Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | LumenThreatFeedConnectorV2 |
| Publisher | Lumen Technologies, Inc. |
| Used in Solutions | Lumen Defender Threat Feed |
| Collection Method | Azure Function |
| Connector Definition Files | LumenThreatFeedConnectorV2_ConnectorUI.json |
The Lumen Defender Threat Feed connector provides the capability to ingest STIX-formatted threat intelligence indicators from Lumen's Black Lotus Labs research team into Microsoft Sentinel. The connector automatically downloads and uploads threat intelligence indicators including IPv4 addresses and domains to the ThreatIntelIndicators table via the STIX Objects Upload API.
NOTE: This data connector uses the Azure Functions Flex Consumption Plan. More pricing details are here.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
ThreatIntelIndicators |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Log Analytics Workspace (Workspace): Read and write permissions on the Log Analytics workspace are required.
Custom Permissions: - Microsoft.Web/sites permissions: Read and write permissions to Azure Functions to create a Function App is required. See the documentation to learn more about Azure Functions. - Azure Entra App Registration: An Azure Entra application registration with the Microsoft Sentinel Contributor role assigned is required for STIX Objects API access. See the documentation to learn more about Azure Entra applications. - Microsoft Sentinel Contributor Role: Microsoft Sentinel Contributor role is required for the Azure Entra application to upload threat intelligence indicators. - Lumen Defender Threat Feed API Key: A Lumen Defender Threat Feed API Key is required for accessing threat intelligence data. Contact Lumen for API access.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
NOTE: This connector uses Azure Functions with the Flex Consumption Plan to connect to the Lumen Defender Threat Feed API and upload threat intelligence indicators to Microsoft Sentinel via the STIX Objects API. This might result in additional data ingestion costs. Check the Azure Functions pricing page for details.
(Optional Step) Securely store API keys and secrets in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. Follow these instructions to use Azure Key Vault with an Azure Functions App.
1. Configuration
STEP 1 - Obtain Lumen Defender Threat Feed API Key
STEP 2 - Configure Azure Entra ID Application and gather information
TenantIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel. - Workspace ID:
WorkspaceIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
STEP 3 - Enable the Threat Intelligence Upload Indicators API (Preview) data connector in Microsoft Sentinel
STEP 4 - Deploy the Azure Function
IMPORTANT: Before deploying the Lumen Defender Threat Feed connector, have the following information readily available: - Tenant ID and Workspace ID - Azure Entra application details (Client ID, Client Secret) - Lumen API key 1. Click the Deploy to Azure button.
Basic Settings: - Subscription: Confirm the correct subscription is selected or use the dropdown to change your selection - Resource Group: Select the resource group to be used by the Function App and related resources - Function Name: Enter a globally unique name for the Function App (11-character limit recommended) - App Insights Workspace Resource ID: The Resource ID of the Log Analytics Workspace for Application Insights (click JSON View on the Log Analytics workspace to copy)
Lumen API Settings: - Lumen API Key: Obtain an API key through Lumen support - Lumen Base URL: Filled in automatically and should generally not be changed - Confidence Threshold (Optional): Minimum confidence score (60-100) for indicators (default: 60) - Enable IPv4 (Optional): Enable IPv4 address indicators (default: true) - Enable Domain (Optional): Enable domain name indicators (default: true)
Azure Entra ID Settings: - Workspace ID: Found in the "Overview" tab for the Log Analytics Workspace of the Microsoft Sentinel instance - Tenant ID: Obtained from the Entra App Registration overview page (listed as Directory ID) - Client ID: Obtained from the Entra App Registration overview page (listed as Application ID) - Client Secret: Obtained when the secret is created during the app registration process
STEP 5 - Verify Deployment
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊