Connect X-Force Exchange API on Microsoft Sentinel
Published Mar 23 2020 08:22 AM 6,378 Views

This article is authored by Priscila Viana

Follow these easy steps for connecting your Threat Intel feed on Microsoft Sentinel and take full advantage of this solution focused on empower your Blue Team.

Pre-Requisites

You should have an Active Subscription on Microsoft Sentinel with an active Log Analytics workspace. On IBM X-Force, follow the steps provided in the “Obtaining an API Key and Password” section in the URL - https://api.xforce.ibmcloud.com/doc/#introduction to create a new API Key and Password for the registered user on this service.

 

API Root and Collections ID

Navigate on https://api.xforce.ibmcloud.com/doc/#TAXII2_get_taxii2  section and you’ll see a Curl example like this, which return us the API Root information:

 

curl -u {apikey:password} -H "Accept: application/vnd.oasis.taxii+json; version=2.0" https://api.xforce.ibmcloud.com/taxii2

 

Check if you got a successful response like this:

 
 

Now, if you go to: https://api.xforce.ibmcloud.com/doc/#TAXII2_get_taxii2_collections you’ll another example via curl, where you easily can extract the collections IDs you need to make the connection:

 

curl -u {apikey:password} -H "Accept: application/vnd.oasis.taxii+json; version=2.0" https://api.xforce.ibmcloud.com/taxii2/collections

Check if you got a response like this bellow:

xforce2.png

 

 

In this scenario, we’ll choose one of the Collections IDs returned by the command above. But you can customize with your needs.

Add the Connector

Azure Sentinel provides interesting ways to ingest your Threat Intel feed. You can do this via: Threat Intelligence Platforms connector, Threat Intelligence TAXII connector or you can easily build a custom connector for this. In this scenario, we’ll connect via Threat Intelligence TAXII connector.

For more detailed information about others connectors, I do recommend you read the article: https://techcommunity.microsoft.com/t5/azure-sentinel/bring-your-threat-intelligence-to-azure-sentin...

Now that we’ve all information we need, let’s add the Connector.

On Microsoft Sentinel go to: Data Connectors >> Threat Intelligence (TAXII) >> click Open connector page

Fill-out the connector page with the information:

 

Friendly name: write any name

TAXXI server: https://api.xforce.ibmcloud.com/taxxi2/

Collection ID: put any collection ID you grab on the earlier step (in this example, I’ve chosen 9a368014-0b34-540c-b767-333d32d66924)

Username and password: put the API key and password you’ve got on the earlier steps

Finally, click Add button. After a few seconds, you’ll see the server being listed below:

 xforce3.png

 

 

Ok. Now, since we want to be sure everything is running smoothly, take the advantage of the built-in queries provided by the solution and execute as the example below:

 

ThreatIntelligenceIndicator

| where TimeGenerated >= ago(1d)

xforce4.png

 

 

We can see the events being ingested on Microsoft Sentinel, but we need to enable the Analytics Rules related this Threat Intel Connector correlating them with our existing infrastructure Data connectors (Office365, Azure AD, Syslog, SecurityEvents, etc) in order to trigger Incidents.

To enable this, come back to Threat Intel connector page and open it.

You’ll see in the description pane, the information regarding 26 built-in rules templates that can be enabled to create related incidents

xforce5.png

 

 

 

Create the Analytics rules

Create rule for each one of the Threat Analytics information that you want to correlate. For this, check what rule is most appropriate for what you want and click create rule:

 

 

Tip: Note that each rule have at least two Data Sources (in Data Sources column). One for the Threat Intel we’ve just added and another for the related use Case. For instance: If I need to correlate the Threat Intel information with my Office365 activities, I need to have Office365 Data connector connected on my Microsoft Sentinel workspace.

After clicking Next, you’ll be assisted by rule wizard process creation. Adjust the frequency, lookback data and threshold for this schedule rule. All KQL rule is already automatically filled-out in the Rule query section. Click Next.

 

 

Another cool thing you can take advantage of is the Alert aggregation feature on Microsoft Sentinel. As best-practice, for this scenario, be sure this feature is enabled.

 

xforce7.png

Finally, you can attach an Automated response everytime the incident is triggered, using the Playbooks feature. Since this could extend this article, let’s take this in another opportunity.

That’s all. Basically, now you have your connector enabled and running, I do recommend explore Workbooks feature for a management overview of what’s is happening.

 

Workbooks

Microsoft Sentinel provides couple of built-in Workbooks for most used SOC scenarios. In this example, we’ll use “Threat Intelligence” from Microsoft, on which you can build you own using this built-in as a template.

xforce9.png

 

 

 

On Microsoft Sentinel go to: Workbooks>> Threat Intelligence >> click Save button then, click View saved workbook

 

xforce10.png

 

Note that this is a dynamic dashboard, meaning that if you click on a specific indicator, the graph will be automatically updated to reflect this.

Hope you enjoy!.

3 Comments
Copper Contributor

@Nicholas DiCola (SECURITY JEDI) I have done everything exactly. But error when connecting data connector . "TAXII API root URL or Collection ID is not valid." What could be wrong ? 

I have even created new API ID and password but no luck. Just wondering... Does it required subscription to receive taxii feeds through API ?

Capture.JPG

Copper Contributor

@msraj there is an mistake in API root URL - try with https://api.xforce.ibmcloud.com/taxii2/

Copper Contributor

This doesn't work. I get the same error as @msraj . I have validated everything with curl. I'm trying a different stix2 endpoint https://api.xforce.ibmcloud.com/xfti

The error message from the connector is poor, hard to troubleshoot.

Version history
Last update:
‎Nov 02 2021 05:51 PM
Updated by: