Configure Service Graph Connector for Microsoft Defender Endpoint using the guided setup
-
- UpdatedJan 30, 2025
- 4 minutes to read
- Washington DC
- Now Platform Capabilities
Pull in data from machines utilizing the Microsoft Defender for Endpoint security solution into your Configuration Management Database (CMDB).
Before you begin
To use this Service Graph Connector, you need a subscription to a Subscription Unit that is based in the IT Operations Management (ITOM) Visibility application or in the ITOM Discovery application. As defined in the section titled "Managed IT Resource Types" in ServiceNow Subscription Unit Overview for your subscription, for managed IT resources that are created or modified in the CMDB by this Service Graph Connector, but that aren’t yet managed by ITOM Visibility or ITOM Discovery, these resources will increase Subscription Unit consumption from that application. Review your current Subscription Unit consumption within ITOM Visibility or ITOM Discovery to ensure available capacity.
- The Integration Commons for CMDB store app, which is automatically installed.
- The CMDB CI class models store app, which is automatically installed. See CMDB CI Class Models store app.
- The ITOM Discovery License plugin (com.snc.itom.discovery.license). You must activate this plugin.
- ITOM Licensing plugin (com.snc.itom.license). For more information, see Request Discovery.
- The Datastream Action plugin (com.glide.hub.action_type.datastream), which is automatically installed.
- Observability Commons for CMDB (sn_observability), which is only required for event ingestion. For Event Management to work, the Observability Commons for CMDB (sn_observability) app must be installed prior to installing the connector. For more information, see Observability Commons for CMDB on the ServiceNow Store.
- Install the Service Graph Connector for Microsoft Defender Endpoint application (sn_defender_integ). For more information, see Install a ServiceNow Store application.
- Ensure that you have an active subscription to Microsoft Defender for Endpoint.
- Ensure that you have created an Azure application to get programmatic access to Microsoft Defender for Endpoint. See Use Microsoft Defender for Endpoint APIs in the Microsoft 365 documentation.
- Obtain the tenant ID, client ID, and client secret details for the Microsoft Defender for Endpoint administrator account.
- Enable the Machine.Read.All and Machine.ReadWrite.All permissions in Microsoft Defender for Endpoint. See Permissions for the List machines API in the Microsoft 365 documentation.
Role required: admin
Procedure
Related Content
- Accessing the connection details of Service Graph Connector for Microsoft Defender Endpoint
Accessing the connection details of Service Graph Connector for Microsoft Defender