Skip to content

Commit 9d0fa0f

Browse files
authored
Merge pull request #232465 from austinmccollum/austinmc-concept-ti
Austinmc concept ti
2 parents e7515c4 + 2698595 commit 9d0fa0f

File tree

3 files changed

+29
-11
lines changed

3 files changed

+29
-11
lines changed
363 Bytes
Loading

articles/sentinel/threat-intelligence-integration.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,19 @@ title: Threat intelligence integration in Microsoft Sentinel
33
description: Learn about the different ways threat intelligence feeds are integrated with and used by Microsoft Sentinel.
44
author: austinmccollum
55
ms.topic: conceptual
6-
ms.date: 9/26/2022
6+
ms.date: 3/28/2022
77
ms.author: austinmc
88
---
99

1010
# Threat intelligence integration in Microsoft Sentinel
1111

1212
Microsoft Sentinel gives you a few different ways to [use threat intelligence feeds](work-with-threat-indicators.md) to enhance your security analysts' ability to detect and prioritize known threats.
1313

14-
You can use one of many available integrated [threat intelligence platform (TIP) products](connect-threat-intelligence-tip.md), you can [connect to TAXII servers](connect-threat-intelligence-taxii.md) to take advantage of any STIX-compatible threat intelligence source, and you can also make use of any custom solutions that can communicate directly with the [Microsoft Graph Security tiIndicators API](/graph/api/resources/tiindicator).
15-
16-
You can also connect to threat intelligence sources from playbooks, in order to enrich incidents with TI information that can help direct investigation and response actions.
14+
- Use one of many available integrated [threat intelligence platform (TIP) products](connect-threat-intelligence-tip.md).
15+
- [Connect to TAXII servers](connect-threat-intelligence-taxii.md) to take advantage of any STIX-compatible threat intelligence source.
16+
- Connect directly to the [Microsoft Defender Threat Intelligence](connect-mdti-data-connector.md) feed.
17+
- Make use of any custom solutions that can communicate directly with the [Microsoft Graph Security tiIndicators API](/graph/api/resources/tiindicator).
18+
- You can also connect to threat intelligence sources from playbooks, in order to enrich incidents with TI information that can help direct investigation and response actions.
1719

1820
> [!TIP]
1921
> If you have multiple workspaces in the same tenant, such as for [Managed Security Service Providers (MSSPs)](mssp-protect-intellectual-property.md), it may be more cost effective to connect threat indicators only to the centralized workspace.
@@ -103,7 +105,7 @@ To connect to Threat Intelligence Platform (TIP) feeds, follow the instructions
103105

104106
### GroupIB Threat Intelligence and Attribution
105107

106-
- To connect [GroupIB Threat Intelligence and Attribution](https://www.group-ib.com/intelligence-attribution.html) to Microsoft Sentinel, GroupIB makes use of Azure Logic Apps. See the [specialized instructions](https://techcommunity.microsoft.com/t5/azure-sentinel/group-ib-threat-intelligence-and-attribution-connector-azure/ba-p/2252904) necessary to take full advantage of the complete offering.
108+
- To connect [GroupIB Threat Intelligence and Attribution](https://www.group-ib.com/products/threat-intelligence/) to Microsoft Sentinel, GroupIB makes use of Azure Logic Apps. See the [specialized instructions](https://techcommunity.microsoft.com/t5/azure-sentinel/group-ib-threat-intelligence-and-attribution-connector-azure/ba-p/2252904) necessary to take full advantage of the complete offering.
107109

108110
### MISP Open Source Threat Intelligence Platform
109111

@@ -132,9 +134,13 @@ Besides being used to import threat indicators, threat intelligence feeds can al
132134

133135
### HYAS Insight
134136

135-
- Find and enable incident enrichment playbooks for [HYAS Insight](https://www.hyas.com/hyas-insight) in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks). Search for subfolders beginning with "Enrich-Sentinel-Incident-HYAS-Insight-".
137+
- Find and enable incident enrichment playbooks for [HYAS Insight](https://www.hyas.com/hyas-insight) in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/HYAS/Playbooks). Search for subfolders beginning with "Enrich-Sentinel-Incident-HYAS-Insight-".
136138
- See the HYAS Insight Logic App [connector documentation](/connectors/hyasinsight/).
137139

140+
### Microsoft Defender Threat Intelligence
141+
142+
- Find and enable incident enrichment playbooks for [Microsoft Defender Threat Intelligence]() in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Microsoft%20Defender%20Threat%20Intelligence/Playbooks).
143+
138144
### Recorded Future Security Intelligence Platform
139145

140146
- Find and enable incident enrichment playbooks for [Recorded Future](https://www.recordedfuture.com/integrations/microsoft-azure/) in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks). Search for subfolders beginning with "RecordedFuture_".
@@ -153,7 +159,7 @@ Besides being used to import threat indicators, threat intelligence feeds can al
153159

154160
### Virus Total
155161

156-
- Find and enable incident enrichment playbooks for [Virus Total](https://developers.virustotal.com/v3.0/reference) in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks). Search for subfolders beginning with "Get-VirusTotal" and "Get-VTURL".
162+
- Find and enable incident enrichment playbooks for [Virus Total](https://developers.virustotal.com/v3.0/reference) in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/VirusTotal/Playbooks). Search for subfolders beginning with "Get-VTURL".
157163
- See the Virus Total Logic App [connector documentation](/connectors/virustotal/).
158164

159165
## Next steps

articles/sentinel/understand-threat-intelligence.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Understand threat intelligence in Microsoft Sentinel
33
description: Understand how threat intelligence feeds are connected to, managed, and used in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
44
author: austinmccollum
55
ms.topic: conceptual
6-
ms.date: 9/26/2022
6+
ms.date: 3/28/2022
77
ms.author: austinmc
88
---
99

@@ -35,9 +35,21 @@ Threat Intelligence also provides useful context within other Microsoft Sentinel
3535

3636
## Import threat intelligence with data connectors
3737

38-
Just like all the other event data in Microsoft Sentinel, threat indicators are imported using data connectors. There are two data connectors in Microsoft Sentinel provided specifically for threat indicators, **Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds and **Threat Intelligence Platforms** for integrated and curated TI feeds. You can use either data connector alone, or both connectors together, depending on where your organization sources threat indicators.
38+
Just like all the other event data in Microsoft Sentinel, threat indicators are imported using data connectors. There are three data connectors in Microsoft Sentinel provided specifically for threat indicators.
3939

40-
See this catalog of [threat intelligence integrations](threat-intelligence-integration.md) available with Microsoft Sentinel.
40+
- **Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat indicators
41+
- **Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds and
42+
- **Threat Intelligence Platforms** for integrated and curated TI feeds.
43+
44+
You can use any of these data connectors in any combination together, depending on where your organization sources threat indicators. All three of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
45+
46+
Also, see this catalog of [threat intelligence integrations](threat-intelligence-integration.md) available with Microsoft Sentinel.
47+
48+
### Add threat indicators to Microsoft Sentinel with the Microsoft Defender Threat Intelligence data connector
49+
50+
Bring high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace. The MDTI data connector ingests these IOCs with a simple one-click setup. Then monitor, alert and hunt based on the threat intelligence in the same way you utilize other feeds.
51+
52+
For more information on MDTI data connector, see [Enable MDTI data connector](connect-mdti-data-connector.md).
4153

4254
### Add threat indicators to Microsoft Sentinel with the Threat Intelligence Platforms data connector
4355

@@ -107,7 +119,7 @@ By default, when these built-in rules are triggered, an alert will be created. I
107119

108120
For more details on using threat indicators in your analytics rules, see [Use threat intelligence to detect threats](use-threat-indicators-in-analytics-rules.md).
109121

110-
Microsoft provides access to its threat intelligence through the **Microsoft Threat Intelligence Analytics** rule. For more information on how to take advantage of this rule which generates high fidelity alerts and incidents, see [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md)
122+
Microsoft provides access to its threat intelligence through the **Microsoft Defender Threat Intelligence Analytics** rule. For more information on how to take advantage of this rule which generates high fidelity alerts and incidents, see [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md)
111123

112124
:::image type="content" source="media/understand-threat-intelligence/detect-threats-matching-analytics.png" alt-text="Screenshot that shows a high fidelity incident generated by matching analytics with additional context information from Microsoft Defender Threat Intelligence.":::
113125

0 commit comments

Comments
 (0)