Pull in data from machines utilizing the Microsoft Defender for Endpoint security solution into your Configuration Management Database (CMDB).

Before you begin

Important: Unless there are configuration issues, use the SGC Central view in the CMDB Workspace to configure the connection for the connector, as the guided setup method is being deprecated.

To use this Service Graph Connector, you need a subscription to a Subscription Unit that is based in the IT Operations Management (ITOM) Visibility application or in the ITOM Discovery application. As defined in the section titled "Managed IT Resource Types" in ServiceNow Subscription Unit Overview for your subscription, for managed IT resources that are created or modified in the CMDB by this Service Graph Connector, but that aren’t yet managed by ITOM Visibility or ITOM Discovery, these resources will increase Subscription Unit consumption from that application. Review your current Subscription Unit consumption within ITOM Visibility or ITOM Discovery to ensure available capacity.

Dependencies and requirements:
  • The Integration Commons for CMDB store app, which is automatically installed.
  • The CMDB CI class models store app, which is automatically installed. See CMDB CI Class Models store app.
  • The ITOM Discovery License plugin (com.snc.itom.discovery.license). You must activate this plugin.
  • ITOM Licensing plugin (com.snc.itom.license). For more information, see Request Discovery.
  • The Datastream Action plugin (com.glide.hub.action_type.datastream), which is automatically installed.
  • Observability Commons for CMDB (sn_observability), which is only required for event ingestion. For Event Management to work, the Observability Commons for CMDB (sn_observability) app must be installed prior to installing the connector. For more information, see Observability Commons for CMDB on the ServiceNow Store.
Complete the following tasks:
  • Install the Service Graph Connector for Microsoft Defender Endpoint application (sn_defender_integ). For more information, see Install a ServiceNow Store application.
  • Ensure that you have an active subscription to Microsoft Defender for Endpoint.
  • Ensure that you have created an Azure application to get programmatic access to Microsoft Defender for Endpoint. See Use Microsoft Defender for Endpoint APIs in the Microsoft 365 documentation.
  • Obtain the tenant ID, client ID, and client secret details for the Microsoft Defender for Endpoint administrator account.
  • Enable the Machine.Read.All and Machine.ReadWrite.All permissions in Microsoft Defender for Endpoint. See Permissions for the List machines API in the Microsoft 365 documentation.

Role required: admin

Procedure

  1. Ensure that the application scope is set to the Service Graph Connector for Microsoft Defender Endpoint application by using the application picker.
    For more information, see Application picker.
  2. Navigate to All > Service Graph Connectors > Microsoft Defender > Setup.
  3. On the Getting started page, select Get Started.
  4. Configure the authentication credentials details for sending requests to the List machines API in Microsoft Defender for Endpoint.
    1. Configure your Microsoft Defender for Endpoint authentication credentials.
      1. In the Configure the connection section of the Service Graph Connector for Microsoft Defender page, select Get Started.
      2. For the Configure the credentials task, select Configure.
      3. On the form, review and modify the fields.
      4. Select Update to return to the guided setup page.
      5. Set the Configure the credentials task to complete by selecting Mark as Complete.
    2. Test the List machines API connection to import machine-related data from Microsoft Defender for Endpoint.
      1. For the Test the connection task, select Configure.
      2. On the Service Graph Connections page, select Test Connection.
      3. When the Status field is set to Success, select Update to close the Test the connection dialog box and return to the guided setup page.

        If any of the tests have errors, follow the suggestions for remediation.

      4. Set the Test the connection task to complete by selecting Mark as Complete.
  5. Configure the scheduled jobs to import machine-related data from Microsoft Defender for Endpoint.
    1. In the Set up scheduled import jobs section of the Service Graph Connector for Microsoft Defender page, select Get Started.
    2. For the Configure scheduled jobs task, select Configure.
    3. From the Name column, select the scheduled job that you want to activate.
      By default, the SG-Defender Machines scheduled job is available to run the SG-Defender Machines data source.
    4. On the Scheduled Data Import form, verify the field values for the scheduled job.
      For more information, see Schedule a data import.
    5. Select Update.
    6. Select the back button of your browser to return to the guided setup page.
    7. Set the Configure the scheduled jobs task to complete by selecting Mark as Complete in the guided setup.