Connect WatchGuard Core MDR for Microsoft with Microsoft Defender

Applies To: WatchGuard Core MDR for Microsoft

If you have a WatchGuard Core MDR for Microsoft license, to enable the WatchGuard SOC (security operations center) team to monitor Microsoft Defender for Endpoints in your environment, you must complete these steps:

  1. Verify that You Have the Required Microsoft Licenses
  2. Allow Permissions for the WatchGuard MDR for MS Defender Application
  3. Enable WatchGuard MDR to Access Microsoft Defender for Endpoints
  4. Enable Advanced Features in Microsoft Defender for Endpoints
  5. Complete the Onboarding Form

Verify that You Have the Required Microsoft Licenses

Microsoft provides various Microsoft Defender for Endpoint versions and licenses. WatchGuard Core MDR for Microsoft requires that each endpoint you want the WatchGuard SOC to monitor has a Defender for Endpoint P1 or Defender for Endpoint P2 license.

To view your Microsoft subscription licenses:

  1. Go to portal.office.com and log in with a global administrator account.
  2. In the upper left corner, click Screenshot of app launcher icon.
  3. Select the Admin app.
  4. From the left navigation menu, select Billing > Licenses.
  5. From the Subscriptions tab, view your licenses.

This table lists the Microsoft subscriptions supported by WatchGuard Core MDR for Microsoft and shows which required Microsoft licenses are included in each subscription for the WatchGuard Core MDR for Microsoft implementation. It also shows additional required Microsoft licenses you must purchase:

Recommended Microsoft Subscription Available with Microsoft Subscription for MDR Implementation Optional Add-Ons

Microsoft 365 Enterprise E3

Telemetry Ingestion — Defender for Endpoint Plan 1

SOC Team Access — Entra ID Plan 1 (Azure/EMS)

Defender for Servers

Microsoft 365 Enterprise E5

Telemetry Ingestion — Defender for Endpoint Plan 2

SOC Team Access — Entra ID Plan 2 (Azure/EMS)

Defender for Servers

Microsoft 365 Business Premium

Telemetry Ingestion — Defender for Endpoint Plan 1 + Plan 2

SOC Team Access — Entra ID Plan 1 (Azure/EMS)

Defender for Servers

Contact your Microsoft vendor to make sure you have the correct licenses.

Allow Permissions for the WatchGuard MDR for MS Defender Application

To allow WatchGuard MDR to monitor your endpoints, you must authorize the WatchGuard MDR for MS Defender application to connect to your Azure Cloud environment.

To allow the WatchGuard MDR for MS Defender application to connect to your Azure Cloud environment:

  1. Go to Approve WatchGuard MDR for MS Defender and log in to your Microsoft environment with a Microsoft Azure global administrator account.
    A Permissions Requested dialog box opens.

Screen shot of Microsoft Permissions Requested dialog box

  1. Click Accept.
  2. Go to Microsoft Entra ID > Properties and find your Tenant ID.
  3. Copy your Tenant ID to use later in these instructions.

Enable WatchGuard MDR to Access Microsoft Defender for Endpoints

To enable WatchGuard MDR to access your Microsoft Defender for Endpoints environment, you must create a group in the Microsoft Entra ID portal and add a list of 25 WatchGuard accounts to the group. You can use a script to automatically allow access to the required accounts, or you can follow the steps in this document to manually add them.

To download and run the defender-bulk-soc.ps1 script, go to Use a PowerShell script to enable WatchGuard MDR access to Microsoft Defender for Endpoints in the WatchGuard Knowledge Base and run the script in your Microsoft Azure environment.

To manually allow access, follow these steps:

These instructions are based on the current functionality of Entra ID. Microsoft might update or change the interface and steps over time.

Create the WatchGuard MDR SOC Group

Create a group in the Microsoft Entra ID portal for the required WatchGuard accounts.

To create the group:

  1. Go to https://entra.microsoft.com and log in with a Global Administrator or Privileged Role Administrator account.
  2. From the navigation menu, go to Groups > All Groups.
  3. Click New Group.
    The New Group dialog box opens.
  4. Configure these options:
    • Group Type — Security
    • Group NameWatchGuard MDR SOC
    • Group DescriptionWatchGuard MDR SOC Group
    • Azure AD Roles Can be Assigned to the Group — Yes
  5. Click Create.

Assign the Security Operator Role to the Group

To provide the required permissions to the WatchGuard MDR SOC group, assign the Security Operator role to group.

To assign the role to the group:

  1. From the navigation menu, select Manage > Roles and Administrators.
  2. From the search box, find and select Security Operator.
  3. Click Add Assignments.
  4. From the Select a Member pane, select the Watchguard MDR SOC group.
  5. Click Add.

Invite External Users

Add 25 WatchGuard accounts for the WatchGuard SOC analysts to connect to your environment and assign them to the group.

To add the WatchGuard accounts:

  1. From the navigation menu, go to Users > All Users.
  2. Click New Guest User.
  3. Select Invite User.
  4. In the Email text box, type [email protected]
  5. In the Display Name text box, type th1
  6. Select the Assignments tab.
  7. Click Add Group.
  8. Select the WatchGuard MDR SOC group.
  9. Select the Send Invite Message check box.
  10. Click Review + Invite.
  11. Repeat these steps for each of the 25 guest users.
    For example, [email protected] to [email protected].

Monitor Invitations and Membership (Optional)

Use Audit logs or Access reviews in Entra ID to track user invitations and group membership changes.

Enable Advanced Features in Microsoft Defender for Endpoints

If you have a Microsoft 365 Enterprise E5 or Microsoft 365 Enterprise E3 environment, make sure that you enable the minimum required features.

To enable the required advanced features, in Microsoft Defender for Endpoints:

  1. Go to Microsoft Defender and log in with an assigned security administrator or global administrator account.
  2. In the left navigation menu, select Settings > Endpoints > Advanced Features.

Screen shot of Microsoft Defender advanced features

  1. Make sure the advanced Microsoft Defender features meet these minimum requirements:
  2. Advanced Feature Requirement
    Restrict correlation to within-scoped device groups Optional
    Enabled EDR in block mode Required
    Automatically resolve alerts Required
    Allow or block files Required
    Custom network indicators Required
    Tamper protection Required
    Show user details Required
    Skype for business integration Optional
    Microsoft Defender for Cloud Apps Required
    Web content filtering (Managed by the partner's customer) Required
    Device discovery Required
    Download quarantined files  Required
    Live response Required
    Live response for servers  Required
    Live response from unsigned script execution Required
    Share endpoint alerts with the Microsoft Compliance Center  Optional
    Microsoft Intune connection Required
    Authenticated telemetry Required
    Preview features Optional
    Endpoint Attack Notifications Skip
  3. Click Save Preferences.

Complete the Onboarding Form

After you configure your Microsoft environment, complete the MDR Microsoft Defender for Endpoint Onboarding Form. To complete the form, you must have this information from your Microsoft account:

You also need this information:

  • Customer Company Name — The company name of the customer account for this connector.
  • Partner Company Name — The company name of the Partner.
  • WatchGuard Partner ID — The Partner ID format is: ACC-XXXXXXX.
  • Partner Contact Email Address — The Partner contact email address the deployment team can use if they have questions.
  • Customer/Subscriber WatchGuard Account ID — The Account ID format is: ACC-XXXXXXX or WGC-X-XXXXXXXXXXXXXXXXXXXX.

Related Topics

About WatchGuard Core MDR for Microsoft Licenses

About Managed Services with WatchGuard MDR