Forum Discussion
Minemeld Threat Intel Integration to Sentinel
The data is getting to the Graph via an Mimemeld extension provided by them here https://github.com/PaloAltoNetworks/minemeld-msgraph-secapi.git
The how to can be found here https://live.paloaltonetworks.com/t5/MineMeld-Articles/Send-IOCs-to-Microsoft-Graph-API-With-MineMeld/ta-p/258540
You are saying to remove the IPv4 bit after ingestion by the Graph?
Also that would only be part of the problem. There is still the IP range that is problematic to interpret in KQL.
You have two options:
- Create a custom ingestion script which removes the IPv4 bit and calculates the ranges
- Keep adapting your query
- pavankemiMay 15, 2020Brass Contributor
By any chance is there any solution for this. I just integrated Minemeld with Azure Sentinel and see the similar issue of getting range of IP address which will not help us to identify from which single IP the actual threat is
- Thijs LecomteMay 17, 2020Bronze ContributorThere haven't been any developments for this. Have you check the mimemeld side of things?
- pavankemiMay 17, 2020Brass Contributor
Yup. No luck. Could not find anything related to the IP range