Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home Security and Compliance

ThreatConnect integrates its TIP and SOAR platform with Microsoft Graph Security API

Azure Sentinel News Editor by Azure Sentinel News Editor
November 16, 2020
in Security and Compliance, Security Ochestration & Automated Response, Security Operations, SOAR, Threat Intelligence
0
ThreatConnect integrates its TIP and SOAR platform with Microsoft Graph Security API
1.5kViews

ThreatConnect announced that it has joined the Microsoft Intelligent Security Association and will integrate Microsoft solutions with the ThreatConnect Threat Intelligence (TIP) and Security Orchestration Automation and Response (SOAR) Platform using the Microsoft Graph Security API.

This integration allows ThreatConnect clients to connect with nearly any piece of Microsoft technology, including Azure Sentinel, O365, and Microsoft Defender ATP, using the Microsoft Graph Security API. The integration allows clients to retrieve alerts, perform data enrichment, gain relevant threat intelligence, and carry out incident response actions.

The Microsoft Graph Security API is a single interface that connects to Microsoft security products. Through this integration, made possible by ThreatConnect’s robust App Services capability, clients are able to subscribe to and listen for Microsoft Graph Notifications, parse these notifications for subsequent operations, and manage Graph Mail and security alerts via ThreatConnect Playbooks.

Deploy indicators to Microsoft Defender ATP and Azure Sentinel

With all of a team’s intelligence in one place, only deploy high fidelity intelligence to Microsoft Graph. When alerts are generated based on intelligence from ThreatConnect, analysts have the information they need to make faster and more informed decisions and the relevant security processes prepared for a timely response.

Office 365 phishing investigation

Automatically trigger a Playbook in ThreatConnect based on a Graph Change Notification that an email has been received in a phishing mailbox in Office 365.

The Playbook will then parse the email and orchestrate an investigation using a combination of ThreatConnect Intelligence, ThreatConnect’s CAL (Collective Analytics Layer), malware analysis tools, and data enrichment sources.

If the email is suspicious or requires further remediation, a Case can be opened in ThreatConnect for an analyst investigation. Additional remediation steps can be automated via the Graph Mail API.

Triage graph security alerts

Automatically trigger a Playbook in ThreatConnect based on a Graph Change Notification for Security Alerts from Azure Sentinel, Azure Security Center, Azure Active Directory Identity Protection, Cloud App Security, Azure Advanced Threat Protection, Azure Information Protection and more.

The Playbook will make a determination and either automatically resolve the alert or open a Case for further investigation. The alert can be updated with these details for tracking purposes.

“ThreatConnect enables organizations to harness threat intelligence and distill it down into actionable insights; benefit from the collective knowledge and talents across their security teams; develop and refine security processes; and enhance the efficacy of technologies across their security ecosystem,” said Andy Pendergast, Vice President of Product at ThreatConnect.

“Integrating ThreatConnect with Microsoft Graph is incredibly important as it allows security teams to increase their accuracy and efficiency, and accelerate incident response processes. Leveraging our App Services and Playbooks technology, users can now dynamically respond to events in the Graph API and orchestrate operations between Microsoft products and other integrated technologies.”

Reference: https://www.helpnetsecurity.com/2020/08/20/threatconnect-microsoft/

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

Vectra AI and Microsoft partner on security integration
Security and Compliance

Replay Now Available – Microsoft Security Insights 036: Azure Sentinel with Rod Trent

February 8, 2021
What’s new: Microsoft Teams connector in Public Preview
Security Operations

AMA for Azure Sentinel on the Microsoft Security Insights Podcast and Twitch Stream

January 25, 2021
What’s new: Microsoft Teams connector in Public Preview
Security Operations

How to Setup a Managed Identity for the Azure Sentinel Logic App Connector

January 21, 2021
Next Post
The ‘All-Seeing’ Azure Sentinel Provides Omnipresent Level Security

The ‘All-Seeing’ Azure Sentinel Provides Omnipresent Level Security

Making Security More Intelligent, Microsoft Releases Azure Sentinel

Making Security More Intelligent, Microsoft Releases Azure Sentinel

WA strikes govt-wide cloud deal with Microsoft

WA strikes govt-wide cloud deal with Microsoft

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

Microsoft brings endpoint & Azure security under Microsoft Defender

Azure Sentinel Daily Task: Analytics Rules

2 months ago
New Azure VMware Solution now generally available in Asia

New Azure VMware Solution now generally available in Asia

3 months ago
Microsoft Targets New Azure Sentinel SIEM for Broader MSSP Market

Microsoft Targets New Azure Sentinel SIEM for Broader MSSP Market

3 months ago
Microsoft suspends 18 Azure accounts tied to China-based hackers

Azure Sentinel Daily Task: Hunting Queries and Bookmarks

2 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Trending

What’s new: Microsoft Teams connector in Public Preview
AI & ML

Azure Sentinel Weekly Newsletter

by Azure Sentinel News Editor
March 1, 2021
0

I’ve sensed this for a while now, but a few days ago it really hit me —...

What’s new: Microsoft Teams connector in Public Preview

How to Generate Azure Sentinel Incidents for Testing

February 26, 2021
What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • Azure Sentinel Weekly Newsletter March 1, 2021
  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News