Andrew Posted on 5:45 am

Using Microsoft Defender Threat Intelligence in Sentinel for Advanced Threat Detection

Microsoft Defender Threat Intelligence brings curated threat data from Microsoft’s global research teams directly into Sentinel. By integrating MDTI, security analysts can enrich detection rules, automate threat hunting, and respond faster to campaigns targeting your environment.

Cyber threats don’t take holidays—but your SOC can with the right tools. Today we discover how Defender Threat Intelligence + Sentinel helps identify emerging and persistent threats with real-time IoCs and AI-powered analytics.

Merry Christmas, and here’s a little bit to think about as you wait for the rest your household to wake up and wonder who ate the cookies. Wait….who did eat Santa’s cookies? Can we use threat intelligence to figure out just who ate the cookies?

First up, some non-Santa specific details, then let’s find out more about these missing cookies!

Key benefits include:

  • Real-time IoC ingestion (IP addresses, domains, file hashes)
  • Threat analytics dashboards for emerging campaigns
  • Integration with Sentinel analytics rules and playbooks
  • Support for TAXII and STIX standards for interoperability

Learn more about MDTI integration [learn.microsoft.com]

Detailed Walkthrough: How to Configure MDTI in Sentinel

Step 1: Enable Threat Intelligence Connectors

  • Navigate to Microsoft Sentinel > Content Hub.
  • Install the Threat Intelligence solution.
  • Enable the Microsoft Defender Threat Intelligence connector.
  • Validate permissions: Ensure you have Security Admin or Contributor role.

Step 2: Configure IoC Ingestion

  • Go to Data Connectors > Microsoft Defender Threat Intelligence.
  • Select Connect and configure ingestion settings:
    • Choose IoC types: IP, URL, domain, file hash.
    • Set update frequency (recommended: every 15 minutes).
  • Test ingestion by verifying IoCs in Threat Intelligence blade.

Step 3: Integrate TAXII or Upload API for Custom TI Feeds

  • For external feeds, configure TAXII connector:
    • Provide TAXII server URL and credentials.
    • Map STIX objects to Sentinel schema.
  • Use Threat Intelligence Upload API for custom IoCs.

Step 4: Build Detection Rules

  • Navigate to Analytics > Create Rule.
  • Use KQL queries referencing IoCs:
  • SecurityEvent
    | where EventID == 4688
    | where CommandLine has_any (ThreatIntelligenceIndicator)
  • Enable automation rules to trigger playbooks for high-severity alerts.

Step 5: Use Threat Analytics

  • Access Threat Analytics in Microsoft Defender portal.
  • Review:
    • Emerging campaigns
    • Critical vulnerabilities
    • Indicators linked to active threat actors
  • Apply recommended actions to Sentinel incidents.

Threat Analytics for Sentinel [learn.microsoft.com]

Step 6: Automate Response

  • Create Logic Apps playbooks for:
    • Blocking malicious IPs via firewall API.
    • Sending alerts to SOC teams in Teams.
    • Auto-closing benign positives.

How does this play out in real life? Maybe we can use an example that just happened!

🎅 Tracking Santa with Threat Intelligence: Who Ate the Cookies?

Scenario

It’s Christmas Eve. Santa visited your house, but the cookies you left out are gone. Was it Santa? An insider threat? Or something more unexpected? Using Microsoft Defender Threat Intelligence integrated with Sentinel, we’ll investigate this “incident” like a real SOC team—only this time, the culprit is a reindeer.

Step 1: Enable Threat Intelligence Connectors

Before we start hunting, we need MDTI data flowing into Sentinel.

  • In Microsoft Sentinel, go to Content Hub.
  • Install the Threat Intelligence solution.
  • Enable the Microsoft Defender Threat Intelligence connector.
  • Validate permissions: Ensure you have Security Admin or Contributor role.

Why? This gives us access to IoCs like suspicious IPs, domains, and file hashes—perfect for tracking Santa’s sleigh telemetry and cookie-related anomalies.

Step 2: Ingest Santa’s IoCs

Santa’s sleigh uses a custom telemetry system. We’ll simulate IoCs:

  • Add IoCs for:
    • IP: 203.0.113.25 (Santa’s sleigh beacon)
    • Domain: northpole.santa-secure.com (FQDN Not Confirmed!)
    • File Hash: cookie_recipe_hash
  • Configure ingestion frequency: every 15 minutes (Santa moves fast!).

Technical Tip: Use Threat Intelligence blade to verify IoCs are active.

Step 3: Create Detection Rules

We suspect cookie theft. Let’s build a KQL rule to catch unusual access:

DeviceFileEvents
| where FileName == "cookies.txt"
| where InitiatingProcessAccountName !in ("Santa")
| join kind=inner ThreatIntelligenceIndicator on $left.RemoteIP == $right.NetworkIP

Logic: If any process other than Santa accessed cookies.txt and matches an IoC, raise an alert.

Step 4: Threat Analytics Review

Open Threat Analytics in Defender portal:

  • Check for emerging campaigns (e.g., “Operation Cookie Monster”).
  • Review IoCs linked to non-human actors (hint: reindeer telemetry shows up as anomalous device IDs).

Step 5: Automate Response

When the alert fires:

  • Trigger a Logic App playbook:
    • Send Teams message: “Cookie breach detected! Suspect: Reindeer.”
    • Block sleigh IP from accessing pantry network.
    • Log incident in Sentinel.

Step 6: Confirm the Culprit

Run a hunting query:

SecurityEvent
| where AccountName == "Reindeer"
| where EventID == 4624 // Successful logon
| project TimeGenerated, AccountName, DeviceName

Result: Reindeer accessed the kitchen at 02:14 AM.
Case closed—the cookies were eaten by Dasher and friends.

I hope you have a Merry Christmas and a Happy New Year’s! Thanks for another wonderful year in the Microsoft online community. Enjoy a wonderful holiday season and remember to take time to have some fun with your work!