You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/stix-objects-api.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,13 @@ author: austinmccollum
6
6
ms.topic: reference
7
7
ms.date: 05/30/2024
8
8
ms.author: austinmc
9
+
appliesto:
10
+
- Microsoft Sentinel in the Azure portal
9
11
---
10
12
11
13
# Import threat intelligence to Microsoft Sentinel with the STIX objects API (Preview)
12
14
13
-
Import indicators of compromise and other STIX domain objects to use in Microsoft Sentinel workspace with the STIX objects API. Whether you're using a threat intelligence platform or a custom application, use this document as a supplemental reference to the instructions in the [Microsoft Sentinel STIX objects API data connector](connect-threat-intelligence-upload-api.md). Installing the data connector isn't required to connect to the API.
15
+
Import threat intelligence to use in Microsoft Sentinel with the STIX objects API. Whether you're using a threat intelligence platform or a custom application, use this document as a supplemental reference to the instructions in the [Microsoft Sentinel STIX objects API data connector](connect-threat-intelligence-upload-api.md). Installing the data connector isn't required to connect to the API. The threat intelligence you can import includes indicators of compromise and other STIX domain objects.
14
16
15
17
> [!IMPORTANT]
16
18
> This API is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -94,6 +96,8 @@ Create the array of STIX objects using the STIX format specification. Some of th
94
96
95
97
#### Common properties
96
98
99
+
All the objects you import with the STIX objects API share these common properties.
100
+
97
101
|Property Name |Type | Description |
98
102
|----|----|----|
99
103
|`id` (required)| string | An ID used to identify the indicator. See section [2.9](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_64yvzeku5a5c) for specifications on how to create an `id`. The format looks something like `indicator--<UUID>`|
description: Understand how threat intelligence feeds are connected to, managed, and used in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
5
5
author: austinmccollum
6
-
ms.topic: concept
7
-
ms.date: 5/30/2024
6
+
ms.topic: conceptual
7
+
ms.date: 6/10/2024
8
8
ms.author: austinmc
9
9
appliesto:
10
10
- Microsoft Sentinel in the Azure portal
@@ -26,7 +26,7 @@ For SIEM solutions like Microsoft Sentinel, the most common forms of CTI are thr
26
26
27
27
Integrate threat intelligence (TI) into Microsoft Sentinel through the following activities:
28
28
29
-
-**Import threat intelligence** into Microsoft Sentinel by enabling **data connectors**to various TI [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
29
+
-**Import threat intelligence** into Microsoft Sentinel by enabling **data connectors**or using the STIX objects API to connect various TI [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
30
30
31
31
-**View and manage** the imported threat intelligence in **Logs** and in the **Threat Intelligence** blade of Microsoft Sentinel.
32
32
@@ -42,14 +42,14 @@ Threat Intelligence also provides useful context within other Microsoft Sentinel
42
42
43
43
## Import threat intelligence with data connectors
44
44
45
-
Just like all the other event data in Microsoft Sentinel, threat indicators are imported using data connectors. Here are the data connectors in Microsoft Sentinel provided specifically for threat indicators.
45
+
Most threat intelligence is imported using data connectors or an API. Here are the solutions available for Microsoft Sentinel.
46
46
47
47
-**Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat indicators
48
-
-**Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds and
49
-
-**Threat Intelligence upload indicators API** for integrated and curated TI feeds using a REST API to connect
48
+
-**Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds
49
+
-**Threat Intelligence STIX objects API** for integrated and curated TI feeds using a REST API to connect
50
50
-**Threat Intelligence Platform data connector** also connects TI feeds using a REST API, but is on the path for deprecation
51
51
52
-
Use any of these data connectors in any combination together, depending on where your organization sources threat indicators. All three of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
52
+
Use any of these solutions in any combination together, depending on where your organization sources threat intelligence. All three of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
53
53
54
54
Also, see this catalog of [threat intelligence integrations](threat-intelligence-integration.md) available with Microsoft Sentinel.
55
55
@@ -74,7 +74,7 @@ For more information, see [Connect your threat intelligence platform using STIX
74
74
75
75
### Add threat indicators to Microsoft Sentinel with the Threat Intelligence Platforms data connector
76
76
77
-
Much like the existing upload indicators API data connector, the **Threat Intelligence Platform data connector** uses an API allowing your TIP or custom solution to send indicators into Microsoft Sentinel. However, this data connector is now on a path for deprecation. We recommend new solutions to take advantage of the optimizations the upload indicators API has to offer.
77
+
this data connector is now on a path for deprecation. Much like the existing STIX objects API, the **Threat Intelligence Platform data connector** uses an API allowing your TIP or custom solution to send indicators into Microsoft Sentinel. So, we recommend new solutions to take advantage of the optimizations the STIX objects API has to offer.
78
78
79
79
The TIP data connector works with the [Microsoft Graph Security tiIndicators API](/graph/api/resources/tiindicator). It can also be used by any custom threat intelligence platform that communicates with the tiIndicators API to send indicators to Microsoft Sentinel (and to other Microsoft security solutions like Microsoft Defender XDR).
0 commit comments