β Pre-requisites
Before AirMDR can integrate with your Microsoft 365 tenant to retrieve quarantined emails, the following technical and organizational prerequisites must be met:Microsoft 365 Tenant Requirements
| Requirement | Description |
|---|---|
| Microsoft 365 Tenant | An active M365 tenant with admin access |
| Microsoft Defender for Office 365 | Plan 1 or Plan 2 licensed (for access to quarantine APIs) |
| Global or Security Admin Role | A user with sufficient privileges to register applications and consent APIs |
| Requirement | Description |
|---|---|
| Access to Azure Portal | To register an application and manage certificates |
| App Registration Permission | Must be able to create an app in Azure Active Directory |
| Upload Public Certificate | You will receive a .cer file from AirMDR to upload to your Azure AD application |
| Grant Admin Consent | Required to authorize API permissions (e.g., Mail.Read, Security.Read.All) for the app |
Onboarding Guide - step by step process to get_ms365_quarantined_emails
This guide outlines the process to provide credentials securely, by creating an Azure AD application and uploading a certificate, so AirMDR can access Microsoft 365 quarantine APIs on your behalf. This enables AirMDR security team to audit, review, or act on potentially malicious emails.
1
Create an App Registration in Azure Portal
- Log in to your Azure Portal using a user with Global Admin or Application Administrator permissions.
-
Navigate to Microsoft Entra ID β App registrations β New registration.

-
Fill out the mandatory details:
-
Name:
AirMDR Quarantine Access -
Supported account types: Select βAccounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)β option).

-
Name:
- Click Register.

2
Upload a Certificate
- After registering the app, navigate to the Manage β Certificates & secrets section.
-
Under Certificates, click Upload certificate.

-
Select a file and upload the public certificate provided by AirMDR (usually a
.cerfile).If you do not already have the certificate, please request AirMDR to generate and provide a new certificate for you. -
Once uploaded, copy the thumbprint of the certificate and click on Add at the bottom of the page.
Share the thumbprint (SHA-1 hash) of the certificate data with AirMDR.

3
Configure API Permissions
- In the application Overview page left navigation pane, select Manage dropdown.
-
Navigate to API Permissions and click + Add a permission.

- On the Request API permissions page, choose APIs my organization uses tab.
-
Search and select Office 365 Exchange Online exactly as shown.

-
Choose Application permissions.

-
Search and select the required permissions as shown:
- To Manage Exchange as Application -
Exchange.ManageAsApp

- To Manage Exchange as Application -
-
Choose Grant admin consent.

- Navigate to Manage β Roles and administrators page, to assign the Exchange Administrator role to the application.
-
Search and select the Exchange Administrator role.

-
Choose Add assignments, and add the app registration we created.

-
In the search bar enter the application name βFor example:
AirMDR Quarantine Accessβ given earlier. - Click on Add at the bottom of the page.
- Navigate to **Entra ID **β**Manage ** β**App registrations ** βAll Applications
- Search and select the application name.
-
In the Overview page copy all the required essentials (Application (client) ID, Directory (tenant) ID).

4
Create a Client Secret (For Authentication)
- In the left navigation pane, select Manage dropdown.
- Click Certificates & secrets.
-
Click + New client secret.

-
Enter a description (e.g.,
MySecretKey) and set expiration. - Click Add.
π€ Information to Provide to AirMDR
- Go to Azure Portal β Entra ID.
- Click App registrations and select your registered app.
- Under the Overview section, locate the Application (client) ID and Tenant ID (Directory ID).
- Click the Copy icon π next to the Client ID, and the Tenant ID respectively.
Securely share the Client (Application) ID, Tenant ID, Client Secret Value, Secret ID, Certificate Thumbprint, and the Tenant Domain (Organization) to AirMDR.
| Field | Description |
|---|---|
| Client (Application) ID and Tenant ID | Found under the Overview section of the registered Azure AD app |
| Certificate Thumbprint | Found in the Certificates & Secrets tab after uploading the certificate |
| Tenant Domain (Organization) | Usually in the form <yourcompany>.onmicrosoft.com (e.g., foundationcap.onmicrosoft.com) |
| Client Secret Value andSecret ID | Client Secret Value andSecret ID securely saved earlier for Authentication |
Example:
For a customer like FCAP, the domain wasfoundationcap.onmicrosoft.com. The.onmicrosoft.comsuffix is common across tenants.
If you need assistance during this process, contact AirMDR support.
πΌ AirMDR Internal Requirements
Once credentials are received:- AirMDR will create a connection in the Connection Manager using:
Provider type: Microsoft- The credentials listed above
- Access is used only for retrieving quarantined emails via Microsoft Graph or Defender APIs
π Future Automation
Once AirMDR agents are deployed to the customerβs remote infrastructure:- The current Powersheller instance used to perform these operations can be deprecated.
- The onboarding steps (like certificate auth and quarantine sync) will be handled directly by remote agents.
This ensures full automation, scalability, and centralized control without requiring manual setup steps on an ongoing basis.
π Security & Access Best Practices
- β Certificate-based auth ensures non-password-based secure access
- β Permissions are application-only and limited to read quarantine info

