Skip to main content

threat_intelligence_indicators

Creates, updates, deletes, gets or lists a threat_intelligence_indicators resource.

Overview

Namethreat_intelligence_indicators
TypeResource
Idazure.sentinel.threat_intelligence_indicators

Fields

The following fields are returned by SELECT queries:

NameDatatypeDescription
etagstringEtag of the azure resource
kindstringThe kind of the entity.

Methods

The following methods are available for this resource:

NameAccessible byRequired ParamsOptional ParamsDescription
getselectsubscriptionId, resourceGroupName, workspaceName, nameView a threat intelligence indicator by name.
listselectsubscriptionId, resourceGroupName, workspaceName$filter, $top, $skipToken, $orderbyGet all threat intelligence indicators.
createinsertsubscriptionId, resourceGroupName, workspaceName, nameUpdate a threat Intelligence indicator.
deletedeletesubscriptionId, resourceGroupName, workspaceName, nameDelete a threat intelligence indicator.
query_indicatorsexecsubscriptionId, resourceGroupName, workspaceNameQuery threat intelligence indicators as per filtering criteria.
append_tagsexecsubscriptionId, resourceGroupName, workspaceName, nameAppend tags to a threat intelligence indicator.

Parameters

Parameters can be passed in the WHERE clause of a query. Check the Methods section to see which parameters are required or optional for each operation.

NameDatatypeDescription
namestringThreat intelligence indicator name field.
resourceGroupNamestringThe name of the resource group. The name is case insensitive.
subscriptionIdstringThe ID of the target subscription.
workspaceNamestringThe name of the workspace.
$filterstringFilters the results, based on a Boolean condition. Optional.
$orderbystringSorts the results. Optional.
$skipTokenstringSkiptoken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skiptoken parameter that specifies a starting point to use for subsequent calls. Optional.
$topinteger (int32)Returns only the first n results. Optional.

SELECT examples

View a threat intelligence indicator by name.

SELECT
etag,
kind
FROM azure.sentinel.threat_intelligence_indicators
WHERE subscriptionId = '{{ subscriptionId }}' -- required
AND resourceGroupName = '{{ resourceGroupName }}' -- required
AND workspaceName = '{{ workspaceName }}' -- required
AND name = '{{ name }}' -- required
;

INSERT examples

Update a threat Intelligence indicator.

INSERT INTO azure.sentinel.threat_intelligence_indicators (
data__kind,
data__properties,
subscriptionId,
resourceGroupName,
workspaceName,
name
)
SELECT
'{{ kind }}',
'{{ properties }}',
'{{ subscriptionId }}',
'{{ resourceGroupName }}',
'{{ workspaceName }}',
'{{ name }}'
RETURNING
etag,
kind
;

DELETE examples

Delete a threat intelligence indicator.

DELETE FROM azure.sentinel.threat_intelligence_indicators
WHERE subscriptionId = '{{ subscriptionId }}' --required
AND resourceGroupName = '{{ resourceGroupName }}' --required
AND workspaceName = '{{ workspaceName }}' --required
AND name = '{{ name }}' --required
;

Lifecycle Methods

Query threat intelligence indicators as per filtering criteria.

EXEC azure.sentinel.threat_intelligence_indicators.query_indicators 
@subscriptionId='{{ subscriptionId }}' --required,
@resourceGroupName='{{ resourceGroupName }}' --required,
@workspaceName='{{ workspaceName }}' --required
@@json=
'{
"pageSize": {{ pageSize }},
"minConfidence": {{ minConfidence }},
"maxConfidence": {{ maxConfidence }},
"minValidUntil": "{{ minValidUntil }}",
"maxValidUntil": "{{ maxValidUntil }}",
"includeDisabled": {{ includeDisabled }},
"sortBy": "{{ sortBy }}",
"sources": "{{ sources }}",
"patternTypes": "{{ patternTypes }}",
"threatTypes": "{{ threatTypes }}",
"ids": "{{ ids }}",
"keywords": "{{ keywords }}",
"skipToken": "{{ skipToken }}"
}'
;