Blog Post

Microsoft Defender Threat Intelligence Blog
2 MIN READ

Defender TI Detections in Microsoft Sentinel

Alexandra_Roland's avatar
Oct 25, 2022

Overview

 

Microsoft Sentinel users can use Microsoft Defender Threat Intelligence (Defender TI) 's threat intelligence indicators to generate detections within Microsoft Sentinel. Microsoft Sentinel users with appropriate permissions can enable the "Microsoft Threat Intelligence Analytics" Analytic rule template, which will allow the correlation of Defender TI's threat intelligence phishing and malware feed indicators along with its' article indicators against the user's event logs in their Log Analytics workspace every hour. Suppose there is a correlation between the Defender TI indicators and the user's logs. In that case, an incident will generate, and the indicator that triggered the incident will write to Sentinel's Threat intelligence table. Therefore, the user can then view the indicator in their Microsoft Sentinel Threat intelligence blade and the associated incident in the Incidents blade. Users will need to filter by the Microsoft Threat Intelligence Analytics source to identify Defender TI phishing, malware, and article indicators that have generated incidents.

Figure 1 – Threat Intelligence indicators, filtered by Microsoft Threat Intelligence Analytics source

 

How to locate the "Microsoft Threat Intelligence Analytics" Analytic Rule template

 

Microsoft Sentinel users with appropriate permissions can access the "Microsoft Threat Intelligence Analytics" rule template by accessing the Analytics blade, navigating to Rule Templates, and searching "Microsoft Threat Intelligence..." in the search bar. Here, they can view the Microsoft Threat Intelligence Analytic rule template available to enable or disable (if already in use). For more information on how to enable Analytic rule templates, see Microsoft Sentinel's built-in threat detection rules. For more information on Microsoft Sentinel's threat intelligence analytic rules, see New Threat Intelligence features in Microsoft Sentinel - Microsoft Tech Community and Work with threat indicators in Microsoft Sentinel | Microsoft Learn.

Updated Dec 14, 2022
Version 4.0

6 Comments

  • raindropsdev's avatar
    raindropsdev
    Iron Contributor

    Hi,

     

    Thank you for the post.

     

    How do we add a whitelist or a watchlist for the Threat Intelligence Incidents? It's catching a lot of the phishing test domains and creating incidents about it, which is something we now handle with automation rules, but it would be nice to be able to filter them out at the source, before the incident is created.

     

  • BaselFawal's avatar
    BaselFawal
    Brass Contributor

    Hi Mike_Browning , I am actually referring to Threat Intelligence indicators (IOCs) from Microsoft itself, i.e URL, IP addr, etc..

     

    I got one Sentinel instance that shows the source of the Threat Intelligence as Microsoft (as shown in the screen shot), I amnot sure how these are fed, 

    it shows the source as "Microsoft Threat Intelligence Analytics" if it were from 3rd party sources it will show the source as "SecurityGraph"

     

    So I am wondering how it is possible to ingest Threat Indicators from Microsoft Threat Intelligence itself rather from 3rd party.

    Thanks

     

     

  • BaselFawal's avatar
    BaselFawal
    Brass Contributor

    Hi Alexandra, Thank you for the blog.

    I would like to know, how to enable the "Microsoft Threat Intelligence Analytics" TI Source in Microsoft Sentinel, I was able to integrate 3rd party sources i.e. "Security Graph" but interested to enable Microsoft TI Analytic as source?