You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-threat-intelligence-taxii.md
+24-26Lines changed: 24 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Connect to STIX/TAXII threat intelligence feeds
3
3
titleSuffix: Microsoft Sentinel
4
-
description: Learn about how to connect Microsoft Sentinel to industry-standard threat intelligence feeds to import threat indicators.
4
+
description: Learn how to connect Microsoft Sentinel to industry-standard threat intelligence feeds to import threat indicators.
5
5
author: austinmccollum
6
6
ms.topic: how-to
7
7
ms.date: 3/14/2024
@@ -10,36 +10,37 @@ appliesto:
10
10
- Microsoft Sentinel in the Azure portal
11
11
- Microsoft Sentinel in the Microsoft Defender portal
12
12
ms.collection: usx-security
13
-
#customer intent: As a SOC admin, I want to connect Microsoft Sentinel to a STIX/TAXII feed to ingest threat intelligence, so I can generate alerts incidents.
13
+
#customer intent: As an SOC admin, I want to connect Microsoft Sentinel to a STIX/TAXII feed to ingest threat intelligence so that I can generate alert incidents.
14
14
---
15
15
16
16
# Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds
17
17
18
-
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the **Threat Intelligence - TAXII data connector** to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
18
+
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the Threat intelligence - TAXII data connector to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-taxii-import-path.png" alt-text="Screenshot that shows a TAXII import path.":::
21
21
22
-
To import STIXformatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API Root and Collection ID, and then enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel.
22
+
To import STIX-formatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API root and collection ID. Then you enable the Threat intelligence - TAXII data connector in Microsoft Sentinel.
23
23
24
-
Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that can be integrated with Microsoft Sentinel.
24
+
Learn more about [threat intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that you can integrate with Microsoft Sentinel.
**See also**: [Connect your threat intelligence platform (TIP) to Microsoft Sentinel](connect-threat-intelligence-tip.md)
32
+
## Prerequisites
31
33
32
-
## Prerequisites
33
-
- In order to install, update and delete standalone content or solutions in content hub, you need the **Microsoft Sentinel Contributor** role at the resource group level.
34
+
- To install, update and delete standalone content or solutions in the **Content hub**, you need the Microsoft Sentinel Contributor role at the resource group level.
34
35
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
35
-
- You must have a TAXII 2.0 or TAXII 2.1 **API Root URI** and **Collection ID**.
36
+
- You must have a TAXII 2.0 or TAXII 2.1 API root URI and collection ID.
36
37
37
-
## Get the TAXII server API Root and Collection ID
38
+
## Get the TAXII server API root and collection ID
38
39
39
-
TAXII 2.x servers advertise API Roots, which are URLs that host Collections of threat intelligence. You can usually find the API Root and the Collection ID in the documentation pages of the threat intelligence provider hosting the TAXII server.
40
+
TAXII 2.x servers advertise API roots, which are URLs that host collections of threat intelligence. You can usually find the API root and the collection ID in the documentation pages of the threat intelligence provider that hosts the TAXII server.
40
41
41
42
> [!NOTE]
42
-
> In some cases, the provider will only advertise a URL called a Discovery Endpoint. You can use the [cURL](https://en.wikipedia.org/wiki/CURL) utility to browse the discovery endpoint and request the API Root.
43
+
> In some cases, the provider only advertises a URL called a discovery endpoint. You can use the [cURL](https://en.wikipedia.org/wiki/CURL) utility to browse the discovery endpoint and request the API root.
43
44
44
45
## Install the Threat Intelligence solution in Microsoft Sentinel
45
46
@@ -55,27 +56,25 @@ For more information about how to manage the solution components, see [Discover
55
56
56
57
## Enable the Threat intelligence - TAXII data connector
57
58
58
-
1. To configure the TAXII data connector, select the **Data connectors** menu.
59
+
1. To configure the TAXII data connector, select the **Data connectors** menu.
59
60
60
-
1. Find and select the **Threat Intelligence - TAXII** data connector > **Open connector page** button.
61
+
1. Find and select the **Threat intelligence - TAXII** data connector and then select **Open connector page**.
61
62
62
-
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
63
+
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot that shows the Data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
63
64
64
-
1. Enter a **friendly name** for this TAXII server Collection, the **API Root URL**, the **Collection ID**, a **Username** (if required), and a **Password** (if required), and choose the group of indicators and the polling frequency you want. Select the **Add** button.
65
+
1. Enter a name for this TAXII server collection in the **Friendly name** text box. Fill in the text boxes for **API root URL**, **Collection ID**, **Username** (if necessary), and **Password** (if necessary). Choose the group of indicators and the polling frequency you want. Select **Add**.
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-configure-taxii-servers.png" alt-text="Screenshot that shows configuring TAXII servers.":::
67
68
68
-
You should receive confirmation that a connection to the TAXII server was established successfully, and you may repeat the last step above as many times as you want, to connect to multiple Collections from one or more TAXII servers.
69
-
70
-
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. You can find the new indicators in the **Threat intelligence** blade, accessible from the Microsoft Sentinel navigation menu.
69
+
You should receive confirmation that a connection to the TAXII server was established successfully. Repeat the last step as many times as you want to connect to multiple collections from one or more TAXII servers.
71
70
71
+
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. Find the new indicators on the **Threat intelligence** pane. You can access it from the Microsoft Sentinel menu.
72
72
73
-
## IP allow listing for the Microsoft Sentinel TAXII client
73
+
## IP allowlisting for the Microsoft Sentinel TAXII client
74
74
75
75
Some TAXII servers, like FS-ISAC, have a requirement to keep the IP addresses of the Microsoft Sentinel TAXII client on the allowlist. Most TAXII servers don't have this requirement.
76
76
77
-
When relevant, the following IP addresses are those to include in your allowlist:
78
-
77
+
When relevant, the following IP addresses are the addresses to include in your allowlist:
79
78
80
79
:::row:::
81
80
:::column span="":::
@@ -104,10 +103,9 @@ When relevant, the following IP addresses are those to include in your allowlist
104
103
:::column-end:::
105
104
:::row-end:::
106
105
107
-
108
106
## Related content
109
107
110
-
In this document, you learned how to connect Microsoft Sentinel to threat intelligence feeds using the TAXII protocol. To learn more about Microsoft Sentinel, see the following articles.
108
+
In this article, you learned how to connect Microsoft Sentinel to threat intelligence feeds by using the TAXII protocol. To learn more about Microsoft Sentinel, see the following articles:
111
109
112
110
- Learn how to [get visibility into your data and potential threats](get-visibility.md).
113
111
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
0 commit comments