Microsoft Sentinel can consume SOC Defenders threat indicators through its native TAXII Threat Intelligence connector — the lowest-effort path for Pro subscribers — or via an Azure Logic App that polls the REST API and pushes indicators through the Microsoft Security Graph. Both methods populate theDocumentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
ThreatIntelligenceIndicator table, making indicators immediately available for analytics rules, hunting queries, and workbooks.
Option 1: TAXII Threat Intelligence connector (Pro)
The TAXII connector is built into Sentinel and requires no custom code. It polls the SOC Defenders TAXII server on a schedule and maps STIX 2.1 indicator objects directly into theThreatIntelligenceIndicator table.
TAXII 2.1 integration requires a SOC Defenders Pro subscription.
Configure the connector
Open the Data connectors blade
In the Azure portal, navigate to your Sentinel workspace. In the left menu, select Data connectors.
Find the TAXII connector
Search for Threat Intelligence – TAXII and open the connector page. Click Open connector page.
Add a new TAXII server
Under Configuration, click Add new and enter the following values:
| Field | Value |
|---|---|
| Friendly name | SOC Defenders |
| TAXII server API Root URL | https://www.socdefenders.ai/api/taxii2/api/ |
| Collection ID | See available collections below |
| Username | Leave blank, or enter apikey |
| Password | Your SOC Defenders API key |
| Import indicators | At most one month old (or choose a range that fits your retention policy) |
| Poll interval | 1 hour |
Choose a collection
Available collection IDs on the SOC Defenders TAXII server:
You can add multiple connector entries — one per collection — if you want to separate indicator types into different ingestion streams.
| Collection | ID |
|---|---|
| All IOCs | all |
| IPs only | ips |
| Hashes only | hashes |
| CVEs | cves |
Option 2: REST API with Logic Apps
If you are on the Free tier or want more control over field mapping and filtering, use an Azure Logic App to pollGET /api/v1/iocs and push indicators to Sentinel via the Microsoft Security Graph tiIndicators API.
Create an app registration
In Azure Active Directory, register a new application. Grant it the
ThreatIndicators.ReadWrite.OwnedBy permission in Microsoft Graph. Note the client ID, tenant ID, and client secret.Create a Logic App
Create a new Logic App with a Recurrence trigger. Set the interval to 15 minutes (Free tier) or 1 minute (Pro).
Add an HTTP action to poll SOC Defenders
Add an HTTP action with:
- Method:
GET - URI:
https://socdefenders.ai/api/v1/iocs?type=ipv4&limit=100 - Headers:
Authorization: Bearer YOUR_API_KEY
Hunting with KQL
Once indicators are in theThreatIntelligenceIndicator table, use these KQL examples to hunt for matches.