SOC Defenders aggregates threat indicators from 30+ cybersecurity sources and makes them available through multiple integration methods so you can get IOCs into your SIEM without building a custom pipeline from scratch. Whether you prefer polling a REST API on a schedule, using the native TAXII 2.1 protocol your SIEM already understands, or streaming events over a syslog pipeline, there is an approach that fits your existing stack.Documentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
Integration approaches
SOC Defenders supports three primary methods for delivering threat intelligence to your SIEM.REST API polling (JSON or CSV)
Available on the Free and Pro tiers, the REST API is the most flexible option. You pollGET /api/v1/iocs on a schedule — every 15 minutes is recommended for Free accounts, while Pro accounts can poll continuously. The API returns paginated JSON or CSV that you can parse and forward to your SIEM using a scripted input, Azure Logic App, or any HTTP-capable automation tool.
TAXII 2.1 (Pro)
TAXII 2.1 is the industry-standard protocol for threat intelligence feed distribution. SOC Defenders exposes a TAXII server athttps://www.socdefenders.ai/api/taxii2/ that your SIEM’s native threat intelligence connector can poll automatically. Collections are organized by IOC type (all IOCs, IPs only, hashes only, CVEs), and indicators are delivered as STIX 2.1 objects.
Use TAXII when your SIEM has a built-in threat intelligence module — Splunk Enterprise Security and Microsoft Sentinel both have native TAXII connectors — and you want zero-maintenance feed ingestion.
CEF/Syslog (Pro)
TheGET /api/v1/iocs/cef endpoint returns IOCs in Common Event Format, ready for ingestion through any syslog-based log pipeline. Use CEF/Syslog when your organization already routes security events through a syslog forwarder and wants to treat threat indicators as another log source.
Supported SIEMs
| SIEM | REST API | TAXII 2.1 | CEF/Syslog |
|---|---|---|---|
| Splunk | Yes | Yes (Pro) | Yes (Pro) |
| Microsoft Sentinel | Yes | Yes (Pro) | Yes (Pro) |
| IBM QRadar | Yes | Yes (Pro) | Yes (Pro) |
| Elastic Security | Yes | Yes (Pro) | Yes (Pro) |
| Google Chronicle | Yes | Yes (Pro) | Yes (Pro) |
Choosing an approach
- REST API — best for custom pipelines, scripted inputs, or when you need to filter or transform indicators before ingestion.
- TAXII 2.1 — best for SIEMs with native threat intelligence connectors; requires Pro and provides the lowest-maintenance integration.
- CEF/Syslog — best for organizations routing all security data through a centralized syslog forwarder.
SIEM integration guides
Splunk
Pull IOCs via REST scripted input or TAXII 2.1 in Splunk Enterprise Security. Includes SPL hunting queries.
Microsoft Sentinel
Configure the TAXII Threat Intelligence connector or poll via Logic Apps. Includes KQL hunting queries.
Elastic Security
Ingest IOCs through the REST API or Elastic Agent TAXII integration. Includes EQL detection examples.
TAXII 2.1 format guide
Reference for TAXII collections, STIX object structure, and authentication.