Figuring out MISP2Sentinel Event Filters

How they work, how to use them and some (hopefully not horrible) examples.

MISP is becoming a popular open source option for managing threat intelligence at the operational level by sharing indicators of compromise (IOCs) and contextualizing them with other data. It can, however, be a bit daunting to figure out how to use the event filters. In this post I’ll go through... [Read More]
Tags: MISP, Threat Intelligence, Microsoft Sentinel, IOC

Use Update Indicators API to push Threat Intelligence from MISP to Microsoft Sentinel

A quick intro on how to set up MISP, Azure Functions and Sentinel to push threat intelligence from MISP to Sentinel

An updated guidance on how to set up the MISP2Sentinel Azure Function to push threat intelligence from MISP to Microsoft Sentinel using the new Upload Indicators API. [Read More]
Tags: Cloud Security, Microsoft Sentinel, Data Connectors, Azure Functions, Automation, MISP, Upload Indicators API