Understand threat intelligence in Microsoft Sentinel

Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to ingest, curate, and manage threat intelligence from numerous sources.

Important

Microsoft Sentinel is generally available within Microsoft's unified security operations platform in the Microsoft Defender portal. For preview, Microsoft Sentinel is available in the Defender portal without Microsoft Defender XDR or an E5 license. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Introduction to threat intelligence

Cyber threat intelligence (CTI) is information that describes existing or potential threats to systems and users. This intelligence takes many forms like written reports that detail a particular threat actor's motivations, infrastructure, and techniques. It can also be specific observations of IP addresses, domains, file hashes, and other artifacts associated with known cyber threats.

Organizations use CTI to provide essential context to unusual activity so that security personnel can quickly take action to protect their people, information, and assets. You can source CTI from many places, such as:

  • Open-source data feeds
  • Threat intelligence-sharing communities
  • Commercial intelligence feeds
  • Local intelligence gathered in the course of security investigations within an organization

For SIEM solutions like Microsoft Sentinel, the most common forms of CTI are threat indicators, which are also known as indicators of compromise (IOCs) or indicators of attack. Threat indicators are data that associate observed artifacts such as URLs, file hashes, or IP addresses with known threat activity such as phishing, botnets, or malware. This form of threat intelligence is often called tactical threat intelligence. It's applied to security products and automation in large scale to detect potential threats to an organization and protect against them.

Another facet of threat intelligence represents threat actors, their techniques, tactics and procedures (TTPs), their infrastructure, and the identities of their victims. Microsoft Sentinel supports managing these facets along with IOCs, expressed using the open source standard for exchanging CTI known as structured threat information expression (STIX). Threat intelligence expressed as STIX objects improves interoperability and empowers organizations to hunt more efficiently. Use threat intelligence STIX objects in Microsoft Sentinel to detect malicious activity observed in your environment and provide the full context of an attack to inform response decisions.

The following table outlines the activities required to make the most of threat intelligence (TI) integration in Microsoft Sentinel:

Action Description
Store threat intelligence in Microsoft Sentinel's workspace
  • Import threat intelligence into Microsoft Sentinel by enabling data connectors to various threat intelligence platforms and feeds.
  • Connect threat intelligence to Microsoft Sentinel by using the upload API to connect various TI platforms or custom applications.
  • Create threat intelligence with a streamlined management interface.
Manage threat intelligence
  • View imported threat intelligence using queries or advanced search.
  • Curate threat intelligence with relationships or tags
  • Visualize key information about your TI with workbooks.
Use threat intelligence
  • Detect threats and generate security alerts and incidents with built-in analytics rule templates based on your threat intelligence.
  • Hunt for threats using your threat intel to ask the right questions about the signals captured for your organization.

Threat intelligence also provides useful context within other Microsoft Sentinel experiences, such as notebooks. For more information, see Get started with notebooks and MSTICPy.

Note

For information about feature availability in US Government clouds, see the Microsoft Sentinel tables in Cloud feature availability for US Government customers.

Import and connect threat intelligence

Most threat intelligence is imported using data connectors or an API. Here are the solutions available for Microsoft Sentinel.

  • Microsoft Defender Threat Intelligence data connector to ingest Microsoft's threat intelligence
  • Threat Intelligence - TAXII data connector for industry-standard STIX/TAXII feeds
  • Threat Intelligence upload API for integrated and curated TI feeds using a REST API to connect (doesn't require a data connector)
  • Threat Intelligence Platform data connector also connects TI feeds using a legacy REST API, but is on the path for deprecation

Use these solutions in any combination, depending on where your organization sources threat intelligence. All of these data connectors are available in Content hub as part of the Threat Intelligence solution. For more information about this solution, see the Azure Marketplace entry Threat Intelligence.

Also, see this catalog of threat intelligence integrations that are available with Microsoft Sentinel.

Add threat intelligence to Microsoft Sentinel with the Defender Threat Intelligence data connector

Bring public, open-source, and high-fidelity IOCs generated by Defender Threat Intelligence into your Microsoft Sentinel workspace with the Defender Threat Intelligence data connectors. With a simple one-click setup, use the threat intelligence from the standard and premium Defender Threat Intelligence data connectors to monitor, alert, and hunt.

There are two versions of the data connector, standard and premium. There's also a freely available Defender Threat Intelligence threat analytics rule which gives you a sample of what the premium Defender Threat Intelligence data connector provides. However, with matching analytics, only indicators that match the rule are ingested into your environment.

The premium Defender Threat Intelligence data connector ingests Microsoft-enriched open source intelligence and Microsoft's curated IOCs. These premium features allow analytics on more data sources with greater flexibility and understanding of that threat intelligence. Here's a table that shows what to expect when you license and enable the premium version.

Free Premium
Public IOCs
Open-source intelligence (OSINT)
Microsoft IOCs
Microsoft-enriched OSINT

For more information, see the following articles:

Add threat intelligence to Microsoft Sentinel with the upload API

Many organizations use threat intelligence platform (TIP) solutions to aggregate threat indicator feeds from various sources. From the aggregated feed, the data is curated to apply to security solutions such as network devices, EDR/XDR solutions, or SIEMs such as Microsoft Sentinel. The upload API allows you to use these solutions to import threat intelligence STIX objects into Microsoft Sentinel.

Diagram that shows the upload API import path.

The new upload API doesn't require a data connector and offers the following improvements:

  • The threat indicator fields are based off of the STIX standardized format.
  • The Microsoft Entra application requires the Microsoft Sentinel Contributor role.
  • The API request endpoint is scoped at the workspace level. The required Microsoft Entra application permissions allow granular assignment at the workspace level.

For more information, see Connect your threat intelligence platform using upload API

Add threat intelligence to Microsoft Sentinel with the Threat Intelligence Platform data connector

Note

This data connector is now on a path for deprecation.

Much like the upload API, the Threat Intelligence Platform data connector uses an API that allows your TIP or custom solution to send threat intelligence into Microsoft Sentinel. However, this data connector is limited to only indicators and is now on a path for deprecation. We recommend that you take advantage of the optimizations the upload API has to offer.

The TIP data connector uses the Microsoft Graph Security tiIndicators API which doesn't support other STIX objects. Use it with any custom TIP that communicates with the tiIndicators API to send indicators to Microsoft Sentinel (and to other Microsoft security solutions like Defender XDR).

Screenshot that shows a threat intelligence import path.

For more information on the TIP solutions integrated with Microsoft Sentinel, see Integrated threat intelligence platform products. For more information, see Connect your threat intelligence platform to Microsoft Sentinel.

Add threat intelligence to Microsoft Sentinel with the Threat Intelligence - TAXII data connector

The most widely adopted industry standard for the transmission of threat intelligence is a combination of the STIX data format and the TAXII protocol. If your organization obtains threat intelligence from solutions that support the current STIX/TAXII version (2.0 or 2.1), use the Threat Intelligence - TAXII data connector to bring your threat intelligence into Microsoft Sentinel. The Threat Intelligence - TAXII data connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.

Screenshot that shows a TAXII import path

To import STIX-formatted threat intelligence to Microsoft Sentinel from a TAXII server:

  1. Obtain the TAXII server API root and collection ID.
  2. Enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel.

For more information, see Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds.

Create and manage threat intelligence

Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft Defender Threat Intelligence (MDTI) and Threat Analytics in Microsoft's unified SecOps platform.

Screenshot showing intel management page in the Defender portal.

Note

Threat intelligence in the Azure portal is still accessed from Microsoft Sentinel > Threat management > Threat intelligence.

Two of the most common threat intelligence tasks are creating new threat intelligence related to security investigations and adding tags. The management interface streamlines the manual process of creating individual threat intel with a few key features.

  • Define relationships as you create new STIX objects.
  • Curate existing TI with the relationship builder.
  • Copy common metadata from a new or existing TI object with the duplicate feature.
  • Add free-form tags to objects with multi-select.

The following STIX objects are available in Microsoft Sentinel: Screenshot of the menu to add new STIX objects along with its options.

STIX object Description
Threat actor From script kiddies to nation states, threat actor objects describe motivations, sophistication, and resourcing levels.
Attack pattern Also known as techniques, tactics and procedures, attack patterns describe a specific component of an attack and the MITRE ATT&CK stage it's used on.
Indicator Domain name, URL, IPv4 address, IPv6 address, and File hashes

X509 certificates are used to authenticate the identity of devices and servers for secure communication over the internet.

JA3 fingerprints are unique identifiers generated from the TLS/SSL handshake process. They help in identifying specific applications and tools used in network traffic, making it easier to detect malicious activities

JA3S fingerprints extend the capabilities of JA3 by also including server-specific characteristics in the fingerprinting process. This extension provides a more comprehensive view of the network traffic and helps in identifying both client and server-side threats.

User agents provide information about the client software making requests to a server, such as the browser or operating system. They're useful in identifying and profiling devices and applications accessing a network.
Identity Describe victims, organizations, and other groups or individuals along with the business sectors most closely associated with them.
Relationship The threads that connect threat intelligence, helping to make connections across disparate signals and data points are described with relationships.

Create relationships

Enhance threat detection and response by establishing connections between objects with the relationship builder. The following table lists some of its use cases.

Use case Description
Connect a threat actor to an attack pattern The threat actor APT29 Uses the attack pattern Phishing via Email to gain initial access.
Link an indicator to a threat actor A domain indicator allyourbase.contoso.com is Attributed to the threat actor APT29.
Associate an identity (victim) with an attack pattern The attack pattern Phishing via Email Targets the FourthCoffee organization.

The following image shows how the relationship builder connects all of these use cases.

Screenshot showing example relationship being built.

Curate threat intelligence

Configure which TI objects can be shared with appropriate audiences by designating a sensitivity level called Traffic Light Protocol (TLP).

TLP color Sensitivity
White Information can be shared freely and publicly without any restrictions.
Green Information can be shared with peers and partner organizations within the community, but not publicly. It's intended for a wider audience within the community.
Amber Information can be shared with members of the organization, but not publicly. It's intended to be used within the organization to protect sensitive information.
Red Information is highly sensitive and shouldn't be shared outside of the specific group or meeting where it was originally disclosed.

Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an object represents threats from a particular known actor or well-known attack campaign, consider creating a relationship instead of a tag. After you search and filter for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.

For more information, see Work with threat intelligence in Microsoft Sentinel.

View your threat intelligence

View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.

Screenshot that shows an advanced search interface with source and confidence conditions selected.

View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The ThreatIntelligenceIndicator table under the Microsoft Sentinel schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.

Important

Tables supporting the new STIX object schema are in private preview. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with this form. Ingest your threat intelligence into the new tables, ThreatIntelIndicator and ThreatIntelObjects, alongside or instead of the current table, ThreatIntelligenceIndicator, with this opt-in process.

Here's an example view of a basic query for just threat indicators using the current table.

Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table.

Threat intelligence indicators are ingested into the ThreatIntelligenceIndicator table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the ThreatIntelligenceIndicator table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the IndicatorId and SourceSystem properties and chooses the indicator with the newest TimeGenerated[UTC].

The IndicatorId property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, IndicatorId is generated from the source and pattern of the indicator.

For more information, see Work with threat intelligence in Microsoft Sentinel.

View your GeoLocation and WhoIs data enrichments (public preview)

Microsoft enriches IP and domain indicators with extra GeoLocation and WhoIs data to provide more context for investigations where the selected IOC is found.

View GeoLocation and WhoIs data on the Threat Intelligence pane for those types of threat indicators imported into Microsoft Sentinel.

For example, use GeoLocation data to find information like the organization or country or region for an IP indicator. Use WhoIs data to find data like registrar and record creation data from a domain indicator.

Detect threats with threat indicator analytics

The most important use case for threat intelligence in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.

Although you can always create new analytics rules from scratch, Microsoft Sentinel provides a set of built-in rule templates, created by Microsoft security engineers, to take advantage of your threat indicators. These templates are based on the type of threat indicators (domain, email, file hash, IP address, or URL) and data source events that you want to match. Each template lists the required sources that are needed for the rule to function. This information makes it easy to determine if the necessary events are already imported in Microsoft Sentinel.

By default, when these built-in rules are triggered, an alert is created. In Microsoft Sentinel, the alerts generated from analytics rules also generate security incidents. On the Microsoft Sentinel menu, under Threat management, select Incidents. Incidents are what your security operations teams triage and investigate to determine the appropriate response actions. For more information, see Tutorial: Investigate incidents with Microsoft Sentinel.

For more information on using threat indicators in your analytics rules, see Use threat intelligence to detect threats.

Microsoft provides access to its threat intelligence through the Defender Threat Intelligence analytics rule. For more information on how to take advantage of this rule, which generates high-fidelity alerts and incidents, see Use matching analytics to detect threats.

Screenshot that shows a high-fidelity incident generated by matching analytics with more context information from Defender Threat Intelligence.

Workbooks provide insights about your threat intelligence

Workbooks provide powerful interactive dashboards that give you insights into all aspects of Microsoft Sentinel, and threat intelligence is no exception. Use the built-in Threat Intelligence workbook to visualize key information about your threat intelligence. Customize the workbook according to your business needs. Create new dashboards by combining many data sources to help you visualize your data in unique ways.

Because Microsoft Sentinel workbooks are based on Azure Monitor workbooks, extensive documentation and many more templates are already available. For more information, see Create interactive reports with Azure Monitor workbooks.

There's also a rich resource for Azure Monitor workbooks on GitHub, where you can download more templates and contribute your own templates.

For more information on using and customizing the Threat Intelligence workbook, see Visualize threat intelligence with workbooks.

In this article, you learned about threat intelligence capabilities powered by Microsoft Sentinel. For more information, see the following articles: