You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Defender changed how it handles API permissions multiple times in the recent past, so the MDATPDriver is responsible for selecting the correct resource, scope name, API URI, and login URI:
The msticpy.data.drivers.mdatp_driver.MDATPDriver is a subclass of msticpy.data.drivers.odata_driver.OData with a few key differences. The MDATPDriver class only allows confidential client credential auth flows using a secret, while its OData parent class supports both application and delegated user auth flows. This is because the Defender APIs previously did not allow delegated user auth. The MDATPDriver driver also determines the correct casing on some of the field names in the responses.
Problem
The current MDATPDriver class only supports authentication using a client secret and application permissions. The use of secrets is not allowed per the Secure Future Initiative.
Proposed Solution
Update the MDATPDriver class to allow delegated user authentication.
Ensure that msticpyconfig.yaml permits MicrosoftDefender.Args without a defined ClientSecret
Refactor msticpy.data.drivers.mdatp_driver.MDATPDriver to support delegated user auth
The text was updated successfully, but these errors were encountered:
Context
Defender changed how it handles API permissions multiple times in the recent past, so the
MDATPDriver
is responsible for selecting the correct resource, scope name, API URI, and login URI:AdvancedQuery.Read
https://api.securitycenter.microsoft.com
/advancedqueries/run
https://login.microsoftonline.com/<tenantId>/oauth2/token
MDE
,MDATP
AdvancedHunting.Read
https://api.security.microsoft.com
/advancedhunting/run
https://login.microsoftonline.com/<tenantId>/oauth2/token
M365D
ThreatHunting.Read.All
https://graph.microsoft.com/<version>/
/security/runHuntingQuery
https://login.microsoftonline.com/<tenantId>/oauth2/v2.0/token
M365DGraph
The
msticpy.data.drivers.mdatp_driver.MDATPDriver
is a subclass ofmsticpy.data.drivers.odata_driver.OData
with a few key differences. TheMDATPDriver
class only allows confidential client credential auth flows using a secret, while itsOData
parent class supports both application and delegated user auth flows. This is because the Defender APIs previously did not allow delegated user auth. TheMDATPDriver
driver also determines the correct casing on some of the field names in the responses.Problem
The current
MDATPDriver
class only supports authentication using a client secret and application permissions. The use of secrets is not allowed per the Secure Future Initiative.Proposed Solution
Update the
MDATPDriver
class to allow delegated user authentication.msticpyconfig.yaml
permitsMicrosoftDefender.Args
without a definedClientSecret
msticpy.data.drivers.mdatp_driver.MDATPDriver
to support delegated user authThe text was updated successfully, but these errors were encountered: