Microsoft Azure Sentinel

Ingest threat intelligence from Obstracts into Microsoft Azure Sentinel for log matching.



This integration uses the STIX/TAXII 2.x data Connector for Azure Sentinel which comes as standard in Azure Sentinel deployments.
STIX/TAXII 2.x data Connector for Azure Sentinel
  1. 1.
    Navigate to the Threat Intelligence - TAXII connector
  2. 2.
    Select add new
  3. 3.
    Set the following field values:
    1. 1.
      Friendly name (for server): Will be shown against intelligence ingested, but can be anything you like
    2. 2.
      API root URL: It’s easy to construct the Root URL. You just need your Obstracts Group UUID, obtained on the Group Management page in the Obstracts web app.
    3. 3.
      Collection UUID: The Collection UUID is a Feed UUID in Obstracts and can be obtained from the Feed List page in the Obstracts web app.
    4. 4.
      Username: your Obstracts username
    5. 5.
      Password: your Obstracts API key
    6. 6.
      Import indicators: Select, "At most one month old" (or sooner). Important: We do not allow download of older indicators.
    7. 7.
      Polling frequency: Select, "1 hour".
Now click save, and you should see intelligence being ingested.


Once data connector is enabled, the ingested threat intelligence will be used by active rules in Azure Sentinel that utilise threat intelligence.