Skip to content

Commit 7f781c9

Browse files
authored
Merge pull request #276489 from austinmccollum/austinmc-stix-api
create new stix objects api article
2 parents 5eb0e75 + 27cc6e5 commit 7f781c9

File tree

8 files changed

+654
-82
lines changed

8 files changed

+654
-82
lines changed

articles/sentinel/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -780,7 +780,7 @@
780780
href: threat-intelligence-integration.md
781781
- name: Enable MDTI data connector
782782
href: connect-mdti-data-connector.md
783-
- name: Connect threat intelligence upload API
783+
- name: Connect threat intelligence STIX objects API
784784
href: connect-threat-intelligence-upload-api.md
785785
- name: Connect threat intelligence platforms
786786
href: connect-threat-intelligence-tip.md
@@ -1253,7 +1253,9 @@
12531253
href: hunting-with-rest-api.md
12541254
- name: Enrich entities with geolocation data with REST-API
12551255
href: geolocation-data-api.md
1256-
- name: Upload indicator API reference
1256+
- name: STIX objects API reference
1257+
href: stix-objects-api.md
1258+
- name: Legacy upload indicator API reference
12571259
href: upload-indicators-api.md
12581260
- name: Compare playbooks, workbooks, and notebooks
12591261
href: resources.md

articles/sentinel/connect-threat-intelligence-upload-api.md

Lines changed: 16 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
2-
title: Connect your TIP with upload indicators API
2+
title: Connect your TIP with STIX objects API
33
titleSuffix: Microsoft Sentinel
4-
description: Learn how to connect your threat intelligence platform or custom feed by using the Upload Indicators API to Microsoft Sentinel.
4+
5+
description: Learn how to connect your threat intelligence platform (TIP) or custom feed using the STIX objects API to Microsoft Sentinel.
56
author: austinmccollum
67
ms.topic: how-to
78
ms.date: 3/14/2024
@@ -10,41 +11,35 @@ appliesto:
1011
- Microsoft Sentinel in the Azure portal
1112
- Microsoft Sentinel in the Microsoft Defender portal
1213
ms.collection: usx-security
13-
14-
1514
#Customer intent: As a security admin, I want to connect my threat intelligence platform with Microsoft Sentinel using the appropriate API so that I can centralize and enhance threat detection and response capabilities.
16-
1715
---
1816

19-
# Connect your threat intelligence platform to Microsoft Sentinel with the Upload Indicators API
17+
# Connect your threat intelligence platform to Microsoft Sentinel with the STIX objects API
2018

21-
Many organizations use threat intelligence platform (TIP) solutions to aggregate threat indicator feeds from various sources. From the aggregated feed, the data is curated to apply to security solutions such as network devices, EDR/XDR solutions, or security information and event management (SIEM) solutions such as Microsoft Sentinel. By using the Threat Intelligence Upload Indicators API, you can use these solutions to import threat indicators into Microsoft Sentinel.
19+
Many organizations use threat intelligence platform (TIP) solutions to aggregate threat intelligence feeds from various sources. From the aggregated feed, the data is curated to apply to security solutions such as network devices, EDR/XDR solutions, or security information and event management (SIEM) solutions such as Microsoft Sentinel. The industry standard for describing cyberthreat information is called, "Structured Threat Information Expression" or STIX. By using the STIX objects API, you use an expressive way to import threat intelligence into Microsoft Sentinel.
2220

23-
The Upload Indicators API ingests threat intelligence indicators into Microsoft Sentinel without the need for the data connector. The data connector only mirrors the instructions for connecting to the API endpoint described in this article and the API reference document [Microsoft Sentinel Upload Indicators API](upload-indicators-api.md).
21+
The STIX objects API ingests threat intelligence into Microsoft Sentinel without the need for a data connector. This article describes what you need to connect. For more information on the API details, see the reference document [Microsoft Sentinel STIX objects API](stix-objects-api.md).
2422

25-
:::image type="content" source="media/connect-threat-intelligence-upload-api/threat-intel-upload-api.png" alt-text="Screenshot that shows the threat intelligence import path.":::
23+
:::image type="content" source="media/connect-threat-intelligence-upload-api/threat-intel-stix-objects-api.png" alt-text="Screenshot that shows the threat intelligence import path.":::
2624

2725
For more information about threat intelligence, see [Threat intelligence](understand-threat-intelligence.md).
2826

2927
> [!IMPORTANT]
30-
> The Microsoft Sentinel Threat Intelligence Upload Indicators API is in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for more legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
28+
> The Microsoft Sentinel threat intelligence STIX objects API is in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for more legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
3129
>
3230
> [!INCLUDE [unified-soc-preview-without-alert](includes/unified-soc-preview-without-alert.md)]
3331
34-
For more information, see [Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds](connect-threat-intelligence-taxii.md).
35-
3632
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
3733

3834
## Prerequisites
3935

40-
- To install, update, and delete standalone content or solutions in the **Content hub**, you need the Microsoft Sentinel Contributor role at the resource group level. You don't need to install the data connector to use the API endpoint.
41-
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
36+
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat intelligence STIX objects.
4237
- You must be able to register a Microsoft Entra application.
4338
- Your Microsoft Entra application must be granted the Microsoft Sentinel Contributor role at the workspace level.
4439

4540
## Instructions
4641

47-
Follow these steps to import threat indicators to Microsoft Sentinel from your integrated TIP or custom threat intelligence solution:
42+
Follow these steps to import threat intelligence STIX objects to Microsoft Sentinel from your integrated TIP or custom threat intelligence solution:
4843

4944
1. Register a Microsoft Entra application, and then record its application ID.
5045
1. Generate and record a client secret for your Microsoft Entra application.
@@ -65,17 +60,9 @@ For more information on registering your Microsoft Entra application, see [Regis
6560

6661
After you register your application, record its application (client) ID from the application's **Overview** tab.
6762

68-
## Generate and record a client secret
69-
70-
Now that your application is registered, generate and record a client secret.
71-
72-
:::image type="content" source="media/connect-threat-intelligence-upload-api/threat-intel-client-secret.png" alt-text="Screenshot that shows client secret generation.":::
73-
74-
For more information on generating a client secret, see [Add a client secret](../active-directory/develop/quickstart-register-app.md#add-a-client-secret).
75-
7663
## Assign a role to the application
7764

78-
The Upload Indicators API ingests threat indicators at the workspace level and allows a least-privilege role of Microsoft Sentinel Contributor.
65+
The STIX objects API ingests threat intelligence objects at the workspace level and requires the role of Microsoft Sentinel Contributor.
7966

8067
1. From the Azure portal, go to **Log Analytics workspaces**.
8168
1. Select **Access control (IAM)**.
@@ -90,41 +77,22 @@ The Upload Indicators API ingests threat indicators at the workspace level and a
9077

9178
For more information on assigning roles to applications, see [Assign a role to the application](../active-directory/develop/howto-create-service-principal-portal.md#assign-a-role-to-the-application).
9279

93-
## Install the Threat Intelligence Upload Indicators API data connector in Microsoft Sentinel (optional)
94-
95-
Install the Threat Intelligence Upload Indicators API data connector to see the API connection instructions from your Microsoft Sentinel workspace.
96-
97-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**. <br>For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Content management** > **Content hub**.
98-
99-
1. Find and select the **Threat Intelligence** solution.
100-
101-
1. Select the :::image type="icon" source="media/connect-mdti-data-connector/install-update-button.png"::: **Install/Update** button.
102-
103-
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](sentinel-solutions-deploy.md).
104-
105-
1. The data connector is now visible in **Configuration** > **Data connectors**. Open the **Data connectors** page to find more information on how to configure your application with this API.
106-
107-
:::image type="content" source="media/connect-threat-intelligence-upload-api/upload-api-data-connector.png" alt-text="Screenshot that shows the Data connectors page with the Upload Indicators API data connector listed." lightbox="media/connect-threat-intelligence-upload-api/upload-api-data-connector.png":::
108-
10980
## Configure your threat intelligence platform solution or custom application
11081

111-
The following configuration information is required by the Upload Indicators API:
82+
The following configuration information is required by the STIX objects API:
11283

11384
- Application (client) ID
114-
- Client secret
85+
- Microsoft Entra access token with [OAuth 2.0 authentication](../active-directory/fundamentals/auth-oauth2.md)
11586
- Microsoft Sentinel workspace ID
11687

11788
Enter these values in the configuration of your integrated TIP or custom solution where required.
11889

119-
1. Submit the indicators to the Microsoft Sentinel Upload Indicators API. To learn more about the Upload Indicators API, see [Microsoft Sentinel Upload Indicators API](upload-indicators-api.md).
120-
1. Within a few minutes, threat indicators should begin flowing into your Microsoft Sentinel workspace. Find the new indicators on the **Threat intelligence** pane, which is accessible from the Microsoft Sentinel menu.
121-
1. The data connector status reflects the **Connected** status. The **Data received** graph is updated after indicators are submitted successfully.
122-
123-
:::image type="content" source="media/connect-threat-intelligence-upload-api/upload-api-data-connector-connected.png" alt-text="Screenshot that shows the Upload Indicators API data connector in the Connected state." lightbox="media/connect-threat-intelligence-upload-api/upload-api-data-connector-connected.png":::
90+
1. Submit the threat intelligence to the STIX objects API. For more information, see [Microsoft Sentinel STIX objects API](stix-objects-api.md).
91+
1. Within a few minutes, threat intelligence objects should begin flowing into your Microsoft Sentinel workspace. Find the new STIX objects on the **Threat intelligence** page, which is accessible from the Microsoft Sentinel menu.
12492

12593
## Related content
12694

127-
In this article, you learned how to connect your TIP to Microsoft Sentinel. To learn more about using threat indicators in Microsoft Sentinel, see the following articles:
95+
In this article, you learned how to connect your TIP to Microsoft Sentinel. To learn more about using threat intelligence in Microsoft Sentinel, see the following articles:
12896

12997
- [Understand threat intelligence](understand-threat-intelligence.md).
13098
- [Work with threat indicators](work-with-threat-indicators.md) throughout the Microsoft Sentinel experience.
2.44 KB
Loading
19.5 KB
Loading
11.3 KB
Loading

0 commit comments

Comments
 (0)