Integrate a Microsoft Azure Sentinel Cloud Device

Configure a Microsoft Azure Sentinel cloud SIEM to pull IOCs from Threat Command. The Azure Sentinel connector supports TAXII v2.0.

You must first add the device to Threat Command and then configure the device to pull IOCs from Threat Command.

After the Azure Sentinel device is integrated, you can View dashboards.

When IOCs are pulled to the device, all IOCs are pulled, every time. IOCs are pulled, together with the following Threat Command enrichment data:

  • Source name (reporting feed)
  • System and user tags
  • First seen and last seen
  • Severity
  • Related threat actors, campaigns, or malware
  • Related alert

IOC groups for this device can consist of domains, URLs, IP addresses, file hashes, and email addresses.

Add an Azure Sentinel cloud device

Add a cloud device to Threat Command.

Prerequisites

  • You have the credentials to access the device.
  • You have administrative credentials to access Threat Command with a subscription to the Automation and TIP modules.

To add a cloud device to Threat Command:

  1. Log in to Threat Command at https://dashboard.ti.insight.rapid7.com
  2. From the main menu, select Automation -> Integrations. add cloud device
  3. From the Integrations page, click Cloud.
  4. Click Add new device.
  5. In the Add New Cloud Device dialog, type a user-defined name for the device.
    The name can contain a maximum of 50 letters, spaces, numbers, and underscores.
  6. Select the Device type.
    The default device IOCs limit is displayed.
  7. (Optional) You can change the IOCs limit.
  8. Click Add.
  9. To verify that the new device is added, refresh the Automation > Integrations page.
    The new device is added to the cloud integrations device list. Next to the device name, there is a red dot, indicating that communication has not yet been established. The dot will change to green when the device is synchronized. If the device cannot synchronize for more than 48 hours, an email warning is sent to the account administrator.

Configure a Microsoft Azure Sentinel cloud device to pull IOCs

After a device has been added, you must enable the pulling of IOCs from Threat Command.

Prerequisites:

  • You have the device login credentials.
  • The device has been added.
  • You have administrative credentials to access Threat Command with a subscription to the Automation and TIP modules.
  • An IOC group for this device exists in Threat Command.
    Creating IOC groups is described in Create an IOC group

To configure an Azure Sentinel cloud device:

  1. From the Microsoft Azure portal, open Azure Sentinel.
  2. Select a workspace, then search for Data connectors.
  3. In the Connector list, search for TAXII, then click Open connector page.
  4. In the Configuration section, type the following:
FieldDescription
Friendly nameType a user-defined name. Imported IOCs will be marked with this name.
API root URLCopy/paste from the Threat Command Device Details dialog.
- From Threat Command, select Automation > Integrations.
- From the Cloud device list, select the Azure Sentinel device.
- On the line of the desired IOC group, click the link symbol. test
- From the IOC Group URL dialog, use the Copy button to copy the API Root URL.
- Paste that URL in this field.
Collection IDCopy/paste from the Threat Command Device Details dialog. Follow the same instructions for API Root URL, but copy the Collection ID. The Collection ID is different for each IOC group.
UsernamePaste the Threat Command account ID. For more information, see API key, account ID, and appliance key.
PasswordPaste the Threat Command API appliance key. For more information, see API key, account ID, and appliance key.
  1. Click Add.
    The connector is added to the Connectors list.

Viewing IOCs in Microsoft Azure Sentinel

You can view IOCs that are pulled in from Threat Command in the Azure Sentinel Threat intelligence page. This page shows summary data on imported IOCs as well as details per IOC.

To view IOCs:

  1. From the Microsoft Azure  portal, open Azure Sentinel.
  2. Select a workspace, then search for Threat intelligence.
    The Indicators area displays a summary of all IOCs. To the right is more details on the selected IOC:
    temporary placeholder

In the summary table, you can see the following data:

  • IOC type - IP address, URL, etc.
  • Source - The name that was assigned to the Azure connector.
  • Confidence - This is mapped from the Threat Command severity. Low = 15, Medium = 50, and High = 85
  • Alerts and tags are not relevant.

In the detail per IOC, you can see additional data:

  • Description - The IOC enrichment data. If a Threat Command alert was created, you can copy the URL to Threat Command to see the alert:
    temporary placeholder

Searching for IOCs in Microsoft Azure Sentinel

You can search for IOCs that match criteria in the name, value, description, or tags. For example:

To search for IOCs:

  • In the Indicators search bar, type a term to search for.

IOCs that match the term are displayed.

The Description field contains the IOC enrichment data, and you can search for matches in that field, also. This table summarizes some of the more common uses:

To find thisEnter this in the search bar
IOCs of a specific severityType the severity (high, medium, or low)
IOCs from a specific Threat Command feedType the name of the feed (e.g., intelligence feed)
IOCs from a specific malware or threat actorType the name of the malware or threat actor

View Azure Sentinel Dashboards

You can add the following predefined dashboards to your Azure Sentinel instance:

  • IOCs Overview - Displays all the IOCs sent from Threat Command, broken down by severity and IOC type.
    temporary placeholder
  • Correlation Overview - Displays all the indicator alerts created in Azure Sentinel by customer-configured rules.
    Indicators from those alerts (only) are presented by type and severity and grouped by top tags, top malware, and top threat actors.
    temporary placeholder

The Correlation Overview  page shows the following information:

  • Total Matched Indicators - The total number of indicators that match those in the Azure index.
  • Matched Indicators by Type - A chart distribution of matched indicators by type.
  • Matched Indicators by Severity - A chart distribution of matched indicators by severity.
  • Top Tags Linked with Matched Indicators - The Threat Command tags (for example, phishing) that are attached to the most matched indicators.
  • Top Malwares Linked with Matched Indicators - The name of the malwares (for example, locky) that are associated with the most matched indicators.
  • Top Threat Actors Linked with Matched Indicators - The name of the threat actors (for example, Cobalt Group) that are associated with the most matched indicators.

You can filter both dashboards by the time range and the IOC reporting feeds.

To view these dashboards, you must first add predefined IntSights workbooks to your Azure Sentinel instance.

To add dashboards:

  1. From Azure Sentinel, select Threat management > Workbooks.
  2. Click the Templates  tab (marked as section 1), then search for IntSights.
    temporary placeholder
  3. Select the IOC Workbook, then click View Template.
    The IOCs Overview dashboard tab is displayed. Click Correlation Overview to see the other tab.
  4. After viewing the dashboards, click Save.

Once the dashboards are saved the first time, they can be viewed from the My workbooks menu (marked as section 2).