Skip to content

Commit 073c1f0

Browse files
committed
edit pass: sentinel-threat-intelligence-batch2
1 parent 2930730 commit 073c1f0

File tree

2 files changed

+59
-63
lines changed

2 files changed

+59
-63
lines changed

articles/sentinel/connect-threat-intelligence-taxii.md

Lines changed: 24 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect to STIX/TAXII threat intelligence feeds
33
titleSuffix: Microsoft Sentinel
4-
description: Learn about how to connect Microsoft Sentinel to industry-standard threat intelligence feeds to import threat indicators.
4+
description: Learn how to connect Microsoft Sentinel to industry-standard threat intelligence feeds to import threat indicators.
55
author: austinmccollum
66
ms.topic: how-to
77
ms.date: 3/14/2024
@@ -10,36 +10,37 @@ appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
- Microsoft Sentinel in the Microsoft Defender portal
1212
ms.collection: usx-security
13-
#customer intent: As a SOC admin, I want to connect Microsoft Sentinel to a STIX/TAXII feed to ingest threat intelligence, so I can generate alerts incidents.
13+
#customer intent: As an SOC admin, I want to connect Microsoft Sentinel to a STIX/TAXII feed to ingest threat intelligence so that I can generate alert incidents.
1414
---
1515

1616
# Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds
1717

18-
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the **Threat Intelligence - TAXII data connector** to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
18+
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the Threat intelligence - TAXII data connector to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
1919

20-
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-taxii-import-path.png" alt-text="TAXII import path":::
20+
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-taxii-import-path.png" alt-text="Screenshot that shows a TAXII import path.":::
2121

22-
To import STIX formatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API Root and Collection ID, and then enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel.
22+
To import STIX-formatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API root and collection ID. Then you enable the Threat intelligence - TAXII data connector in Microsoft Sentinel.
2323

24-
Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that can be integrated with Microsoft Sentinel.
24+
Learn more about [threat intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that you can integrate with Microsoft Sentinel.
2525

2626
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2727

28+
For more information, see [Connect your threat intelligence platform (TIP) to Microsoft Sentinel](connect-threat-intelligence-tip.md).
29+
2830
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2931

30-
**See also**: [Connect your threat intelligence platform (TIP) to Microsoft Sentinel](connect-threat-intelligence-tip.md)
32+
## Prerequisites
3133

32-
## Prerequisites
33-
- In order to install, update and delete standalone content or solutions in content hub, you need the **Microsoft Sentinel Contributor** role at the resource group level.
34+
- To install, update and delete standalone content or solutions in the **Content hub**, you need the Microsoft Sentinel Contributor role at the resource group level.
3435
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
35-
- You must have a TAXII 2.0 or TAXII 2.1 **API Root URI** and **Collection ID**.
36+
- You must have a TAXII 2.0 or TAXII 2.1 API root URI and collection ID.
3637

37-
## Get the TAXII server API Root and Collection ID
38+
## Get the TAXII server API root and collection ID
3839

39-
TAXII 2.x servers advertise API Roots, which are URLs that host Collections of threat intelligence. You can usually find the API Root and the Collection ID in the documentation pages of the threat intelligence provider hosting the TAXII server.
40+
TAXII 2.x servers advertise API roots, which are URLs that host collections of threat intelligence. You can usually find the API root and the collection ID in the documentation pages of the threat intelligence provider that hosts the TAXII server.
4041

4142
> [!NOTE]
42-
> In some cases, the provider will only advertise a URL called a Discovery Endpoint. You can use the [cURL](https://en.wikipedia.org/wiki/CURL) utility to browse the discovery endpoint and request the API Root.
43+
> In some cases, the provider only advertises a URL called a discovery endpoint. You can use the [cURL](https://en.wikipedia.org/wiki/CURL) utility to browse the discovery endpoint and request the API root.
4344
4445
## Install the Threat Intelligence solution in Microsoft Sentinel
4546

@@ -55,27 +56,25 @@ For more information about how to manage the solution components, see [Discover
5556

5657
## Enable the Threat intelligence - TAXII data connector
5758

58-
1. To configure the TAXII data connector, select the **Data connectors** menu.
59+
1. To configure the TAXII data connector, select the **Data connectors** menu.
5960

60-
1. Find and select the **Threat Intelligence - TAXII** data connector > **Open connector page** button.
61+
1. Find and select the **Threat intelligence - TAXII** data connector and then select **Open connector page**.
6162

62-
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
63+
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot that shows the Data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
6364

64-
1. Enter a **friendly name** for this TAXII server Collection, the **API Root URL**, the **Collection ID**, a **Username** (if required), and a **Password** (if required), and choose the group of indicators and the polling frequency you want. Select the **Add** button.
65+
1. Enter a name for this TAXII server collection in the **Friendly name** text box. Fill in the text boxes for **API root URL**, **Collection ID**, **Username** (if necessary), and **Password** (if necessary). Choose the group of indicators and the polling frequency you want. Select **Add**.
6566

66-
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-configure-taxii-servers.png" alt-text="Configure TAXII servers":::
67+
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-configure-taxii-servers.png" alt-text="Screenshot that shows configuring TAXII servers.":::
6768

68-
You should receive confirmation that a connection to the TAXII server was established successfully, and you may repeat the last step above as many times as you want, to connect to multiple Collections from one or more TAXII servers.
69-
70-
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. You can find the new indicators in the **Threat intelligence** blade, accessible from the Microsoft Sentinel navigation menu.
69+
You should receive confirmation that a connection to the TAXII server was established successfully. Repeat the last step as many times as you want to connect to multiple collections from one or more TAXII servers.
7170

71+
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. Find the new indicators on the **Threat intelligence** pane. You can access it from the Microsoft Sentinel menu.
7272

73-
## IP allow listing for the Microsoft Sentinel TAXII client
73+
## IP allowlisting for the Microsoft Sentinel TAXII client
7474

7575
Some TAXII servers, like FS-ISAC, have a requirement to keep the IP addresses of the Microsoft Sentinel TAXII client on the allowlist. Most TAXII servers don't have this requirement.
7676

77-
When relevant, the following IP addresses are those to include in your allowlist:
78-
77+
When relevant, the following IP addresses are the addresses to include in your allowlist:
7978

8079
:::row:::
8180
:::column span="":::
@@ -104,10 +103,9 @@ When relevant, the following IP addresses are those to include in your allowlist
104103
:::column-end:::
105104
:::row-end:::
106105

107-
108106
## Related content
109107

110-
In this document, you learned how to connect Microsoft Sentinel to threat intelligence feeds using the TAXII protocol. To learn more about Microsoft Sentinel, see the following articles.
108+
In this article, you learned how to connect Microsoft Sentinel to threat intelligence feeds by using the TAXII protocol. To learn more about Microsoft Sentinel, see the following articles:
111109

112110
- Learn how to [get visibility into your data and potential threats](get-visibility.md).
113111
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).

0 commit comments

Comments
 (0)