You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Learn how to ingest Microsoft's threat intelligence into your Sentinel workspace to generate high fidelity alerts and incidents.
5
6
author: austinmccollum
6
7
ms.topic: how-to
7
-
ms.date: 3/14/2024
8
+
ms.date: 8/16/2024
8
9
ms.author: austinmc
9
10
appliesto:
10
11
- Microsoft Sentinel in the Azure portal
@@ -14,19 +15,21 @@ ms.collection: usx-security
14
15
---
15
16
16
17
# Enable data connector for Microsoft Defender Threat Intelligence
17
-
Bring high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace. The MDTI data connector ingests these IOCs with a simple one-click setup. Then monitor, alert and hunt based on the threat intelligence in the same way you utilize other feeds.
18
+
Bring public, open source and high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace with the MDTI data connectors. With a simple one-click setup, use the TI from the standard and premium MDTI data connectors to monitor, alert and hunt.
18
19
19
20
> [!IMPORTANT]
20
-
> The Microsoft Defender Threat Intelligence data connector is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21
+
> The Microsoft Defender Threat Intelligence data connector and the Premium Microsoft Defender Threat Intelligence data connector are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
For more information about the benefits of the standard and premium MDTI data connectors, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-indicators-to-microsoft-sentinel-with-the-microsoft-defender-threat-intelligence-data-connector).
25
+
23
26
## Prerequisites
24
27
- In order to install, update and delete standalone content or solutions in content hub, you need the **Microsoft Sentinel Contributor** role at the resource group level.
25
-
- To configure this data connector, you must have read and write permissions to the Microsoft Sentinel workspace.
28
+
- To configure these data connectors, you must have read and write permissions to the Microsoft Sentinel workspace.
26
29
27
30
## Install the Threat Intelligence solution in Microsoft Sentinel
28
31
29
-
To import threat indicators into Microsoft Sentinel from MDTI, follow these steps:
32
+
To import threat indicators into Microsoft Sentinel from standard and premium MDTI, follow these steps:
30
33
31
34
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**. <br>For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Content management** > **Content hub**.
32
35
@@ -42,22 +45,22 @@ For more information about how to manage the solution components, see [Discover
42
45
43
46
1. Find and select the Microsoft Defender Threat Intelligence data connector > **Open connector page** button.
44
47
45
-
:::image type="content" source="media/connect-mdti-data-connector/mdti-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the MDTI data connector listed." lightbox="media/connect-mdti-data-connector/mdti-data-connector-config.png":::
48
+
:::image type="content" source="media/connect-mdti-data-connector/premium-microsoft-defender-threat-intelligence-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the MDTI data connector listed." lightbox="media/connect-mdti-data-connector/premium-microsoft-defender-threat-intelligence-data-connector-config.png":::
46
49
47
50
1. Enable the feed by selecting the **Connect** button
48
51
49
-
:::image type="content" source="media/connect-mdti-data-connector/mdti-data-connector-connect.png" alt-text="Screenshot displaying the MDTI data connector page and the connect button." lightbox="media/connect-mdti-data-connector/mdti-data-connector-connect.png":::
52
+
:::image type="content" source="media/connect-mdti-data-connector/microsoft-defender-threat-intelligence-data-connector-connect.png" alt-text="Screenshot displaying the MDTI data connector page and the connect button." lightbox="media/connect-mdti-data-connector/microsoft-defender-threat-intelligence-data-connector-connect.png":::
50
53
51
54
1. When MDTI indicators start populating the Microsoft Sentinel workspace, the connector status displays **Connected**.
52
55
53
56
At this point, the ingested indicators are now available for use in the *TI map...* analytics rules. For more information, see [Use threat indicators in analytics rules](use-threat-indicators-in-analytics-rules.md).
54
57
55
-
You can find the new indicators in the **Threat intelligence** blade or directly in **Logs** by querying the **ThreatIntelligenceIndicator** table. For more information, see [Work with threat indicators](work-with-threat-indicators.md).
58
+
Find the new indicators in the **Threat intelligence** blade or directly in **Logs** by querying the **ThreatIntelligenceIndicator** table. For more information, see [Work with threat indicators](work-with-threat-indicators.md).
56
59
57
60
## Related content
58
61
59
62
In this document, you learned how to connect Microsoft Sentinel to Microsoft's threat intelligence feed with the MDTI data connector. To learn more about Microsoft Defender for Threat Intelligence see the following articles.
60
63
61
64
- Learn about [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
62
-
- Get started with the MDTI community portal [MDTI portal](https://ti.defender.microsoft.com).
65
+
- Get started with the MDTI portal [MDTI portal](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal).
63
66
- Use MDTI in analytics [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md).
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Sentinel
4
4
description: Understand how threat intelligence feeds are connected to, managed, and used in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
5
5
author: austinmccollum
6
6
ms.topic: concept-article
7
-
ms.date: 3/06/2024
7
+
ms.date: 8/16/2024
8
8
ms.author: austinmc
9
9
appliesto:
10
10
- Microsoft Sentinel in the Azure portal
@@ -44,7 +44,8 @@ Threat Intelligence also provides useful context within other Microsoft Sentinel
44
44
45
45
Just like all the other event data in Microsoft Sentinel, threat indicators are imported using data connectors. Here are the data connectors in Microsoft Sentinel provided specifically for threat indicators.
46
46
47
-
-**Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat indicators
47
+
-**Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat indicators
48
+
-**Premium Microsoft Defender Threat Intelligence data connector** to ingest MDTI's premium intelligence feed
48
49
-**Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds
49
50
-**Threat Intelligence upload indicators API** for integrated and curated TI feeds using a REST API to connect
50
51
-**Threat Intelligence Platform data connector** also connects TI feeds using a REST API, but is on the path for deprecation
@@ -55,9 +56,22 @@ Also, see this catalog of [threat intelligence integrations](threat-intelligence
55
56
56
57
### Add threat indicators to Microsoft Sentinel with the Microsoft Defender Threat Intelligence data connector
57
58
58
-
Bring high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace. The MDTI data connector ingests these IOCs with a simple one-click setup. Then monitor, alert and hunt based on the threat intelligence in the same way you utilize other feeds.
59
+
Bring public, open source and high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace with the MDTI data connectors. With a simple one-click setup, use the TI from the standard and premium MDTI data connectors to monitor, alert and hunt.
59
60
60
-
For more information on MDTI data connector, see [Enable MDTI data connector](connect-mdti-data-connector.md).
61
+
The freely available MDTI threat analytics rule gives you a taste of what the premium MDTI data connector provides. However with matching analytics, only indicators that match the rule are actually ingested into your environment. The premium MDTI data connector brings the premium TI and allows analytics for more data sources with greater flexibility and understanding of that threat intelligence. Here's a table showing what to expect when you license and enable the premium MDTI data connector.
62
+
63
+
| Free | Premium |
64
+
|----|----|
65
+
| Public indicators of compromise (IOCs) ||
66
+
| Open-source intelligence (OSINT) ||
67
+
|| Microsoft IOCs |
68
+
|| Microsoft-enriched OSINT |
69
+
70
+
For more information see the following articles:
71
+
- To learn how to get a premium license and explore all the differences between the standard and premium versions, see the [Microsoft Defender Threat Intelligence product page](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-threat-intelligence).
72
+
- To learn more about the free MDTI experience, see [Introducing MDTI free experience for Microsoft Defender XDR](https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-mdti-free-experience-for-microsoft-defender-xdr/ba-p/3976635).
73
+
- To learn how to enable the MDTI and the PMDTI data connectors, see [Enable MDTI data connector](connect-mdti-data-connector.md).
74
+
- To learn about matching analytics, see [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md).
61
75
62
76
### Add threat indicators to Microsoft Sentinel with the Threat Intelligence Upload Indicators API data connector
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,18 @@ The listed features were released in the last three months. For information abou
20
20
21
21
## August 2024
22
22
23
+
-[Premium Microsoft Defender Threat Intelligence data connector (Preview)](#premium-microsoft-defender-threat-intelligence-data-connector-preview)
23
24
-[Unified AMA-based connectors for syslog ingestion](#unified-ama-based-connectors-for-syslog-ingestion)
24
25
-[Better visibility for Windows security events](#better-visibility-for-windows-security-events)
25
26
-[New Auxiliary logs retention plan (Preview)](#new-auxiliary-logs-retention-plan-preview)
26
27
-[Create summary rules for large sets of data (Preview)](#create-summary-rules-in-microsoft-sentinel-for-large-sets-of-data-preview)
27
28
29
+
### Premium Microsoft Defender Threat Intelligence data connector (Preview)
30
+
31
+
Your premium license for Microsoft Defender Threat Intelligence (MDTI) now unlocks the ability to ingest all premium indicators directly into your workspace. The premium MDTI data connector adds more to your hunting and research capabilities within Microsoft Sentinel.
32
+
33
+
For more information, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-indicators-to-microsoft-sentinel-with-the-microsoft-defender-threat-intelligence-data-connector).
34
+
28
35
### Unified AMA-based connectors for syslog ingestion
29
36
30
37
With the impending retirement of the Log Analytics Agent, Microsoft Sentinel has consolidated the collection and ingestion of syslog, CEF, and custom-format log messages into three multi-purpose data connectors based on the Azure Monitor Agent (AMA):
0 commit comments