TacitRed CrowdStrike IOC Automation for Microsoft Sentinel

Solution: TacitRed-IOC-CrowdStrike

TacitRed-IOC-CrowdStrike Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher Data443 Risk Mitigation, Inc.
Support Tier Partner
Support Link https://www.data443.com
Categories domains
Version 3.0.2
Author Data443 Risk Mitigation, Inc. - support@data443.com
First Published 2025-11-25
Last Updated 2026-03-16
Solution Folder TacitRed-IOC-CrowdStrike
Marketplace Azure Marketplace · Popularity: ⚪ Very Low (0%)

The TacitRed CrowdStrike IOC Automation solution provides example playbooks that demonstrate how to consume TacitRed threat intelligence from Microsoft Sentinel and prepare indicators for ingestion into CrowdStrike.

Contents

Data Connectors

This solution does not include data connectors.

This solution may contain other components such as analytics rules, workbooks, hunting queries, or playbooks.

Content Items

This solution includes 1 content item(s):

Content Type Count
Playbooks 1

Playbooks

Name Description Tables Used
TacitRed to CrowdStrike IOC Automation This playbook fetches compromised credential findings from TacitRed threat intelligence and creates ... -

Additional Documentation

📄 Source: TacitRed-IOC-CrowdStrike/README.md

Overview

The TacitRed CrowdStrike IOC Automation solution provides playbooks that demonstrate how to consume TacitRed threat intelligence from Microsoft Sentinel and push indicators of compromise (IOCs) to CrowdStrike Falcon for automated threat response.

Solution Components

Component Description
Playbook Logic App that fetches compromised credentials from TacitRed and creates custom IOC entries in CrowdStrike Falcon

Prerequisites

Deployment

  1. Navigate to Microsoft Sentinel Content Hub
  2. Search for "TacitRed CrowdStrike"
  3. Click Install and follow the deployment wizard
  4. Provide the following parameters: - TacitRed API Key: Your TacitRed API credentials - CrowdStrike Client ID: Your CrowdStrike API Client ID - CrowdStrike Client Secret: Your CrowdStrike API Client Secret - CrowdStrike Base URL: Your CrowdStrike API URL (e.g., https://api.crowdstrike.com)

How It Works

  1. The playbook runs on a scheduled trigger
  2. It queries TacitRed for recent compromised credential findings
  3. For each finding, it creates a custom IOC entry in CrowdStrike Falcon
  4. CrowdStrike can then use these IOCs for detection and response

Support

Learn More

Release Notes

Version Date Modified (DD-MM-YYYY) Change History
3.0.3 06-03-2026 Added User-Agent: data443-tacitred-crowdstrike/1.0 header to CrowdStrike API calls (OAuth2 token + IOC POST) for CrowdStrike Technology Partner certification compliance.
3.0.2 02-03-2026 Fixed hardcoded CrowdStrike_BaseUrl default (https://api.us-2.crowdstrike.com) causing auth failures for US-1/EU-1 customers. Cleared to empty string with regional URL guidance.
3.0.1 17-02-2026 Fixed InvalidResourceLocation error: removed non-standard location parameter from inner template. Added missing hidden-SentinelTemplateName and hidden-SentinelTemplateVersion tags so playbook template appears in Sentinel Automation. Removed TacitRed_Domain filter — playbook now fetches all findings.
3.0.0 23-01-2026 Initial Solution Release - Playbook for automated IOC synchronization between TacitRed and CrowdStrike Falcon. Supports Domain and SHA256 IOC types.

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index