AppNavi Discovery – Microsoft Defender API Integration

Overview:

AppNavi Discovery is a powerful solution for montoring and understanding how applications are used across your organization. It works seamlessly with the AppNavi Chrome Extension, which offers smooth integration and rich insights. However, since deploying the extension across all devices may not suit every organization, we’ve also introduced an alternative integration method: Microsoft Defender API. This gives teams more flexibility while still benefiting from AppNavi’s core capabilities.

AppNavi can be configured to use Microsoft Defender API to discover applications and enrich them with usage metrics and organizational context.

Note: Only one integration type—either Chrome Extension or Defender API—can be active at a time.

How to Enable Defender API Integration

  1. Go to Manage Tenant in the AppNavi portal.
  2. Find the Discovery Settings section.
  3. In the Select Data Source dropdown, choose Defender API.
  4. You’ll see four additional fields:
    1. Defender Client ID (Required): The Client ID of your Defender API app in Microsoft Entra.
    2. Defender Client Secret (Required): The Client Secret of your Defender API app in Microsoft Entra.
    3. Defender Tenant ID (Required): The Tenant ID of your Defender API app in Microsoft Entra.
    4. Sync AD Users (Optional): If enabled, AppNavi will enrich discovered apps with department and country data from Active Directory.

AppNavi automatically validates the configuration. If there’s an issue, it will show an error message to help you identify and fix the problem.

In case AppNavi runs into connectivity issues with Defender Api, it will display an error message in AppNavi Portal. Which will be useful for Tenant Owner to diagnose the issue and fix it.

Supported metrics in Discovery

Once enabled, AppNavi collects data from Defender API daily. Some metrics may appear empty if certain data points aren’t available through Defender

Feature / BehaviorChrome ExtensionDefender API (AD User)
Discovery EventsFull events are captured (Business Capabilities, Copy-Paste count, all discovered app columns)Extension events not captured – only AD user data ingested
Matrix in DiscoveryAvailable (all application metrics shown)Limited: only First Seen and Last Seen for users
App GraphGenerated (visual routing between apps)Not generated
Risk AnalyticsAvailable (application risk tab populated)Not Available
TasksCan create tasks based on discovered applicationsCan create tasks for AD user applications
Discovery App DataAll fields (Business Capabilities, Sessions, Time spent, etc.)Limited: only First Seen and Last Seen for users
Data ClassificationAvailable (can add classify data)Available (can add classify data)
Data Processing ApplicationsAvailable (can add business process )Available (can add business process )
Switching SourcesWorks as normal (Chrome data processed)Supported (Defender data processed, Chrome data discarded until switched back)
Privacy HandlingExtension-based pseudonymizationDefender API pseudonymization (no PII, only GUIDs, roles, country, dept if pseudonymized)

Switching Discovery data source

You can switch to the Chrome Extension as your Discovery data source even after using Defender API for a while. When you make the switch, all previously discovered applications will remain visible in the portal. However, their metrics will now be updated based on data from the Chrome Extension.

As a result, you may notice a drop in some metrics after switching. This is expected—AppNavi does not combine data from different sources. Instead, it only uses metrics from the currently selected integration method.

Permissions for Defender API Client

To allow AppNavi to connect with the Microsoft Defender API and retrieve event data successfully, the API client must be granted the following permissions in Microsoft Entra:

Permission NamePurpose
User.Read.AllAllows access to user profile data across the organization
AdvancedQuery.Read.AllEnables AppNavi to make advanced queries call for detailed event and activity logs
AuditLog.Read.AllOptional – Grants access to audit logs for analyzing system activity. Required only if the Defender Metrics feature is enabled. This permission is needed to enrich SSO and MFA metrics.

Make sure these permissions are assigned to the Defender API client before enabling integration in AppNavi. Without them, data collection may fail or return incomplete results.

Assign Required API Permissions in Microsoft Entra

  1. Sign in to Microsoft Entra Admin Center
  2. Go to Applications > Enterprise Applications
  3. Search and select your Defender API client
  4. Navigate to Permissions > API Permissions
  5. Click + Add a permission
  6. Choose Microsoft Graph > Application permissions
  7. Add: User.Read.All, AdvancedQuery.Read.All, AuditLog.Read.All
  8. Click Add permissions
  9. Click Grant admin consent for[Your Organization]
  10. Confirm permissions show as Granted
  11. Test connectivity in AppNavi using the client credentials
  12. If it fails, verify client ID, secret, tenant ID, and permission consent status

Troubleshooting

IssuePossible CauseSuggested Fix
Validation failedIncorrect Client ID, Secret, or Tenant IDDouble-check values in Microsoft Entra. Make sure the app has corrected permissions.
No data appearingDefender API access not granted or misconfiguredEnsure the Defender API app has permission to read usage data. Check that the app is active and not blocked by policy.
Empty metrics in portalDefender API doesn’t provide all required metricsThis is expected for some metrics. Consider switching to Chrome Extension if full data is needed.
Countries and Departments missingAD sync not enabled or missing attributesConfirm that Sync AD User option is enabled and user attributes like department and country are available in Entra and mapped correctly.