apis
68 TopicsIntegration of Microsoft Sentinel & Microsoft TEAMS for integration of alerts
What are some of the best methods and strategies to start implementing an integration between Sentinel and TEAMS where when there are certain instances or alerts occurring, said alerts can be pinged to certain members on Microsoft TEAMS like through the use of playbooks, automations and setting up a API connection to integrate the two.7.7KViews0likes4CommentsThreat Intelligence Indicators in Microsoft Sentinel
Hello Microsoft Community, This is my first post and I hope it will be helpful for those who are trying to understand how the Threat Intelligence (TI) Indicators feature works on Microsoft and especially in Microsoft Sentinel. But before that, I would like to share my own experience. Working with a lot of customers I have had a big number of questions about how to automate the purging process of stale TI indicators from Sentinel. There is a way to do it manually, but if you have thousands of them, it will be a tough task to remove only one hundred at a time. I decided to automate this process and started investigating different kinds of automation (Graph API, PowerShell, etc.). After some investigation, the API command that allows to get a list of all indicators stored in Microsoft tenant was found. This one: GET https://graph.microsoft.com/beta/security/tiIndicators. And I decided to build a Logic App that will get all TI indicators, extract their IDs and then remove each of them by running DELETE https://graph.microsoft.com/beta/security/tiIndicators/{id}. Unfortunately, when I was testing it, I stuck with the situation when I was getting nothing even though I have more than one thousand indicators in my test environment. Trying to search on forums, asking questions I got no answers and decided to open a case for Microsoft Support. I really appreciate Microsoft Support team for providing a professional and fast response and explanation. Now, I will try to explain a little bit how the TI backend works on Microsoft. Let’s move to the technical part. 1. TI indicators ingestion There are a few ways to ingest TI indicators. The first one is to use a built-in TAXII connector. There are plenty of them. You can use, for example, Anomali, IBM X-Force, Pulsedive, and others. The configuration is simple, based on Microsoft you only need to get the TAXII server API Root and Collection ID, and then enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel. The second way is to build a playbook that will pull TI indicators from a TI provider and push them into Sentinel Using Graph Security API. There is a great playbook for pulling TI indicators from Alien Vault: Azure-Sentinel/Playbooks/Get-AlienVault_OTX at master · Azure/Azure-Sentinel (github.com) Such kinds of playbooks require minor configuration and can be deployed from GitHub. The third way for adding TI indicators is flat file import. This feature is currently in Private Preview and will be available soon for the Public. Sentinel administrators will be able to import indicators from a CSV or JSON file. And the last way is manual creation. This is a good option only if you have a few indicators to add and have no time to write scripts and build automation. One more important thing to mention is the fact that Graph Security API serves Threat Intelligence by TenantID and AppID (the application ID that uploads the TI through GSA and was configured in Azure AD). If the TI indicators were uploaded using one application (AppID) and then queried with another application (AppID), the data will not be returned. For example, if you use the playbook mentioned above, you should Register an application in your Azure AD to ingest indicators. Then you will not be able to query those indicators with another application, for example, with Microsoft Graph Explorer. You must use the same application to get the list of indicators you uploaded. 2. TI indicators storing Based on Microsoft, when using the tiIndicators entity, you must specify the Microsoft security solution you want to utilize the indicators for via the targetProduct property and define the action (allow, block, or alert) to which the security solution should apply the indicators via the action property. In the playbook for pulling indicators from GitHub, we have the following parameter: “targetProduct” that should be “Azure Sentinel”. Yes, Azure and not Microsoft Sentinel. By setting this parameter, we configure the playbook to ingest logs into Sentinel Log Analytics Workspace and so we will be able to process the ingested indicators later. In Logs under Microsoft Sentinel, a new table is created “ThreatIntelligenceIndicator”. This is our final diagram for Microsoft Sentinel: TI indicators are not stored only in the Sentinel LAW. There are also stored in Microsoft backend with a retention period of 1 year or if deleted via the API. For Log Analytics Workspace the retention period is usually configured by a customer and data is there until deleted. 3. TI indicators pulling As well as for ingesting indicators, there are a few ways for pulling them from Microsoft backend and from Log Analytics Workspace. It was mentioned previously that to pull indicators from Microsoft Graph backend you should use Microsoft Security Graph API with the same Application and Tenant ID. Otherwise, you will get nothing. You should also pay attention to the expiration date of the ingested certificates. If you try to get a specific indicator(s) and get nothing, probably it has been expired and removed from the Graph backend. Use this resource Graph Explorer | Try Microsoft Graph APIs - Microsoft Graph to test the API. Pulling TI indicators from Sentinel Log Analytics Workspace is simpler. You need to open a Sentinel LAW and get them by running a KQL query. For example, this one: ThreatIntelligenceIndicator | project TimeGenerated, Description, IndicatorId | top 100 by IndicatorId This KQL will show you the first 100 indicators by IndicatorID. Don’t forget to set a date under “Time range”. You can also use built-in queries to protect your environment or build your own queries based on your company requirements. The last way to see TI indicators ingested into your Sentinel is by opening Threat Intelligence page in Microsoft Sentinel. This page will provide you with details for each indicator, allow you to remove them (only 100 at a time) and edit their details. Summary Microsoft's security ecosystem has a huge number of capabilities that help organizations to protect their environments from modern security threats. And TI indicators is only one piece of the puzzle called Threat Intelligence. It is important to understand how this feature works to gain the best results from it. I hope the information provided in this article will be helpful for the community and will allow to understand how the Microsoft TI works better. If you have any questions or suggestions for the text, I will be glad to hear them. There is an amazing webinar Threat Intelligence published by Microsoft Team: Cyber Threat Intelligence Demystified in Microsoft Sentinel - YouTube You can also find the article on LinkedIn: Threat Intelligence Indicators in Microsoft Sentinel | LinkedIn7.1KViews1like3CommentsAzure Sentinel API Documentation
Hi Team, We have requirement to integrate azure sentinel with IBM Qradar/IBM Resilient for centralized incident management. I.e. we will send all the incidents generated in azure sentinel to IBM Qradar/IBM Resilient. Do we have Azure Sentinel API's and documentation available ? Please confirm. Tx6.1KViews1like6CommentsNew Blog Post | How to Query HaveIBeenPwned Using a Microsoft Sentinel Playbook
How to Query HaveIBeenPwned Using a Microsoft Sentinel Playbook - Azure Cloud & AI Domain Blog (azurecloudai.blog) I’ve known Troy Hunt for a number of years and his contributions to the security and privacy industry have been hugely valuable and much appreciated by the masses. HaveIBeenPwned is a great resource developed and maintained by Troy. It provides the ability to query against its database to expose domains or user accounts that have been caught up in any of the number of reported industry data breaches. Wouldn’t it be nice, then, to have this data available for your Microsoft Sentinel investigations? Fortunately, Troy provides an API for his service. I’ve provided a Microsoft Sentinel Playbook that takes email addresses associated with an Incident and submits them through the API and returns a quick note to the Comments tab in the Incident as to whether or not the email address(es) has been compromised. Original Post: New Blog Post | How to Query HaveIBeenPwned Using a Microsoft Sentinel Playbook - Microsoft Tech Community4.7KViews0likes1CommentHow do I create a custom data table and is it necessary in this scenario?
Recently came across some documentation to push logs in an AWS S3 bucket to Sentinel using a lambda function via the log analytics API. Looking at the documentation it looks like I would have to setup a custom data table but there's nothing that covers that in the doc. Also not entirely sure where this data will go when pushed from the S3 bucket. How would I do this and is it necessary in this scenario? Link to docs below. https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/S3-Lambda I am unable to use the AWS S3 Data Connector from content hub as the logs we're pushing (AWS WAF) are not supported by that connector.4.4KViews0likes8CommentsAzure Sentinel REST API create incident
Trying to create a new incident using https://docs.microsoft.com/en-us/rest/api/securityinsights/incidents/createorupdate 'Tryit' from the above page does not work for Create Incident. The List Incidents API works using 'Tryit'. Request: PUT https://management.azure.com/subscriptions/<tenant id>/resourceGroups/<groupname>/providers/Microsoft.OperationalInsights/workspaces/<workspacename>/providers/Microsoft.SecurityInsights/incidents/73e01a99-5cd7-4139-a149-9f2736ff2ab5?api-version=2020-01-01 Authorization: Bearer ey..... Content-type: application/json Body: { properties.severity: "High", properties.status: "New", properties.title: "Example Title" } Response: 400 for bad request { "": [ "Invalid JavaScript property identifier character: .. Path '', line 2, position 11." ] } Also, what is recommended way to create an incident ID for a new incident? Thank YouSolved3.9KViews0likes3CommentsUsing Sentinel API to connect Zscaler Cloud NSS
Hi guys, I'm looking into connecting my Zscaler environment logs to Sentinel via Zscaler Cloud NSS. Which will stream the logs direct to Sentinel without a VM. Zscaler Cloud NSS is asking Sentinel API URL. Which one should I use? How can I find out? I think I'm also trying to grasp the entire workflow of this. Do I need to set up Functions App - write some code that will make the two endpoints talk to each other? Or do I need to register an app in AAD and grant the permissions to pull/push data? If I'm totally wrong, what is the method I would need to use instead?Solved3.6KViews0likes3CommentsHow to avoid query results to not display columns with null results ?
Hi, Using the API, I am running a query across several tables and projects specific columns from each table if the data is present. However, API output displays expected results but it also contains empty columns if the data is not present in it. For example, my query is meant to display only few columns i.e. column A from table1, column B from table 2 and C from table 3. If column C is empty, API will display column A, B and C. But, the UI will display only column A and B (hides those column with empty data) The UI has an option under settings and using it we are able to omit such empty columns in query results. Wondering if there are any commands that can help me while using the API ?3.2KViews0likes2CommentsUnable to send logs to Log Analytics workspace using Data Collection Endpoint
Unable to send logs to Log Analytics workspace using Data Collection Endpoint. Received 204(No content) as http response. No logs are observed/recorded in the custom table. I have followed the below approach. Step1 : Created a custom table. Step2 : Registered an application and granted below permissions Step 3 : Created a Data collection Endpoint in same region (East US) of Log analytics workspace. Step 4 : Created a Data collection rule in the same region (East US). Step 5 : Using Postman or Logic App I have tried to POST some sample JSON data to LAW. Sample data matches the Table Schema and DCR schema as well Below is the schema of the table used REST API response with error 204 [no content] Table not showing any results https://learn.microsoft.com/en-us/azure/azure-monitor/logs/tutorial-logs-ingestion-api3.1KViews0likes4CommentsMDATP Full Telemetry Ingestion
I noticed from a previous post (way back in September) that the MDATP streaming api was being assessed for possible integration with Sentinel. Is there any update to the possibility of this happening? I know there are ways around getting the data into Log Analytics, but it would be huge if we could get that telemetry in so that advanced hunting with that endpoint telemetry could be conducted within Sentinel. Additionally, is there a recommended venue to get visibility on the Sentinel development roadmap?Solved3.1KViews1like3Comments