You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-threat-intelligence.md
+48-17Lines changed: 48 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,42 +11,73 @@ ms.devlang: na
11
11
ms.topic: conceptual
12
12
ms.tgt_pltfrm: na
13
13
ms.workload: na
14
-
ms.date: 09/10/2019
14
+
ms.date: 09/17/2019
15
15
ms.author: rkarlin
16
16
17
17
---
18
18
# Connect data from threat intelligence providers - Preview
19
19
20
+
> [!IMPORTANT]
21
+
> Threat intelligence in Azure Sentinel is currently in public preview.
22
+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
23
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20
24
25
+
Azure Sentinel lets you import the threat indicators that your organization is using, which can enhance your security analysts' ability to detect and prioritize known threats. Several features from Azure Sentinel then become available or are enhanced:
21
26
22
-
After you stream your data into Azure Sentinel, you can enrich it with the threat intelligence feed that you use across your organization.
27
+
-**Analytics** includes a set of scheduled rule templates that you can enable to generate alerts and incidents that are based on matches of log events from your threat indicators.
23
28
24
-
To enable you to cross check your alerts and rules with true threat intelligence, for example if you get an alert from a specific IP address, your threat intelligence provider integration will be able to let you know if that IP address was recently found to be malicious, Azure Sentinel enables integration with [threat intelligence providers](https://aka.ms/graphsecuritytips).
29
+
-**Workbooks** provide summarized information about the threat indicators that are imported into Azure Sentinel and any alerts generated from analytics rules that match your threat indicators.
30
+
31
+
-**Hunting** queries allow security investigators to use threat indicators within the context of common hunting scenarios.
32
+
33
+
-**Notebooks** can use threat indicators when you investigate anomalies and hunt for malicious behaviors.
34
+
35
+
You can stream threat indicators to Azure Sentinel by using one of the integrated threat intelligence platform (TIP) products that are listed in the next section, or by using direct integration with the [Microsoft Graph Security tiIndicators API](https://aka.ms/graphsecuritytiindicators).
-[MISP Open Source Threat Intelligence Platform](https://www.misp-project.org/)
40
+
41
+
For a sample script that provides clients with MISP instances to migrate threat indicators to the Microsoft Graph Security API, see the [MISP to Microsoft Graph Security Script](https://github.com/microsoftgraph/security-api-solutions/tree/master/Samples/MISP).
For guided instructions, see [Sending IOCs to the Microsoft Graph Security API using MineMeld](https://live.paloaltonetworks.com/t5/MineMeld-Articles/Sending-IOCs-to-the-Microsoft-Graph-Security-API-using-MineMeld/ta-p/258540).
You can stream logs from Threat intelligence providers into Azure Sentinel with a single click. This connection enables you to incorporate indicators containing various types of observables such as IP address, domain, URL and file hash to search and create custom alerts rules in Azure Sentinel.
27
-
> [!NOTE]
28
-
> You can input customized threat indicators into Azure Sentinel for use in alert rules, dashboards, and hunting scenarios by integrating with the [Microsoft Graph Security tiIndicator](https://aka.ms/graphsecuritytiindicators) entity or by using a [Microsoft Graph Security integrated Threat Intelligence Platform](https://aka.ms/graphsecuritytips).
29
49
30
50
## Prerequisites
31
51
32
-
- User with global administrator or security administrator permissions
52
+
- Azure AD role of either Global administrator or Security administrator to grant permissions to your TIP product or custom application that uses direct integration with the Microsoft Graph Security tiIndicators API.
53
+
54
+
- Read and write permissions to the Azure Sentinel workspace to store your threat indicators.
55
+
56
+
## Connect Azure Sentinel to your threat intelligence provider
57
+
58
+
1.[Register an application](/graph/auth-v2-service#1-register-your-app) in Azure Active Directory to get an application ID, application secret, and Azure Active Directory tenant ID. You need these values for when you configure your integrated TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API.
33
59
34
-
- Threat intelligence application integrated with Microsoft Intelligent Security Graph
60
+
2.[Configure API permissions](/graph/auth-v2-service#2-configure-permissions-for-microsoft-graph) for the registered application: Add the Microsoft Graph Application permission **ThreatIndicators.ReadWrite.OwnedBy** to your registered application.
35
61
36
-
## Connect to threat intelligence
62
+
3. Ask your Azure Active Directory tenant administrator to grant admin consent to the registered application for your organization. From the Azure portal: **Azure Active Directory** > **App registrations** > **\<*app name*>** > **View API Permissions** > **Grant admin consent for \<*tenant name*>**.
37
63
38
-
1. If you’re already using a threat intelligence provider, be sure to browse to your TIP application and grant permission to send indicators to Microsoft and specify the service as Azure Sentinel.
64
+
4. Configure your TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API to send indicators to Azure Sentinel by specifying the following:
65
+
66
+
a. The values for the registered application's ID, secret, and tenant ID.
67
+
68
+
b. For the target product, specify Azure Sentinel.
69
+
70
+
c. For the action, specify alert.
39
71
40
-
2. In Azure Sentinel, select **Data connectors** and then click the **Threat Intelligence**tile.
72
+
5. In the Azure portal, navigate to **Azure Sentinel** > **Data connectors** and then select the **Threat Intelligence Platforms (Preview)**connector.
41
73
42
-
3. Click**Connect**.
74
+
6. Select**Open connector page**, and then **Connect**.
43
75
44
-
4. To use the relevant schema in Log Analytics for threat intelligence feeds, search for **ThreatIntelligenceIndicator**.
76
+
7. To view the threat indicators that are imported into Azure Sentinel, navigate to **Azure Sentinel - Logs** > **SecurityInsights**, and then expand **ThreatIntelligenceIndicator**.
45
77
46
-
47
78
## Next steps
48
79
49
-
In this document, you learned how to connect your Threat Intelligence provider to Azure Sentinel. To learn more about Azure Sentinel, see the following articles.
80
+
In this document, you learned how to connect your threat intelligence provider to Azure Sentinel. To learn more about Azure Sentinel, see the following articles.
50
81
51
-
-To get started with Azure Sentinel, you need a subscription to Microsoft Azure. If you do not have a subscription, you can sign up for a [free trial](https://azure.microsoft.com/free/).
52
-
-Learn how to [onboard your data to Azure Sentinel](quickstart-onboard.md), and [get visibility into your data, and potential threats](quickstart-get-visibility.md).
82
+
-Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
83
+
-Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
0 commit comments