Now Public | Azure Sentinel - STIX TAXII Data Connector

%3CLINGO-SUB%20id%3D%22lingo-sub-1164835%22%20slang%3D%22en-US%22%3ENow%20Public%20%7C%20Azure%20Sentinel%20-%20STIX%20TAXII%20Data%20Connector%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1164835%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Sentinel%20lets%20you%20import%20the%20threat%20indicators%20your%20organization%20is%20using%2C%20which%20can%20enhance%20your%20security%20analysts'%20ability%20to%20detect%20and%20prioritize%20known%20threats.%20Several%20features%20from%20Azure%20Sentinel%20then%20become%20available%20or%20are%20enhanced%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EAnalytics%3C%2FSTRONG%3E%20includes%20a%20set%20of%20scheduled%20rule%20templates%20you%20can%20enable%20to%20generate%20alerts%20and%20incidents%20based%20on%20matches%20of%20log%20events%20from%20your%20threat%20indicators.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWorkbooks%3C%2FSTRONG%3E%20provide%20summarized%20information%20about%20the%20threat%20indicators%20imported%20into%20Azure%20Sentinel%20and%20any%20alerts%20generated%20from%20analytics%20rules%20that%20match%20your%20threat%20indicators.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EHunting%3C%2FSTRONG%3E%20queries%20allow%20security%20investigators%20to%20use%20threat%20indicators%20within%20the%20context%20of%20common%20hunting%20scenarios.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ENotebooks%3C%2FSTRONG%3E%20can%20use%20threat%20indicators%20when%20you%20investigate%20anomalies%20and%20hunt%20for%20malicious%20behaviors.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3ENow%2C%20in%20public%20preview%2C%20You%20can%20stream%20threat%20indicators%20to%20Azure%20Sentinel%20by%20connecting%20to%20TAXII%20servers.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20find%20out%20more%20about%20this%20feature%2C%20you%20can%20reference%20our%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Ftaxiidocs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPublic%20Documentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1164835%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Azure Sentinel lets you import the threat indicators your organization is using, which can enhance your security analysts' ability to detect and prioritize known threats. Several features from Azure Sentinel then become available or are enhanced:

  • Analytics includes a set of scheduled rule templates you can enable to generate alerts and incidents based on matches of log events from your threat indicators.
  • Workbooks provide summarized information about the threat indicators imported into Azure Sentinel and any alerts generated from analytics rules that match your threat indicators.
  • Hunting queries allow security investigators to use threat indicators within the context of common hunting scenarios.
  • Notebooks can use threat indicators when you investigate anomalies and hunt for malicious behaviors.

Now, in public preview, You can stream threat indicators to Azure Sentinel by connecting to TAXII servers.

 

To find out more about this feature, you can reference our Public Documentation.

 

0 Replies