Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook ingests TacitRed threat intelligence into Microsoft Defender Threat Intelligence via an Azure Function. It runs on a recurring schedule, retrieves compromised credentials from TacitRed, and pushes indicators using the Upload API.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | TacitRed-Defender-ThreatIntelligence |
| Source | View on GitHub |
📄 Source: TacitRedToDefenderTI/readme.md
This playbook automatically synchronizes threat intelligence from TacitRed to Microsoft Defender Threat Intelligence. It retrieves compromised credentials and other threat indicators from TacitRed's API and uploads them to Microsoft Sentinel using the ARM-based createIndicator API.
This playbook is deployed automatically as part of the TacitRed Defender Threat Intelligence solution from Microsoft Sentinel Content Hub.
----------------- ----------------- -----------------
| Logic App | --> | Function App | --> | Microsoft |
| (Scheduler) | | (Processing) | | Sentinel TI |
----------------- ----------------- -----------------
| |
v v
----------------- -----------------
| TacitRed | | Application |
| API | | Insights |
----------------- -----------------
| Parameter | Description | Default |
|---|---|---|
| TacitRed_ApiKey | Your TacitRed API key | Required |
| FunctionAppName | Prefix for the Azure Function App name | tacitreddefenderti |
| Domains | Filter by specific domains (empty = all) | [] |
| DateRange | How far back to look for findings | 30 days |
| Version | Date | Changes |
|---|---|---|
| 3.0.0 | 2025-12-11 | Switched to ARM-based createIndicator API |
| 2.0.0 | 2025-11-10 | Added Function App for processing |
| 1.0.0 | 2025-10-01 | Initial release |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to TacitRed-Defender-ThreatIntelligence