added
2

Review Permissions

Scroll down to see the list of permissions required
3

Click Consent

Click the Consent button to start the consent flow
4

Authenticate

Sign in with a Global Administrator account from the target tenant
5

Accept Permissions

Review and accept the requested permissions
Microsoft Defender XDR permission consent
The consent flow is a 3-step process. Ensure you complete all steps for the application to function correctly.

After consenting, verify the application is working:

In ContraForce

  1. Navigate to the Endpoints page
  2. Select the workspace you just configured
  3. Confirm devices are populating in the list

In Microsoft Entra ID

  1. Go to Azure Portal > Microsoft Entra ID > Enterprise Applications
  2. Search for “ContraForce” or the application name
  3. Verify the application appears with Enabled status
  4. Check Permissions to confirm grants are in place

Capability Matrix

The Microsoft Defender XDR integration capabilities vary by license:
CapabilityBusiness PremiumE3E5
Incident Management
Bi-directional incident streaming
Fetch incident entities
Fetch incident evidence
Alert timelines
Device Insights
Device info
Device timeline✓*✓*
Related incidents✓*✓*
Endpoint Management
View device list
View device info
*Requires Microsoft Defender for Endpoint Plan 2 add-on

Full Capabilities Matrix

View the complete Defender capability matrix including Gamebook actions

The Microsoft Defender XDR application works alongside other ContraForce enterprise applications:
ApplicationPurpose
Gamebooks for Defender XDREndpoint response actions (isolate, scan, quarantine)
Gamebooks for IdentityUser response actions (disable, reset password)
Microsoft 365 ResponseEmail response actions (delete email)
Azure ResponseAzure resource response actions
For a complete MXDR setup, consent all relevant enterprise applications based on the response capabilities you need.

Troubleshooting

Common Issues

IssuePossible CauseSolution
No devices showingConsent incompleteRe-run the consent flow and complete all steps
Consent failsInsufficient permissionsUse a Global Administrator account
Partial dataMDE not fully deployedVerify MDE is active on target devices
Stale device dataSync delayWait 15-30 minutes for initial sync
Permission denied errorsConsent revokedCheck Entra ID enterprise apps and re-consent
In the workspace modules view, consented applications show a green checkmark or “Consented” status. If you see “Not Consented” or a warning icon, re-run the consent process. If you need to revoke consent:
  1. Go to Azure Portal > Microsoft Entra ID > Enterprise Applications
  2. Find the ContraForce Defender XDR application
  3. Go to Properties and set Enabled for users to sign-in to No
  4. Or delete the application entirely
Revoking consent will disable MDE data access in ContraForce for that workspace. The Endpoints page will no longer show devices.

Best Practices

Create a dedicated service account with Global Admin permissions for consenting enterprise applications across customer tenants.


Questions about the Microsoft Defender XDR enterprise application? Contact us at [email protected].