Understand threat intelligence in Microsoft Sentinel
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to ingest, curate, and manage threat intelligence from numerous sources.
Important
Microsoft Sentinel is generally available within Microsoft's unified security operations platform in the Microsoft Defender portal. For preview, Microsoft Sentinel is available in the Defender portal without Microsoft Defender XDR or an E5 license. For more information, see Microsoft Sentinel in the Microsoft Defender portal.
Introduction to threat intelligence
Cyber threat intelligence (CTI) is information that describes existing or potential threats to systems and users. This intelligence takes many forms like written reports that detail a particular threat actor's motivations, infrastructure, and techniques. It can also be specific observations of IP addresses, domains, file hashes, and other artifacts associated with known cyber threats.
Organizations use CTI to provide essential context to unusual activity so that security personnel can quickly take action to protect their people, information, and assets. You can source CTI from many places, such as:
- Open-source data feeds
- Threat intelligence-sharing communities
- Commercial intelligence feeds
- Local intelligence gathered in the course of security investigations within an organization
For SIEM solutions like Microsoft Sentinel, the most common forms of CTI are threat indicators, which are also known as indicators of compromise (IOCs) or indicators of attack. Threat indicators are data that associate observed artifacts such as URLs, file hashes, or IP addresses with known threat activity such as phishing, botnets, or malware. This form of threat intelligence is often called tactical threat intelligence. It's applied to security products and automation in large scale to detect potential threats to an organization and protect against them.
Another facet of threat intelligence represents threat actors, their techniques, tactics and procedures (TTPs), their infrastructure, and the identities of their victims. Microsoft Sentinel supports managing these facets along with IOCs, expressed using the open source standard for exchanging CTI known as structured threat information expression (STIX). Threat intelligence expressed as STIX objects improves interoperability and empowers organizations to hunt more efficiently. Use threat intelligence STIX objects in Microsoft Sentinel to detect malicious activity observed in your environment and provide the full context of an attack to inform response decisions.
The following table outlines the activities required to make the most of threat intelligence (TI) integration in Microsoft Sentinel:
Action | Description |
---|---|
Store threat intelligence in Microsoft Sentinel's workspace |
|
Manage threat intelligence |
|
Use threat intelligence |
|
Threat intelligence also provides useful context within other Microsoft Sentinel experiences, such as notebooks. For more information, see Get started with notebooks and MSTICPy.
Note
For information about feature availability in US Government clouds, see the Microsoft Sentinel tables in Cloud feature availability for US Government customers.
Import and connect threat intelligence
Most threat intelligence is imported using data connectors or an API. Here are the solutions available for Microsoft Sentinel.
- Microsoft Defender Threat Intelligence data connector to ingest Microsoft's threat intelligence
- Threat Intelligence - TAXII data connector for industry-standard STIX/TAXII feeds
- Threat Intelligence upload API for integrated and curated TI feeds using a REST API to connect (doesn't require a data connector)
- Threat Intelligence Platform data connector also connects TI feeds using a legacy REST API, but is on the path for deprecation
Use these solutions in any combination, depending on where your organization sources threat intelligence. All of these data connectors are available in Content hub as part of the Threat Intelligence solution. For more information about this solution, see the Azure Marketplace entry Threat Intelligence.
Also, see this catalog of threat intelligence integrations that are available with Microsoft Sentinel.
Add threat intelligence to Microsoft Sentinel with the Defender Threat Intelligence data connector
Bring public, open-source, and high-fidelity IOCs generated by Defender Threat Intelligence into your Microsoft Sentinel workspace with the Defender Threat Intelligence data connectors. With a simple one-click setup, use the threat intelligence from the standard and premium Defender Threat Intelligence data connectors to monitor, alert, and hunt.
There are two versions of the data connector, standard and premium. There's also a freely available Defender Threat Intelligence threat analytics rule which gives you a sample of what the premium Defender Threat Intelligence data connector provides. However, with matching analytics, only indicators that match the rule are ingested into your environment.
The premium Defender Threat Intelligence data connector ingests Microsoft-enriched open source intelligence and Microsoft's curated IOCs. These premium features allow analytics on more data sources with greater flexibility and understanding of that threat intelligence. Here's a table that shows what to expect when you license and enable the premium version.
Free | Premium |
---|---|
Public IOCs | |
Open-source intelligence (OSINT) | |
Microsoft IOCs | |
Microsoft-enriched OSINT |
For more information, see the following articles:
- To learn how to get a premium license and explore all the differences between the standard and premium versions, see Explore Defender Threat Intelligence licenses.
- To learn more about the free Defender Threat Intelligence experience, see Introducing Defender Threat Intelligence free experience for Microsoft Defender XDR.
- To learn how to enable the Defender Threat Intelligence and the premium Defender Threat Intelligence data connectors, see Enable the Defender Threat Intelligence data connector.
- To learn about matching analytics, see Use matching analytics to detect threats.
Add threat intelligence to Microsoft Sentinel with the upload API
Many organizations use threat intelligence platform (TIP) solutions to aggregate threat indicator feeds from various sources. From the aggregated feed, the data is curated to apply to security solutions such as network devices, EDR/XDR solutions, or SIEMs such as Microsoft Sentinel. The upload API allows you to use these solutions to import threat intelligence STIX objects into Microsoft Sentinel.
The new upload API doesn't require a data connector and offers the following improvements:
- The threat indicator fields are based off of the STIX standardized format.
- The Microsoft Entra application requires the Microsoft Sentinel Contributor role.
- The API request endpoint is scoped at the workspace level. The required Microsoft Entra application permissions allow granular assignment at the workspace level.
For more information, see Connect your threat intelligence platform using upload API
Add threat intelligence to Microsoft Sentinel with the Threat Intelligence Platform data connector
Note
This data connector is now on a path for deprecation.
Much like the upload API, the Threat Intelligence Platform data connector uses an API that allows your TIP or custom solution to send threat intelligence into Microsoft Sentinel. However, this data connector is limited to only indicators and is now on a path for deprecation. We recommend that you take advantage of the optimizations the upload API has to offer.
The TIP data connector uses the Microsoft Graph Security tiIndicators API which doesn't support other STIX objects. Use it with any custom TIP that communicates with the tiIndicators API to send indicators to Microsoft Sentinel (and to other Microsoft security solutions like Defender XDR).
For more information on the TIP solutions integrated with Microsoft Sentinel, see Integrated threat intelligence platform products. For more information, see Connect your threat intelligence platform to Microsoft Sentinel.
Add threat intelligence to Microsoft Sentinel with the Threat Intelligence - TAXII data connector
The most widely adopted industry standard for the transmission of threat intelligence is a combination of the STIX data format and the TAXII protocol. If your organization obtains threat intelligence from solutions that support the current STIX/TAXII version (2.0 or 2.1), use the Threat Intelligence - TAXII data connector to bring your threat intelligence into Microsoft Sentinel. The Threat Intelligence - TAXII data connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
To import STIX-formatted threat intelligence to Microsoft Sentinel from a TAXII server:
- Obtain the TAXII server API root and collection ID.
- Enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel.
For more information, see Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds.
Create and manage threat intelligence
Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft Defender Threat Intelligence (MDTI) and Threat Analytics in Microsoft's unified SecOps platform.
Note
Threat intelligence in the Azure portal is still accessed from Microsoft Sentinel > Threat management > Threat intelligence.
Two of the most common threat intelligence tasks are creating new threat intelligence related to security investigations and adding tags. The management interface streamlines the manual process of creating individual threat intel with a few key features.
- Define relationships as you create new STIX objects.
- Curate existing TI with the relationship builder.
- Copy common metadata from a new or existing TI object with the duplicate feature.
- Add free-form tags to objects with multi-select.
The following STIX objects are available in Microsoft Sentinel:
STIX object | Description |
---|---|
Threat actor | From script kiddies to nation states, threat actor objects describe motivations, sophistication, and resourcing levels. |
Attack pattern | Also known as techniques, tactics and procedures, attack patterns describe a specific component of an attack and the MITRE ATT&CK stage it's used on. |
Indicator | Domain name , URL , IPv4 address , IPv6 address , and File hashes X509 certificates are used to authenticate the identity of devices and servers for secure communication over the internet.JA3 fingerprints are unique identifiers generated from the TLS/SSL handshake process. They help in identifying specific applications and tools used in network traffic, making it easier to detect malicious activitiesJA3S fingerprints extend the capabilities of JA3 by also including server-specific characteristics in the fingerprinting process. This extension provides a more comprehensive view of the network traffic and helps in identifying both client and server-side threats.User agents provide information about the client software making requests to a server, such as the browser or operating system. They're useful in identifying and profiling devices and applications accessing a network. |
Identity | Describe victims, organizations, and other groups or individuals along with the business sectors most closely associated with them. |
Relationship | The threads that connect threat intelligence, helping to make connections across disparate signals and data points are described with relationships. |
Create relationships
Enhance threat detection and response by establishing connections between objects with the relationship builder. The following table lists some of its use cases.
Use case | Description |
---|---|
Connect a threat actor to an attack pattern | The threat actor APT29 Uses the attack pattern Phishing via Email to gain initial access. |
Link an indicator to a threat actor | A domain indicator allyourbase.contoso.com is Attributed to the threat actor APT29 . |
Associate an identity (victim) with an attack pattern | The attack pattern Phishing via Email Targets the FourthCoffee organization. |
The following image shows how the relationship builder connects all of these use cases.
Curate threat intelligence
Configure which TI objects can be shared with appropriate audiences by designating a sensitivity level called Traffic Light Protocol (TLP).
TLP color | Sensitivity |
---|---|
White | Information can be shared freely and publicly without any restrictions. |
Green | Information can be shared with peers and partner organizations within the community, but not publicly. It's intended for a wider audience within the community. |
Amber | Information can be shared with members of the organization, but not publicly. It's intended to be used within the organization to protect sensitive information. |
Red | Information is highly sensitive and shouldn't be shared outside of the specific group or meeting where it was originally disclosed. |
Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an object represents threats from a particular known actor or well-known attack campaign, consider creating a relationship instead of a tag. After you search and filter for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
For more information, see Work with threat intelligence in Microsoft Sentinel.
View your threat intelligence
View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The ThreatIntelligenceIndicator
table under the Microsoft Sentinel schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
Important
Tables supporting the new STIX object schema are in private preview. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with this form. Ingest your threat intelligence into the new tables, ThreatIntelIndicator
and ThreatIntelObjects
, alongside or instead of the current table, ThreatIntelligenceIndicator
, with this opt-in process.
Here's an example view of a basic query for just threat indicators using the current table.
Threat intelligence indicators are ingested into the ThreatIntelligenceIndicator
table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the ThreatIntelligenceIndicator
table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the IndicatorId
and SourceSystem
properties and chooses the indicator with the newest TimeGenerated[UTC]
.
The IndicatorId
property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, IndicatorId
is generated from the source and pattern of the indicator.
For more information, see Work with threat intelligence in Microsoft Sentinel.
View your GeoLocation and WhoIs data enrichments (public preview)
Microsoft enriches IP and domain indicators with extra GeoLocation
and WhoIs
data to provide more context for investigations where the selected IOC is found.
View GeoLocation
and WhoIs
data on the Threat Intelligence pane for those types of threat indicators imported into Microsoft Sentinel.
For example, use GeoLocation
data to find information like the organization or country or region for an IP indicator. Use WhoIs
data to find data like registrar and record creation data from a domain indicator.
Detect threats with threat indicator analytics
The most important use case for threat intelligence in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
Although you can always create new analytics rules from scratch, Microsoft Sentinel provides a set of built-in rule templates, created by Microsoft security engineers, to take advantage of your threat indicators. These templates are based on the type of threat indicators (domain, email, file hash, IP address, or URL) and data source events that you want to match. Each template lists the required sources that are needed for the rule to function. This information makes it easy to determine if the necessary events are already imported in Microsoft Sentinel.
By default, when these built-in rules are triggered, an alert is created. In Microsoft Sentinel, the alerts generated from analytics rules also generate security incidents. On the Microsoft Sentinel menu, under Threat management, select Incidents. Incidents are what your security operations teams triage and investigate to determine the appropriate response actions. For more information, see Tutorial: Investigate incidents with Microsoft Sentinel.
For more information on using threat indicators in your analytics rules, see Use threat intelligence to detect threats.
Microsoft provides access to its threat intelligence through the Defender Threat Intelligence analytics rule. For more information on how to take advantage of this rule, which generates high-fidelity alerts and incidents, see Use matching analytics to detect threats.
Workbooks provide insights about your threat intelligence
Workbooks provide powerful interactive dashboards that give you insights into all aspects of Microsoft Sentinel, and threat intelligence is no exception. Use the built-in Threat Intelligence workbook to visualize key information about your threat intelligence. Customize the workbook according to your business needs. Create new dashboards by combining many data sources to help you visualize your data in unique ways.
Because Microsoft Sentinel workbooks are based on Azure Monitor workbooks, extensive documentation and many more templates are already available. For more information, see Create interactive reports with Azure Monitor workbooks.
There's also a rich resource for Azure Monitor workbooks on GitHub, where you can download more templates and contribute your own templates.
For more information on using and customizing the Threat Intelligence workbook, see Visualize threat intelligence with workbooks.
Related content
In this article, you learned about threat intelligence capabilities powered by Microsoft Sentinel. For more information, see the following articles: