Source: www.binaryanalys.is
Author: Matthieu Gras
URL: https://binaryanalys.is/posts/defender_timeline/
https://binaryanalys.is/posts/defender_timeline/
ONE SENTENCE SUMMARY:
A new tool automates full six-month data retrieval from Microsoft Defender for Endpoint, overcoming manual limitations and API restrictions.
MAIN POINTS:
- Microsoft Defender for Endpoint retains telemetry data for 180 days.
- API access is limited to 30 days, restricting programmatic investigations.
- The Timeline in the portal accesses older data but lacks API support.
- Exporting from the UI is limited to specific intervals and formats.
- A tool was developed to automate data extraction, bypassing the 30-day limit.
- It interacts with hidden proxy endpoints and authenticates via cookies.
- Reverse engineering enables complete, structured JSON log retrieval.
- The tool uses concurrency to efficiently handle large data volumes.
- A high-concurrency architecture optimizes download speed.
- Performance benchmarks demonstrate significant efficiency gains over existing methods.
TAKEAWAYS:
- The tool provides automated access to six-month endpoint data, overcoming API limits.
- By using proxy endpoints, it captures complete data sets not available through UI exports.
- Authentication complexities are handled with advanced session management.
- The high-concurrency design ensures fast, scalable data processing.
- Available open source on GitHub for use and adaptation in incident response.