Skip to content

A connector to push MISP IOCs to Azure Sentinel and Microsoft Defender ATP

License

Notifications You must be signed in to change notification settings

nv-pipo/misp-to-sentinel-and-defender-connector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

98 Commits
 
 
 
 
 
 
 
 

Repository files navigation

About

This project contains a connector to push MISP IOCs to Azure Sentinel and Microsoft Defender ATP. An alternative to https://github.com/microsoftgraph/security-api-solutions/tree/master/Samples/MISP

Installation

Requirements

Credentials

Python environment

Install dependencies on a python 3.8+ environment (probably works with older versions of python, but it has not been tested).

pip install pymisp

Download

git clone [email protected]:nv-pipo/misp-to-sentinel-and-defender-connector.git

Running

Recommended use is to have a cronjob and run the script every hour.

If you are planning to run on Kubernetes, you can store the credentials on k8s secrets and provided to the pod via env variables.

If you are using Azure Functions, the function can be called by a playbook retrieving the credentials from a key vault.

# Either hard code authentication credentials on config.py or use env variables. 
export MISP_KEY="MISP auth token"
export MISP_BASE_URL="https://mispurl"

export MSGRAPH_TENANT_ID="TENANT ID"
export MSGRAPH_CLIENT_ID="MS GRAPH CLIENT ID"
export MSGRAPH_CLIENT_SECRET="MS GRAPH CLIENT TOKEN"
export MSGRAPH_TARGET_PRODUCT="Target product" # Either 'Azure Sentinel' or 'Microsoft Defender ATP'
export MSGRAPH_DAYS_TO_EXPIRE="20" # number of days after which the IOC will expire

# run
python ${DOWNLOAD_FOLDER}/misp-to-sentinel-and-defender-connector/app/src/main.py

References

About

A connector to push MISP IOCs to Azure Sentinel and Microsoft Defender ATP

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published