MS Graph 安全性 API V2
您可以將 Microsoft Graph Security 與 Sophos Central 整合,讓其將警示傳送至 Sophos 進行分析。
本頁面提供此整合功能的概覽。
Microsoft Graph 安全性
Microsoft Graph 安全性是一個統一的入口,透過 API 第 2 版(亦稱為警示與事件 API)整合來自各類 Microsoft 產品與服務的安全性洞察。此為取代微軟先前提供的「警示(舊版)」端點。
根據客戶持有的基礎 Microsoft 授權(例如 E5),我們將透過 Graph API 從以下安全遙測來源匯入資料:
- Microsoft Entra ID Protection
- Microsoft 365 Defender
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365
- Microsoft Purview Data Loss Prevention
- Microsoft Purview 內部風險管理
Sophos 文件資訊
資料擷取內容
我們看到的警示範例:
- 偵測到隱藏檔案執行
- 嘗試在 Windows App Service 上執行 Linux 指令
- 可疑密碼存取
- 網站在威脅情報源中被標記為惡意網站
- 偵測到 useradd 指令的可疑使用行為
- 偵測到可能的攻擊工具
- 偵測到可能的憑證存取工具
完整擷取警示
我們從 microsoft.graph.security 命名空間中接收來自 Microsoft Graph 安全性的警示。完整文件請參閱警報資源類型。
資料篩選
除確認API返回的格式符合預期外,未套用任何過濾器。
威脅對應範例
警報映射取自警報中返回的標題欄位。
{"alertType": "Access from an unusual location to a storage blob container", "threatId": "T1530", "threatName": "Data from Cloud Storage Object"}
{"alertType": "Detected Petya ransomware indicators", "threatId": "T1486", "threatName": "Data Encrypted for Impact"}
{"alertType": "Suspicious WordPress theme invocation detected", "threatId": "T1102", "threatName": "Web Service"}
{"alertType": "Suspicious PHP execution detected", "threatId": "T1203", "threatName": "Exploitation for Client Execution"}
{"alertType": "Unusually large response payload transmitted between a single IP address and an API endpoint", "threatId": "T1105", "threatName": "Ingress Tool Transfer"}
{"alertType": "Unusually large response payload transmitted between a single IP address and an API endpoint", "threatId": "T1105", "threatName": "Ingress Tool Transfer"}
{"alertType": "Executable found running from a suspicious location", "threatId": "T1203", "threatName": "Exploitation for Client Execution"}
{"alertType": "Access from a TOR exit node to a Key Vault", "threatId": "T1090.003", "threatName": "Multi-hop Proxy"}
{"alertType": "Suspicious spike in API traffic from a single IP address to an API endpoint", "threatId": "TA0001", "threatName": "Initial Access"}
{"alertType": "Access from a suspicious IP to a storage file share", "threatId": "T1526", "threatName": "Cloud Service Discovery"}
{"alertType": "Unusual number of files extracted from a storage file share", "threatId": "TA0010", "threatName": "Exfiltration"}
{"alertType": "Unusual application accessed a storage file share", "threatId": "TA0001", "threatName": "Initial Access"}
{"alertType": "Unusual amount of data extracted from a storage blob container", "threatId": "TA0010", "threatName": "Exfiltration"}
{"alertType": "Access from an unusual location", "threatId": "TA0005", "threatName": "Defense Evasion"}