Connect Threat Indicators to Azure Sentinel
Plan for threat intelligence connectors
Azure Sentinel readily allows you to import the threat indicators your organization uses, which can enhance your security analysts ability to detect and prioritize known threats. Several features from Azure Sentinel then become available or are enhanced are as follows:
- Analytics includes a set of scheduled rule templates you can enable to generate alerts and incidents based on matches of log events from your threat indicators.
- Workbooks provide summarized information about the threat indicators imported into Azure Sentinel and any alerts generated from analytics rule that match your threat indicators.
- Hunting queries allow security investigators to use threat indicators within the context of common hunting scenarios.
- Notebooks can use threat indicators when you investigate anomalies and hunt for malicious behaviors.
There are two types of Threat Intelligence Connectors- the TAXII Connector and the Threat Intelligence Platforms Connector. Both of which writes to the ThreatIntelligenceIndicator table and have different configuration procedures.
Connect the threat intelligence TAXII connector
Azure Sentinel is adjoined with TAXII 2.0 and 2.1 data sources to enable monitoring, alerting, and hunting using your threat intelligence and can be used to send threat indicators from TAXII servers to Azure Sentinel. Threat indicators can include IP addresses, domains, URLs, and file hashes. To view the connector page:
- Select Data connector page.
- Select Threat intelligence- TAXII.
- Select the Open connector page on the preview pane.
- Specify the required and optional information in the text boxes.
- Friendly name (for server)
- API root URL
- Collection ID
- Username
- Password
5. Select Add to enable the connection.
The list of configure TAXII servers shows the currently connector TAXII servers and the last indicator received time.
Connect the threat intelligence platforms connector
Azure Sentinel integrates with the Microsoft Graph Security API data sources to enable monitoring, alerting, and hunting using your threat intelligence. Use this connector to send threat indicators to Azure Sentinel from your Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MindMeld, MISP, or other integrated applications. Threat indicators can include IP addresses, domains, URLs, and file hashes.
Connect Azure Sentinel to your threat intelligence platform
- Register an application in Azure Active Directory to get an application ID, application secret, Azure Active Directory tenant ID.
- Configure API permissions for the registered application- Add the Microsoft Graph Application permission ThreatIndicators.ReadWrite.OwnedBy to your registered application.
- Ask your Azure AD tenant administrator to grant admin consent to the registered application for your organization. From the Azure portal- Azure Active Directory- App registrations- app name- View API permissions- Grant admin consent for tenant name.
- Configure your TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API to send indicators to Azure Sentinel by specifying the following:
- The values for the registered application's ID, secret, and tenant ID.
- For the target product, specify Azure Sentinel.
- For the action, specify alert.
- In the Azure portal, navigate to Azure Sentinel then Data connectors and then select the Threat Intelligence Platforms (Preview) connector.
- Select Open connector page, and then connect.
- To view the threat indicators imported into Azure Sentinel, navigate to Azure Sentinel Logs then SecurityInsights, and lastly expand ThreatIntelligenceIndicator.
Comments
Post a Comment