Microsoft Defender Threat Intelligence
MicrosoftDefenderThreatIntelligence Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.1.0 and later.
This integration requires Defender Threat Intelligence—premium version
Use the Microsoft Defender Threat Intelligence integration to query enriched threat intelligence data such as articles, threat actor profiles, WHOIS records, and host-related infrastructure.
#
Configure MicrosoftDefenderThreatIntelligence in CortexParameter | Description | Required |
---|---|---|
Application ID (Client ID for Client credentials mode) | False | |
Tenant ID (required for Client Credentials mode) | False | |
Client Secret (required for Client Credentials mode) | Client Secret. Required for Client Credentials mode) | False |
Certificate Thumbprint | Used for certificate authentication. As appears in the "Certificates & secrets" page of the app. | False |
Private Key | False | |
Use Azure Managed Identities | Relevant only if the integration is running on Azure VM. If selected, authenticates based on the value provided for the Azure Managed Identities Client ID field. If no value is provided for the Azure Managed Identities Client ID field, authenticates based on the System Assigned Managed Identity. For additional information, see the Help tab. | False |
Azure Managed Identities Client ID | The Managed Identities client ID for authentication - relevant only if the integration is running on Azure VM. | False |
Azure AD endpoint | Azure AD endpoint associated with a national cloud. | False |
Incident type | False | |
Use Client Credentials Authorization Flow | Use a self-deployed Azure application and authenticate using the Client Credentials flow. | False |
Trust any certificate (not secure) | False | |
Use system proxy settings | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
msg-defender-threat-intel-auth-startRun this command to start the authorization process and follow the instructions in the command results.
#
Base Commandmsg-defender-threat-intel-auth-start
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
msg-defender-threat-intel-auth-completeRun this command to complete the authorization process.\nShould be used after running the msg-defender-threat-intel-auth-start command.
#
Base Commandmsg-defender-threat-intel-auth-complete
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
msg-defender-threat-intel-auth-testRun this command to test if the authorization process is successful.
#
Base Commandmsg-defender-threat-intel-auth-test
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
msg-defender-threat-intel-auth-resetRun this command to reset the authorization process.
#
Base Commandmsg-defender-threat-intel-auth-reset
#
InputThere are no input arguments for this command.
#
Context OutputThere is no context output for this command.
#
msg-defender-threat-intel-article-listGet articles including their properties and relationships.
#
Base Commandmsg-defender-threat-intel-article-list
#
InputArgument Name | Description | Required |
---|---|---|
article_id | Article ID to retrieve specific article details. | Optional |
limit | Number of incidents in the list. | Optional |
odata | Use "odata" query to customize the response | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.Article.id | String | The unique identifier of the threat intelligence article. |
MSGDefenderThreatIntel.Article.title | String | The title of the Microsoft Defender Threat Intelligence article. |
#
msg-defender-threat-intel-article-indicators-listGet indicators of threat or compromise related to the contents of an article.
#
Base Commandmsg-defender-threat-intel-article-indicators-list
#
InputArgument Name | Description | Required |
---|---|---|
article_id | The unique identifier of the article. | Optional |
article_indicator_id | The unique identifier of a specific indicator within the article. | Optional |
limit | Number of incidents in the list. | Optional |
odata | Use "odata" query to customize the response | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.ArticleIndicator.id | String | The unique identifier of the indicator associated with the article. |
MSGDefenderThreatIntel.ArticleIndicator.artifact.id | String | The unique identifier of the artifact (e.g., file, domain, IP) related to the indicator. |
#
msg-defender-threat-intel-profile-listGet Intelligence Profiles including their properties and relationships.
#
Base Commandmsg-defender-threat-intel-profile-list
#
InputArgument Name | Description | Required |
---|---|---|
intel_profile_id | The unique identifier of the intelligence profile. | Optional |
limit | Number of incidents in the list. | Optional |
odata | Use "odata" query to customize the response | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.Profile.id | unknown | The unique identifier of the threat actor profile. |
MSGDefenderThreatIntel.Profile.title | String | The title or name of the threat actor profile. |
#
msg-defender-threat-intel-profile-indicators-listGet Intelligence Profiles Indicators and their properties.
#
Base Commandmsg-defender-threat-intel-profile-indicators-list
#
InputArgument Name | Description | Required |
---|---|---|
intel_profile_id | The unique identifier of the intelligence profile. | Optional |
intel_profile_indicator_id | The unique identifier of a specific indicator related to an intelligence profile. | Optional |
limit | Number of incidents in the list. | Optional |
odata | Use "odata" query to customize the response | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.ProfileIndicator.id | unknown | The unique identifier of the indicator associated with the threat actor profile. |
MSGDefenderThreatIntel.ProfileIndicator.artifact.id | String | The unique identifier of the artifact (e.g., IP address, domain, file hash) linked to the indicator. |
#
msg-defender-threat-intel-hostRead the properties and relationships of a host object.
#
Base Commandmsg-defender-threat-intel-host
#
InputArgument Name | Description | Required |
---|---|---|
host_id | The unique identifier of the host. | Required |
odata | Use "odata" query to customize the response | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.Host.id | unknown | The unique identifier of the host object in Microsoft Defender Threat Intelligence. |
MSGDefenderThreatIntel.Host.registrar | String | The name of the domain registrar responsible for registering the host. |
MSGDefenderThreatIntel.Host.registrant | String | The entity (person or organization) that registered the host domain. |
#
msg-defender-threat-intel-host-whoisGet the specified whoisRecord resource.
#
Base Commandmsg-defender-threat-intel-host-whois
#
InputArgument Name | Description | Required |
---|---|---|
host_id | hostname or IP address. | Optional |
whois_record_id | The unique identifier of a specific WHOIS record. | Optional |
odata | Use "odata" query to customize the response. | Optional |
limit | Number of records in the list. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.Whois.id | unknown | The unique identifier of the WHOIS record in Microsoft Defender Threat Intelligence. |
MSGDefenderThreatIntel.Whois.whoisServer | String | The WHOIS server that provided the domain registration information. |
MSGDefenderThreatIntel.Whois.domainStatus | String | The current status of the domain (e.g., active, clientHold, expired) as reported in the WHOIS record. |
#
msg-defender-threat-intel-host-whois-historyGet the history for a whoisRecord, as represented by a collection of whoisHistoryRecord resources.
#
Base Commandmsg-defender-threat-intel-host-whois-history
#
InputArgument Name | Description | Required |
---|---|---|
host_id | hostname or IP address. | Optional |
whois_record_id | The unique identifier of the WHOIS record whose history you want to retrieve. | Optional |
odata | Use "odata" query to customize the response. | Optional |
limit | Number of records in the list. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.WhoisHistory.id | unknown | The unique identifier of the historical WHOIS record. |
MSGDefenderThreatIntel.WhoisHistory.whoisServer | String | The WHOIS server that provided the historical domain registration data. |
MSGDefenderThreatIntel.WhoisHistory.domainStatus | String | The domain's status at the time of the historical WHOIS record (e.g., clientTransferProhibited, inactive). |
#
msg-defender-threat-intel-hostRead the properties and relationships of a host object.
#
Base Commandmsg-defender-threat-intel-host-reputation
#
InputArgument Name | Description | Required |
---|---|---|
host_id | The unique identifier of the host. | Required |
odata | Use "odata" query to customize the response. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MSGDefenderThreatIntel.HostReputation.id | unknown | The unique identifier of the host object in Microsoft Defender Threat Intelligence. |
MSGDefenderThreatIntel.HostReputation.classification | String | The reputation classification of the host (e.g., Malicious, Suspicious, Unknown). |
MSGDefenderThreatIntel.HostReputation.score | String | TA numerical score representing the confidence or severity of the host's reputation. |