🔍 Discovered: This item was discovered by scanning the solution folder but is not listed in the Solution JSON file.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | ThreatIntelligenceUploadIndicatorsAPI |
| Publisher | Microsoft |
| Used in Solutions | Threat Intelligence, Threat Intelligence (NEW) |
| Collection Method | Unknown |
| Connector Definition Files | template_ThreatIntelligenceUploadIndicators_ForGov.json |
Microsoft Sentinel offers a data plane API to bring in threat intelligence from your Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MineMeld, MISP, or other integrated applications. Threat indicators can include IP addresses, domains, URLs, file hashes and email addresses. For more information, see the Microsoft Sentinel documentation.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
ThreatIntelIndicators |
✓ | ✓ | ? |
ThreatIntelObjects |
✓ | ✓ | ? |
ThreatIntelligenceIndicator |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): write permissions are required.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. You can connect your threat intelligence data sources to Microsoft Sentinel by either:
Using an integrated Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MineMeld, MISP, and others.
Calling the Microsoft Sentinel data plane API directly from another application. - Note: The 'Status' of the connector will not appear as 'Connected' here, because the data is ingested by making an API call.
2. Follow These Steps to Connect to your Threat Intelligence:
1. Get Microsoft Entra ID Access Token
To send request to the APIs, you need to acquire Microsoft Entra ID access token. You can follow instruction in this page: https://docs.microsoft.com/azure/databricks/dev-tools/api/latest/aad/app-aad-token#get-an-azure-ad-access-token
- Notice: Please request Microsoft Entra ID access token with scope value:
Fairfax: https://management.usgovcloudapi.net/.default
Mooncake: https://management.chinacloudapi.cn/.default
2. Send STIX objects to Sentinel
You can send the supported STIX object types by calling our Upload API. For more information about the API, click here.
HTTP method: POST
Endpoint: Fairfax: https://api.ti.sentinel.azure.us/workspaces/[WorkspaceID]/threatintelligence-stix-objects:upload?api-version=2024-02-01-preview Mooncake: https://api.ti.sentinel.azure.cn/workspaces/[WorkspaceID]/threatintelligence-stix-objects:upload?api-version=2024-02-01-preview
WorkspaceID: the workspace that the STIX objects are uploaded to.
Header Value 1: "Authorization" = "Bearer [Microsoft Entra ID Access Token from step 1]"
Header Value 2: "Content-Type" = "application/json"
Body: The body is a JSON object containing an array of STIX objects.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊