The following resources will be created or updated in your tenant.
Hunt&Hackett's Secops application to fetch data directly to Secops
| Resource | Permission | Type |
|---|---|---|
| Microsoft Graph | DeviceManagementApps.Read.All | Role |
| Microsoft Graph | Directory.Read.All | Role |
| Microsoft Graph | SecurityEvents.Read.All | Role |
| Microsoft Graph | AuditLog.Read.All | Role |
EntraID application to perform user Response actions from the SOAR platform
| Resource | Permission | Type |
|---|---|---|
| Microsoft Graph | User.EnableDisableAccount.All | Role |
| Microsoft Graph | User.RevokeSessions.All | Role |
| Microsoft Graph | User.Read.All | Role |
Hunt&Hackett Graph API application to fetch user authentication configuration data directly to SOAR
| Resource | Permission | Type |
|---|---|---|
| Microsoft Graph | UserAuthenticationMethod.Read.All | Role |
Hunt&Hackett Threathunting application to access Defender data for threathunting purposes
| Resource | Permission | Type |
|---|---|---|
| Microsoft Threat Protection | AdvancedHunting.Read.All | Role |
| Microsoft Threat Protection | Incident.Read.All | Role |
Defender ATP Application to perform endpoint response actions from the SOAR platform
| Resource | Permission | Type |
|---|---|---|
| WindowsDefenderATP | File.Read.All | Role |
| WindowsDefenderATP | Ip.Read.All | Role |
| WindowsDefenderATP | Machine.CollectForensics | Role |
| WindowsDefenderATP | Machine.Isolate | Role |
| WindowsDefenderATP | Machine.ReadWrite.All | Role |
| WindowsDefenderATP | Machine.RestrictExecution | Role |
| WindowsDefenderATP | Machine.Scan | Role |
| WindowsDefenderATP | Machine.StopAndQuarantine | Role |
| WindowsDefenderATP | Url.Read.All | Role |
| WindowsDefenderATP | User.Read.All | Role |
| WindowsDefenderATP | Ti.ReadWrite | Role |
| WindowsDefenderATP | Vulnerability.Read.All | Role |
| WindowsDefenderATP | Software.Read.All | Role |
| WindowsDefenderATP | Machine.LiveResponse | Role |
| WindowsDefenderATP | Machine.Read.All | Role |
DefenderXDR application fetch Defender365 incidents to SOAR platform
| Resource | Permission | Type |
|---|---|---|
| Microsoft Threat Protection | AdvancedHunting.Read.All | Role |
| Microsoft Threat Protection | Incident.Read.All | Role |
| Microsoft Threat Protection | Incident.ReadWrite.All | Role |
| Microsoft Graph | ThreatHunting.Read.All | Role |
Group for service accounts used by Hunt & Hackett
Service account used to access the security portal
Basic user service account used for automated end-to-end testing.
No roles assigned.
Location Name: Hunt and Hackett Known IP