Skip to content

Commit f1d30b7

Browse files
Merge pull request #231744 from austinmccollum/austinmc-mdti-mssecure28
update for MDTI name change
2 parents 08cd6d5 + 7f41def commit f1d30b7

20 files changed

+136
-30
lines changed
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Enable data connector for Microsoft's threat intelligence
3+
titleSuffix: Microsoft Defender Threat Intelligence
4+
description: Learn how to ingest Microsoft's threat intelligence into your Sentinel workspace.
5+
author: austinmccollum
6+
ms.topic: how-to
7+
ms.date: 03/27/2023
8+
ms.author: austinmc
9+
---
10+
11+
# Enable data connector for Microsoft Defender Threat Intelligence
12+
Bring high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel workspace. The MDTI data connector ingests these IOCs with a simple one-click setup. Then monitor, alert and hunt based on the threat intelligence in the same way you utilize other feeds.
13+
14+
> [!IMPORTANT]
15+
> The Microsoft Defender Threat Intelligence data connector is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16+
>
17+
18+
## Prerequisites
19+
- In order to install, update and delete standalone content or solutions in content hub, you need the **Template Spec Contributor** role at the resource group level. See [Azure RBAC built in roles](../role-based-access-control/built-in-roles.md#template-spec-contributor) for details on this role.
20+
- To configure this data connector, you must have read and write permissions to the Microsoft Sentinel workspace.
21+
22+
## Install the Threat Intelligence solution in Microsoft Sentinel
23+
24+
To import threat indicators into Microsoft Sentinel from MDTI, follow these steps:
25+
26+
1. From the [Azure portal](https://portal.azure.com/), navigate to the **Microsoft Sentinel** service.
27+
28+
1. Choose the **workspace** to which you want to import the MDTI indicators from.
29+
30+
1. Select **Content hub** from the menu.
31+
32+
1. Find and select the **Threat Intelligence** solution.
33+
34+
1. Select the :::image type="icon" source="media/connect-mdti-data-connector/install-update-button.png"::: **Install/Update** button.
35+
36+
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](sentinel-solutions-deploy.md).
37+
38+
## Enable the Microsoft Defender Threat Intelligence data connector
39+
40+
1. To configure the MDTI data connector, select the **Data connectors** menu.
41+
42+
1. Find and select the Microsoft Defender Threat Intelligence data connector > **Open connector page** button.
43+
44+
:::image type="content" source="media/connect-mdti-data-connector/mdti-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the MDTI data connector listed." lightbox="media/connect-mdti-data-connector/mdti-data-connector-config.png":::
45+
46+
1. Enable the feed by selecting the **Connect** button
47+
48+
:::image type="content" source="media/connect-mdti-data-connector/mdti-data-connector-connect.png" alt-text="Screenshot displaying the MDTI data connector page and the connect button." lightbox="media/connect-mdti-data-connector/mdti-data-connector-connect.png":::
49+
50+
1. When MDTI indicators start populating the Microsoft Sentinel workspace, the connector status displays **Connected**.
51+
52+
At this point, the ingested indicators are now available for use in the *TI map...* analytics rules. For more information, see [Use threat indicators in analytics rules](use-threat-indicators-in-analytics-rules.md).
53+
54+
You can find the new indicators in the **Threat intelligence** blade or directly in **Logs** by querying the **ThreatIntelligenceIndicator** table. For more information, see [Work with threat indicators](work-with-threat-indicators.md).
55+
56+
## Next steps
57+
58+
In this document, you learned how to connect Microsoft Sentinel to Microsoft's threat intelligence feed with the MDTI data connector. To learn more about Microsoft Defender for Threat Intelligence see the following articles.
59+
60+
- Learn about [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
61+
- Get started with the MDTI community portal [MDTI portal](https://ti.defender.microsoft.com).
62+
- Use MDTI in analytics [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md).

articles/sentinel/connect-threat-intelligence-taxii.md

Lines changed: 20 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds | Microsoft Docs
33
description: Learn about how to connect Microsoft Sentinel to industry-standard threat intelligence feeds to import threat indicators.
4-
author: yelevin
4+
author: austinmccollum
55
ms.topic: how-to
6-
ms.date: 11/09/2021
7-
ms.author: yelevin
8-
ms.custom: ignite-fall-2021
6+
ms.date: 03/27/2023
7+
ms.author: austinmc
98
---
109

1110
# Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds
@@ -23,7 +22,7 @@ To import STIX formatted threat indicators to Microsoft Sentinel from a TAXII se
2322
Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that can be integrated with Microsoft Sentinel.
2423

2524
## Prerequisites
26-
25+
- In order to install, update and delete standalone content or solutions in content hub, you need the **Template Spec Contributor** role at the resource group level. See [Azure RBAC built in roles](../role-based-access-control/built-in-roles.md#template-spec-contributor) for details on this role.
2726
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
2827
- You must have a TAXII 2.0 or TAXII 2.1 **API Root URI** and **Collection ID**.
2928

@@ -34,15 +33,29 @@ TAXII 2.x servers advertise API Roots, which are URLs that host Collections of t
3433
> [!NOTE]
3534
> In some cases, the provider will only advertise a URL called a Discovery Endpoint. You can use the [cURL](https://en.wikipedia.org/wiki/CURL) utility to browse the discovery endpoint and request the API Root.
3635
37-
## Enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel
36+
## Install the Threat Intelligence solution in Microsoft Sentinel
3837

3938
To import threat indicators into Microsoft Sentinel from a TAXII server, follow these steps:
4039

4140
1. From the [Azure portal](https://portal.azure.com/), navigate to the **Microsoft Sentinel** service.
4241

4342
1. Choose the **workspace** to which you want to import threat indicators from the TAXII server.
4443

45-
1. Select **Data connectors** from the menu, select **Threat Intelligence - TAXII** from the connectors gallery, and select the **Open connector page** button.
44+
1. Select **Content hub** from the menu.
45+
46+
1. Find and select the **Threat Intelligence** solution.
47+
48+
1. Select the :::image type="icon" source="media/connect-threat-intelligence-taxii/install-update-button.png"::: **Install/Update** button.
49+
50+
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](sentinel-solutions-deploy.md).
51+
52+
## Enable the Threat intelligence - TAXII data connector
53+
54+
1. To configure the TAXII data connector, select the **Data connectors** menu.
55+
56+
1. Find and select the **Threat Intelligence - TAXII** data connector > **Open connector page** button.
57+
58+
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
4659

4760
1. Enter a **friendly name** for this TAXII server Collection, the **API Root URL**, the **Collection ID**, a **Username** (if required), and a **Password** (if required), and choose the group of indicators and the polling frequency you want. Select the **Add** button.
4861

@@ -53,7 +66,6 @@ You should receive confirmation that a connection to the TAXII server was establ
5366
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. You can find the new indicators in the **Threat intelligence** blade, accessible from the Microsoft Sentinel navigation menu.
5467

5568

56-
5769
## IP allow listing for the Microsoft Sentinel TAXII client
5870

5971
Some TAXII servers, like FS-ISAC, have a requirement to keep the IP addresses of the Microsoft Sentinel TAXII client on the allowlist. Most TAXII servers don't have this requirement.

articles/sentinel/connect-threat-intelligence-tip.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ Learn more about [Threat Intelligence](understand-threat-intelligence.md) in Mic
2424

2525
## Prerequisites
2626

27+
- In order to install, update and delete standalone content or solutions in content hub, you need the **Template Spec Contributor** role at the resource group level. See [Azure RBAC built in roles](../role-based-access-control/built-in-roles.md#template-spec-contributor) for details on this role.
2728
- You must have either the **Global administrator** or **Security administrator** Azure AD roles in order to grant permissions to your TIP product or to any other custom application that uses direct integration with the Microsoft Graph Security tiIndicators API.
28-
2929
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
3030

3131
## Instructions
@@ -118,11 +118,23 @@ Once this configuration is complete, threat indicators will be sent from your TI
118118

119119
The last step in the integration process is to enable the **Threat Intelligence Platforms data connector** in Microsoft Sentinel. Enabling the connector is what allows Microsoft Sentinel to receive the threat indicators sent from your TIP or custom solution. These indicators will be available to all Microsoft Sentinel workspaces for your organization. Follow these steps to enable the Threat Intelligence Platforms data connector for each workspace:
120120

121-
1. From the Azure portal, navigate to the **Microsoft Sentinel** service.
121+
1. From the [Azure portal](https://portal.azure.com/), navigate to the **Microsoft Sentinel** service.
122122

123123
1. Choose the **workspace** to which you want to import the threat indicators sent from your TIP or custom solution.
124124

125-
1. Select **Data connectors** from the menu, select **Threat Intelligence Platforms** from the connectors gallery, and select the **Open connector page** button.
125+
1. Select **Content hub** from the menu.
126+
127+
1. Find and select the **Threat Intelligence** solution.
128+
129+
1. Select the :::image type="icon" source="media/connect-threat-intelligence-tip/install-update-button.png"::: **Install/Update** button.
130+
131+
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](sentinel-solutions-deploy.md).
132+
133+
1. To configure the TIP data connector, select the **Data connectors** menu.
134+
135+
1. Find and select the **Threat Intelligence Platforms** data connector > **Open connector page** button.
136+
137+
:::image type="content" source="media/connect-threat-intelligence-tip/tip-data-connector-config.png" alt-text="Screenshot displaying the data connectors page with the TIP data connector listed." lightbox="media/connect-threat-intelligence-tip/tip-data-connector-config.png":::
126138

127139
1. As you’ve already completed the app registration and configured your TIP or custom solution to send threat indicators, the only step left is to select the **Connect** button.
128140

295 Bytes
Loading
220 KB
Loading
266 KB
Loading
253 KB
Loading
295 Bytes
Loading
220 KB
Loading
295 Bytes
Loading

0 commit comments

Comments
 (0)