Lumen Defender Threat Feed Data Connector

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index


Attribute Value
Connector ID LumenThreatFeedConnector
Publisher Lumen Technologies, Inc.
Used in Solutions Lumen Defender Threat Feed
Collection Method Azure Function
Connector Definition Files LumenThreatFeedConnector_ConnectorUI.json

The Lumen Defender Threat Feed connector provides the capability to ingest STIX-formatted threat intelligence indicators from Lumen's Black Lotus Labs research team into Microsoft Sentinel. The connector automatically downloads and uploads daily threat intelligence indicators including IPv4 addresses and domains to the ThreatIntelIndicators table via the STIX Objects Upload API.

Tables Ingested

This connector ingests data into the following tables:

Table Transformations Ingestion API Lake-Only
ThreatIntelIndicators

💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.

Permissions

Resource Provider Permissions: - Log Analytics Workspace (Workspace): Read and write permissions on the Log Analytics workspace are required.

Custom Permissions: - Microsoft.Web/sites permissions: Read and write permissions to Azure Functions to create a Function App is required. See the documentation to learn more about Azure Functions. - Azure Entra App Registration: An Azure Entra application registration with the Microsoft Sentinel Contributor role assigned is required for STIX Objects API access. See the documentation to learn more about Azure Entra applications. - Microsoft Sentinel Contributor Role: Microsoft Sentinel Contributor role is required for the Azure Entra application to upload threat intelligence indicators. - Lumen Defender Threat Feed API Key: A Lumen Defender Threat Feed API Key is required for accessing threat intelligence data. Contact Lumen for API access.

Setup Instructions

⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.

NOTE: This connector uses Azure Functions with Durable Functions to connect to the Lumen Defender Threat Feed API and upload threat intelligence indicators to Microsoft Sentinel via the STIX Objects API. This might result in additional data ingestion costs. Check the Azure Functions pricing page for details.

1. Configuration

STEP 1 - Obtain Lumen Defender Threat Feed API Key

  1. Contact Lumen to obtain API access to our Threat Feed API service
  2. Obtain your API key for authentication.

STEP 2 - Configure Azure Entra ID Application and gather information

  1. Create an Entra application. See the documentation for a guide to registering an application in Microsoft Entra ID.
  2. Create a client secret and note the Application ID, Tenant ID, and Client Secret
  3. Assign the Microsoft Sentinel Contributor role to the application on your Microsoft Sentinel Log Analytics Workspace
  4. Make note of your Workspace ID, as well as the App Insights Workspace Resource ID, which can be obtained from the overview page of the Log Analytics Workspace for your Microsoft Sentinel instance. Click on the “JSON View” link in the top right and the Resource ID will be displayed at the top with a copy button. - Tenant ID: TenantId

    Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel. - Workspace ID: WorkspaceId Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.

STEP 3 - Enable the Threat Intelligence Upload Indicators API (Preview) data connector in Microsoft Sentinel

  1. Deploy the Threat Intelligence (New) Solution, which includes the Threat Intelligence Upload Indicators API (Preview)
  2. Browse to the Content Hub, find and select the Threat Intelligence (NEW) solution.
  3. Select the Install/Update button.

STEP 4 - Deploy the Azure Function

IMPORTANT: Before deploying the Lumen Defender Threat Feed connector, have the Tenant ID, Workspace ID, App Insights Workspace Resource ID, Azure Entra application details (Client ID, Client Secret), and Lumen API key readily available.

  1. Click the Deploy to Azure button.

Deploy To Azure

  1. Fill in the appropriate values for each parameter:

STEP 5 - Verify Deployment

  1. The connector polls for indicator updates every 15 minutes.
  2. Monitor the Function App logs in the Azure Portal to verify successful execution
  3. After the app performs its first run, review the indicators ingested by either viewing the “Lumen Defender Threat Feed Overview” workbook or viewing the “Threat Intelligence” section in Microsoft Sentinel. In Microsoft Sentinel “Threat Intelligence”, filter for source “Lumen” to display only Lumen generated indicators.

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index