Skip to content

External Integrations: Microsoft Sentinel

Microsoft Sentinel is a cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.

Microsoft Sentinel enables you to use produced threat intelligence by using SEKOIA.IO’s TAXII feed.


The first thing to do is to configure to create a new CTI feed dedicated to Microsoft Sentinel and an API key so that you can access the CTI objects from Microsoft Sentinel.

Create a new API Key

You should create a new API Key in’s “User Center”:

  1. Go to’s User Center.
  2. On the left menu, click on “Managed Communities”.
  3. Then click on the “API keys” tab title
  4. Create a new API key and give a title and a description.
  5. Finally, give the “Intelligence Center Read-Only” role to the API Key and click on the “Save” button.
  6. Copy the API Key (which is only displayed once).

Please keep the resulting API Key carefully as it will be required later.

Create a New Feed

In order to bring threat intelligence in Microsoft Sentinel, the first step consists in creating a new CTI feed within SEKOIA.IO.

  1. On’s Intelligence Center, connect to the “Feeds” section
  2. Create a new CTI feed by clicking on the “+ Feed” button:
  3. Fill the feed creation form with the following information. Set an arbitrary title for you feed, choose to only export CTI “indicators” and choose the “JSON” format.
  4. Click on “Save”:
  5. After saving, the feed list is displayed. You can click next to the feed title to copy its unique identifier.

Please keep the feed title unique identifier carefully as it will be used later.

Configure CTI Feed in Microsoft Sentinel

  1. Go to the Microsoft Sentinel interface in Microsoft Azure.
  2. In the “Configuration” menu, click on “Data connectors”.
  3. Search for “TAXII” and select “Threat intelligence - TAXII” connector.
  4. Click on the “Open connector page” button.

In the “Threat intelligence - TAXII” connector page, fill the form with the following information:

  • Friendly name (for server):
  • API Root URL:
  • Collection ID: paste here your feed identifier.
  • Username: username
  • Password: paste here the API key that was created in the first step.
  • Import indicators: “All available”.
  • Polling Frequency: “Once an hour”.

Finally, click on “Add”.

After a short delay, CTI will be pushed to Microsoft Sentinel and will be available in the “Threat Intelligence” section.