Microsoft Defender for Identity
What is it the Microsoft Defender for Identity integration?
This integration uses Insights to connect BeyondTrust Password Safe and Microsoft Defender.
Insights notifies Defender of the Entra ID and Active Directory accounts whose credentials are managed by Password Safe. Defender labels the accounts managed by BeyondTrust in Defender and provides a Reset Password option.
How is it useful?
Once the integration with Microsoft Defender is complete, all Password Safe managed Entra ID user accounts will be available for Defender initiated password resets.
Incident responders working in MDI know accounts are managed by BeyondTrust Password Safe and can trigger BT-managed account password resets while working on incidents and track their statuses.
Prerequisites
Make sure you have:
- BeyondTrust Password Safe Cloud installed and fully configured
- An active BeyondTrust Identity Security Insights subscription
- Microsoft Defender for Identity deployed and integrated with your Active Directory and Entra ID
- An Entra ID Tenant ID
- Access to an Entra account
Prepare Password Safe
- Open Password Safe Cloud
- Ensure you've registered your API in BeyondInsight.
- Ensure you've created a user, and assigned that user to a properly-provisioned group within Password Safe.
Create connector in Insights
- In Insights, click Menu > Connectors.
The Connectors page displays with the Configured tab open by default. - Click the Available tab.
All available connector types display. - Locate Password Safe Cloud in the list.
- Click + Create Connector.
The Create Password Safe Cloud Connector panel displays. - Enter the connector details.
- Enter a Name for your Password Safe Cloud connector.
- Ensure Password Safe Cloud is configured to perform scans.
- Enter your Password Safe Cloud Domain (such as https://company.ps.beyondtrustcloud.com).
- Enter the API key created during API registration.
- From the drop-down list, select:
Yes if the User password required option is selected in Password Safe
Cloud.
No if the User password required option is not selected in Password Safe
Cloud.
Note
To check if this setting is required in Password Safe Cloud:
Go to the main menu > Configuration > General > API Registrations. Under Authentication Rules Options in the Details section, note if User password required is selected.
- Enter the username added to the Password Safe group made for Identity Security Insights.
- Enter the Entra ID for your Microsoft account.
- Click the link to authorize Entra Consent.
- Sign into your Microsoft account and clickacceptfor the permissions requested.
- If Microsoft Defender integrates with Active Directory, enter the AD Domainfor active directory.
- Click Create Connector.
An installation key displays for the connector. - Copy the installation key.
Do not close the connector before you have enabled it in Password Safe in the below steps.
19. Configure and enable the installation key for Password Safe 24.1.1 and newer releases.
- Open Password Safe Cloud.
- From the left menu, click Configuration > Identity Security Insights > Connect to Identity Security Insights.
The Identity Security Insights page displays. - In the Connector Key field, input the installation key you copied above.
- Click Update Settings.
- Confirm the toggle is Enabled.
- Optionally, verify the connector in Insights.
Create and configure a new group
You can connect Identity Security Insights to both cloud and on-premises instances
of Password Safe to automatically scan for associated accounts and track your organization’s identities in summarized visualizations.
To access account and identity information, Identity Security Insights requires you to createa user and group with properly-provisioned roles within Password Safe. Because this user allows Identity Security Insights to access Password Safe, we recommend you create a new user for this purpose.
- Sign into Password Safe.
2. Create a new group in Password Safe.
- From the left menu, select: Configuration > Role Based Access > User Management.
- Click Groups.
- Click Create New Group.
- Enter a group Name and Description.
- Click Create Group.
The group is created in Password Safe. - Optionally, but recommended, create a new user for the group.
- Assign the chosen user to the group.
- Under Group Details, select Users.
- From the Show drop-down list, select Users not assigned. A list of all users not currently assigned to a group displays.
- Locate the user you wish to add to the group.
- Click Assign User. The user assigns to the group.
- Under Group Details, select API Registrations.
- Check the box next to the API registration created for Identity Security Insights.
5. Assign features permissions to the group.
- Under Group Details, select Features.
- From the Show dropdown menu, select All Features.
- Select the following features:
• Analytics and Reporting
• Asset Management
• Password Safe Role Management
• Password Safe System Management
• Ticket System
• User Accounts Management - Click Assign Permissions > Assign Permissions Read Only.
- Click User Audits > Assign Permissions Full Control.
Assign Smart Groups permissions and roles to the group.
- Under Group Details, select Smart Groups.
- From the Show drop down menu, select All Smart Groups.
- Select the All Assets Smart Group.
- Click Assign Permissions above the grid, and select Assign Permissions Read
Only. - Click the vertical ellipsis button for the All Assets Smart Group.
Updated 6 days ago