Setup CrowdStrike's ITP with Entra ID

circle-info

Before starting the integration, ensure that:

  • You have a paid Entra ID license. Note that Microsoft Entra ID Free is not supported.

  • The account used has global administrator rights to your Entra ID account.

1. Purpose of ITP (Identity Threat Protection)

The ITP option continuously monitors account-related activities and Active Directory to detect abnormal behavior:

Identity-centered behavioral analysis

  • Suspicious authentications

  • Unusual access patterns

  • Unauthorized login attempts

  • User account anomalies

Examples of detected events: suspicious workstation-to-server connections, network scans, brute-force attempts, or credential extraction. When a critical event is identified, the module can automatically block it.

Assessment of your Active Directory security posture

The module provides a real-time overview of your Active Directory security, similar to the Stoïk Protect AD scan but with more advanced options:

  • Identification of configuration issues

  • Detection of accounts with compromised passwords

  • Management and control of user privileges

This feature helps you quickly remediate vulnerabilities and strengthen the security of your infrastructure.

Cloud threat monitoring (optional)

When configured with your identity service (e.g. Entra ID), ITP can detect threats in your cloud environments:

  • Logins from suspicious IP addresses

  • Abnormal access attempts to user accounts

This integration helps protect your identities both on-premise and in the cloud, providing full and proactive visibility into your security posture.

2. Integration of ITP

The integration of Identity Protection with Microsoft Entra ID requires the following steps for each Azure tenant:

  • Creation and configuration of an application in Entra ID

  • Retrieval of the tenant domain

  • Retrieval of the application ID and secret

  • Creation of a custom role for RBAC access

  • Configuration of the ITP option

  • Transmission of the collected information

  • Configuration of the connector in Identity Protection

  • Remediation permissions

Step 1: Create and configure an application in Entra ID

  1. In the Azure portal, open the left-hand menu and click “Microsoft Entra ID”

  2. On the Microsoft Entra ID page, from the Add menu, select “App registrations”

  3. On the “Register an application” page:

    • Under Name, enter a name that matches your internal naming conventions, or use “stoik-connector-itp”

    • Under Supported account types, select “Accounts in this organizational directory only”

    • Under Redirect URI, select “Web” and enter https://localhost

    • Click Register

  4. In the application’s left-hand menu, click “API permissions”

  5. On the API permissions page, click “Add a permission”

  6. In the Request API permissions panel:

    • Click Microsoft Graph

    • Select Application permissions

Important – In “Select permissions”:

  • Type “directory”, expand Directory, and select Directory.Read.All

  • Type “audit”, expand AuditLog, and select AuditLog.Read.All

  1. Click Add permissions

  2. On the API permissions page, click Grant admin consent and confirm

Step 2: Retrieve the tenant domain

  1. In the Azure portal, go to Microsoft Entra ID

  2. In the left-hand menu, click Overview

  3. Note the value of the Primary domain (e.g. example.onmicrosoft.com), which will be required later

Step 3: Retrieve the application ID and secret

  1. In Microsoft Entra ID, go to App registrations

  2. Select your application

  3. In Overview, note the Application (client) ID, which will be required later

  4. In Certificates & secrets:

    • Create a new client secret

    • Provide a description and an expiration duration

    • Important: immediately save the generated value, as it will not be visible again and will be required later

Step 4: Create a custom role for RBAC access

To display Azure RBAC role assignment information in Identity Protection, the application must be granted permission to read RBAC definitions and assignments. It is recommended to create a custom role with the minimum required permissions.

Create the custom role

  1. In the Azure portal, go to Management Groups

  2. Click Tenant Root Group

  3. Select Access control (IAM), then click Roles

  4. Click Add, then select Add custom role

  5. In the Basics tab:

    • Enter a clear name for the role (e.g. “Identity Protection RBAC Reader”)

  6. In the Permissions tab, add the following permissions:

    • Microsoft.Authorization/roleDefinitions/read

    • Microsoft.Authorization/roleAssignments/read

  7. Click Review + create, review the role settings, then click Create

Assign the custom role

Once the role has been created, assign it to the previously created application:

  1. In the Azure portal, return to Management Groups

  2. Click Tenant Root Group

  3. Select Access control (IAM), then click Role assignments

  4. Click Add, then select Add role assignment

  5. In the Role tab, select the custom role you just created

  6. In the Members tab:

    • Click Select members

    • Search for the previously created application (e.g. “stoik-connector-itp”)

    • Select it and click Select

  7. Click Review + assign

  8. Review the assignment details and click Review + assign again to confirm

Step 5: Transmission of collected information

Note: This step applies if you do not have administrative access to your Falcon ITP platform. Otherwise, please refer to Step 5.B.

Securely send the previously collected information to your Stoïk point of contact to set up the ITP connection:

  • Tenant primary domain name*

  • Application ID

  • Application secret

* Please note that the domain name to provide is the one generated by Microsoft during the creation of your Azure tenant. It is accessible via the link below and always ends with “onmicrosoft.com”.

Step 6: Connector configuration in Identity Protection

  1. In the Falcon console, go to Identity Protection > Configure > Connectors

  2. Select “Entra” under the IDAAS category

  3. Configure the connector with:

    • Tenant primary domain name

    • Application ID

    • Application secret

  4. Enable the login data collection option

  5. Save the configuration

The status indicator should turn green within a minute, confirming that the connection has been successfully established.

* Please note that the domain name to use is the one generated by Microsoft during the creation of your Azure tenant. It is accessible via the link below and always ends with “onmicrosoft.com”.

Step 7: Remediation by Stoïk teams

In the event of an account compromise in your Entra ID environment during nights or weekends, your teams may not be available to perform the necessary remediation actions. We therefore recommend granting access that allows impacted accounts to be disabled in the event of a confirmed compromise.

To do so, simply click on the provided linkarrow-up-right. You will be redirected to a page similar to the example below. Click Accept after reviewing the requested permissions. You will then be redirected to a blank page, which you may close.

The application only has the permissions required to enable or disable existing accounts in your Azure environment, with no ability to create accounts or modify other attributes.

Access to these features is strictly controlled: each action is authenticated via MFA (multi-factor authentication), logged, and timestamped. A complete audit log of these operations can be provided upon request.

Last updated

Was this helpful?