https://store-images.s-microsoft.com/image/apps.43740.cbdf5c40-c091-4773-96ed-99c673dfb4a3.72d86e2d-2c00-46a3-b82b-1240dd5fd02a.844e029d-a424-4a9e-9fb9-de21d3b9b61c

Legacy IOC based Threat Protection

Microsoft Sentinel, Microsoft Corporation

Legacy IOC based Threat Protection

Microsoft Sentinel, Microsoft Corporation

Legacy IOC based Threat Protection

Note: Please refer to the following before installing the solution:

Microsoft Security Research, based on ongoing trends and exploits creates content that help identify existence of known IOCs based on known prevalent attacks and threat actor tactics/techniques, such as Nobelium, Gallium, Solorigate, etc. This solution contains packaged content written on some legacy IOCs that have been prevalent in the past but may still be relevant.

Pre-requisites:

This is a domain solution and does not include any data connectors. The content in this solution supports the connectors listed below. Install one or more of the listed solutions, to unlock the value provided by this solution.

1. Squid Proxy

2. Microsoft Windows DNS

3. Cisco ASA

4. Palo Alto Networks

5. Microsoft Defender XDR

6. Azure Firewall

7. ZScaler Internet Access

8. Infoblox NIOS

9. Google Cloud Platform DNS

10. NXLog DNS

11. Cisco Umbrella

12. Corelight

13. Amazon Web Services

14. Windows Forwarded Events

15. Sysmon for Linux

16. Microsoft 365

17. Windows Security Events

18. Microsoft Entra ID

19. Azure Activity

20. F5 Advanced WAF

21. Fortinet FortiGate

22. Check Point

23. Common Event Format

24. Windows Firewall


Hunting Queries: 10

Learn more about Microsoft Sentinel | Learn more about Solutions