title | description | author | ms.localizationpriority | ms.subservice | doc_type |
---|---|---|---|---|---|
intelligenceProfile resource type |
Provides up-to-date threat actor infrastructure visibility. |
joerattazzi-microsoft |
medium |
security |
resourcePageType |
Namespace: microsoft.graph.security
[!INCLUDE threatintelligence-api-disclaimer]
The Microsoft Defender Threat Intelligence Profiles (Intel Profiles) API provides the most up-to-date threat actor infrastructure visibility in the industry today, enabling threat intelligence and security operations (SecOps) teams to streamline their advanced threat hunting and analysis workflows. These teams have historically struggled to obtain visibility into the full extent of nation state and cybercriminal adversary infrastructures, creating blind spots in detection and response automation, hunting, and analytics. Sophisticated security professionals can use Microsoft Intelligence Profile APIs, along with the indicators and other associated markers, to automate defense of their organizations and track potentially malicious activity targeting their organization or industry. Users of the Microsoft Defender Threat Intelligence Profiles APIs have access to detailed threat actor intel profiles, including background information and interpretation guidance.
Method | Return type | Description |
---|---|---|
List intelligenceProfiles | microsoft.graph.security.intelligenceProfile collection | Get a list of the microsoft.graph.security.intelligenceProfile objects and their properties. |
Get intelligenceProfile | microsoft.graph.security.intelligenceProfile | Read the properties and relationships of a microsoft.graph.security.intelligenceProfile object. |
List indicators | microsoft.graph.security.intelligenceProfileIndicator collection | Get a list of intelligenceProfileIndicator resources. |
Property | Type | Description |
---|---|---|
aliases | String collection | A list of commonly-known aliases for the threat intelligence included in the intelligenceProfile. |
countriesOrRegionsOfOrigin | microsoft.graph.security.intelligenceProfileCountryOrRegionOfOrigin collection | The country/region of origin for the given actor or threat associated with this intelligenceProfile. |
description | microsoft.graph.security.formattedContent | A synopsis of the threat actor. This property places the threat actor in wider context, tracing its discovery, history, significant campaigns, targeting, techniques of note, affiliations with governments, law enforcement countermeasures, and any areas of dispute among the security community regarding attribution. |
firstActiveDateTime | DateTimeOffset | The date and time when this intelligenceProfile was first active. The timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . |
id | String | The system generated ID for this intelligenceProfile. |
kind | microsoft.graph.security.intelligenceProfileKind | A categorization of the type of this intelligenceProfile. The possible values are: actor , tool , unknownFutureValue . |
summary | microsoft.graph.security.formattedContent | A short summary of this intelligenceProfile. |
targets | String collection | Known targets related to this intelligenceProfile. |
title | String | The title of this intelligenceProfile. |
tradecraft | microsoft.graph.security.formattedContent | Formatted information featuring a description of the distinctive tactics, techniques, and procedures (TTP) of the group, followed by a list of all known custom, commodity, and publicly available implants used by the group. |
Relationship | Type | Description |
---|---|---|
indicators | microsoft.graph.security.intelligenceProfileIndicator collection | Includes an assemblage of high-fidelity network indicators of compromise. |
The following is a JSON representation of the resource.
{
"@odata.type": "#microsoft.graph.security.intelligenceProfile",
"aliases": ["String"],
"description": {
"@odata.type": "microsoft.graph.security.formattedContent"
},
"firstActiveDateTime": "String (timestamp)",
"id": "String (identifier)",
"kind": "String",
"countriesOrRegionsOfOrigin": [
{
"@odata.type": "microsoft.graph.security.intelligenceProfileCountryOrRegionOfOrigin"
}
],
"summary": {
"@odata.type": "microsoft.graph.security.formattedContent"
},
"targets": ["String"],
"title": "String",
"tradecraft": {
"@odata.type": "microsoft.graph.security.formattedContent"
}
}